Here you can compare the prices for iT courses Check Point Software Technologies, get acquainted with photos and technical characteristics (for example Training program duration, UNSPSC-code, Warranty note) and buy a liked model iT courses in one of the reliable online stores.
- Given the needs of your company and your customers, choose the correct Provider-1® implementation to cover these requirements. - Define the various components of the Provider-1 architecture and apply them to your corporate network.
CHAPTER 2—MDS Installation and Configuration
- Plan a Provider-1 deployment in an enterprise network. - Install Provider-1 and configure the MDS Manager/Container on a SecurePlatform machine.
CHAPTER 3—Management Concepts & Features
- Create and configure a CMA for a Customer. - Migrate an existing Security Management configuration into Provider-1 with CMA Migration tools. - Apply your knowledge of Provider-1 architecture, file system, tools or processes to manage Customer sites.
CHAPTER 4—Logging Features
- Configure and implement a MLM for the Provider-1 environment. - Configure and implement a CLM for a given Customer.
CHAPTER 5—Global Policies
- Create and implement a Global Policy. - Configure and implement IPS in the Global Policy. - Configure and implement VPNs Globally and per Customer.
CHAPTER 6—High Availability and Upgrade Overview
- Create a mirror MDS Manager/Container and enable MDS High Availability. - Export and import an MDS or CMA into an existing Pro
By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.