- Enforcing Network Security Policy using Check Point Quantum Spark Appliance (SMB)
- Free tutorial
- Rating: 4.8 out of 54.8 (6 ratings)
- 811 students
- 1hr 39min of on-demand video
- Created by Check Point Software Technologies, Ltd., Daniel Niazov
English
What you’ll learn
- This course introduces you to Check Point’s Quantum Spark Pro Next Generation Firewalls for Small and Medium Business (SMB) networks.
- You will learn how to deploy, configure, manage, and monitor network security policy on the Quantum Spark Pro Next Generation Firewalls.
- The Check Point Quantum Spark security gateway family delivers enterprise-grade security to protect small business networks
- Quantum Spark models with Wi-Fi, and Wi-Fi with an embedded 5G modem fit seamlessly into your home and branch office networks.
Requirements
- Familiarity with basic networking concepts (e.g. TCP/IP, subnetting) is helpful but not required.
Description
Check Point Quantum Spark (SMB) Appliances are high-performance, integrated devices offering optional WiFi and LTE support. Standard Check Point Network Security features such as Firewall, VPN, Anti-Virus, Application Control, URL Filtering, Email Security, and SandBlast Zero-Day Protection are supported.
This course includes these modules:
1. Introduction
2. Installation
3. WebUI Overview
4. Out-of-the-Box State
5. Policy Customization
6. Smart Accel
7. VoIP Wizard
8. Local Management
9. Centrally Managed
10. SMP
11. Active Directory Sync
12. Threat Prevention
13. SSL Inspection
14. Configure Interface
15. Configure Wireless Networks
16. Enable cellular
17. Reach My Device
18. Reuse Token
19. Configure Watchtower
20. Automatic and Manual Upgrade
21. Site-to-Site VPN
22. Remote Access VPN
23. Monitoring
24. Troubleshooting Overview
25. Backup and Restore
26. Configure OSPF
This course is suitable for new Check Point customers with prior experience configuring or administrating Check Point Network Security products.
Check Point Company Overview
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one-point-of-control security management system. Check Point protects over 100,000 organizations of all sizes.
With Check Point Infinity, the only consolidated cyber security solution across cloud, networks, endpoints, mobile, and IoT, we are continuously pioneering cyber security innovation with the most advanced AI-based threat Intelligence and prevention technologies, unified security management, and cloud security automation to help protect organizations from 6th generation of cyber attacks.
With over 3,500 security experts, a world-acclaimed research and intelligence unit, and the broadest ecosystem of business and technology partners, we protect over 100,000 organizations of all sizes across all industry verticals in 88 countries to allow better experiences in a safer digital world.
Who this course is for:
- This course is suitable for new Check Point customers with prior experience configuring or administrating Check Point Network Security products
Show less
Course content
15 sections • 26 lectures • 1h 38m total lengthCollapse all sections
Introduction1 lecture • 6min
- Introduction05:40
Installation1 lecture • 12min
- Installation11:47
WebUI1 lecture • 7min
- WebUI Overview06:33
Policy4 lectures • 14min
- Out of the Box State03:30
- Policy Customization03:44
- Smartaccel03:09
- VoIP Wizard03:57
Management3 lectures • 13min
- Local03:47
- Central04:37
- SMP04:26
User Management1 lecture • 2min
- Active Directory Sync02:25
Threat Prevention2 lectures • 7min
- TP Out of the Box State02:51
- SSL Inspection by asset type03:58
Networking3 lectures • 12min
- Configure Interfaces04:37
- Configure Wireless Networks04:35
- Enable cellular02:18
Reach my Device2 lectures • 5min
- Reach my Device03:04
- Reuse Token01:58
Mobile1 lecture • 3min
- Configure watchtower02:47
Upgrade1 lecture • 3min
- Manual and automatic02:33
VPN2 lectures • 6min
- Site to Site02:16
- Remote Access04:04
Monitoring1 lecture • 3min
- Monitoring03:10
Troubleshooting2 lectures • 4min
- Overview03:02
- Backups01:22
Dynamic Routing1 lecture • 2min
- Configure OSPF02:23