Check Point Firewall
In the world of enhanced technology for hardware virus, Trojan, malware, spyware. I want to be your firewall
What you’ll learn
-
Basics of Check Point Firewall
-
How To Configure Check Point From Scratch
-
how to deploy Check Point Three-Tier Topology
Requirements
-
Basic knowledge of networking
-
TCP/IP protocol knowledge
-
Basic knowledge on Windows server/Unix.
Who this course is for:
- An IT professional responsible for installing, deploying, administering and supporting the Check Point Software Blades
- Resellers and users having expertise in performing advanced deployment of Check Point Software Blades configurations