My cart:
0 items
  • Cart is Empty
  • Sub Total: $0.00

156-315-80 Exam Format | 156-315-80 Course Contents | 156-315-80 Course Outline | 156-315-80 Exam Syllabus | 156-315-80 Exam Objectives

156-315-80 Exam Information and Guideline

Check Point Certified Security Expert - R80 (156-315.80)



Below are complete topics detail with latest syllabus and course outline, that will help you good knowledge about exam objectives and topics that you have to prepare. These contents are covered in questions and answers pool of exam.





Exam Title : Check Point Certified Security Expert (CCSE) R80

Exam ID : 156-315.80

Exam Duration : 90 mins

Number of Questions : 100

Passing Score : 70%

Exam Center : Pearson VUE

Practice Test Check Point 156-315.80 Certification Practice Test

Objectives:

Perform a backup of a Security Gateway and Management Server using your Understanding of the differences between backups, snapshots, and upgrade-exports.

Upgrade and troubleshoot a Management Server using a database migration.

Upgrade and troubleshoot a clustered Security Gateway deployment.

- Snapshot management

- Upgrade Tools

- Backup Schedule Recommendations

- Upgrade Tools

- Performing Upgrades

- Support Contract

- Install Security Management Server

- Migrating Management server Data

- Importing the Check Point Database

- Launch SmartDashboard

- Upgrading the Security Gateway

Objectives:

Using knowledge of Security Gateway i
nfrastructure, including chain modules, packet flow and kernel tables to describe how to perform debugs on firewall processes.
- GUI Clients

- Management

- User and Kernel Mode Processes

- CPC Core Process

- FWM

- FWD

- CPWD

- Inbound and Outbound Packet Flow

- Inbound FW CTL Chain Modules

- Outbound Chain Modules

- Columns in a Chain

- Stateful Inspection

- Connections Table

- Connections Table Format

- Packet Inspection Flow

- Policy Installation Flow

- Policy Installation Process

- Policy Installation Process Flow

- How NAT Works

- Hide NAT Process

- Security Servers

- How a Security Server Works

- Basic Firewall Administration

- Common Commands

- What is FW Monitor

- C2S Connections and S2C Packets fw monitor

- Policy Management and Status

- Verification from the CLI

- Using cpinfo

- Run cpinfo on the Security Management Server

- Analyzing cpinfo in InfoView

- Using fw ctl pstat

- Using tcpdump

Objectives:

Build, test and troubleshoot a ClusterXL Load Sharing deployment on an enterprise network.

Build, test and troubleshoot a ClusterXL High Availability deployment on an enterprise network.

Build, test and troubleshoot a management HA deployment on an enterprise network.

Configure, maintain and troubleshoot SecureXL and CoreXL acceleration solutions on the corporate network traffic to ensure noted performance enhancement on the firewall.

Build, test and troubleshoot a VRRP deployment on an enterprise network.

- VRRP vs ClusterXL

- Monitored Circuit VRRP

- Troubleshooting VRRP

- Clustering Terms

- ClusterXL

- Cluster Synchronization

- Synchronized-Cluster Restrictions

- Securing the Sync Interface

- To Synchronize or Not to Synchronize

- Multicast Load Sharing

- Unicast Load Sharing

- How Packets Travel Through a Unicast

- LS Cluster

- Sticky Connections

- Perform a Manual Failover of the FW Cluster

- Advanced Cluster Configuration

- The Management High Availability Environment

- Active vs. Standby

- What Data is Backed Up?

- Synchronization Modes

- Synchronization Status

- What SecureXL Does

- Packet Acceleration

- Session Rate Acceleration

- Masking the Source Port

- Application Layer Protocol - An Example with HTTP HTTP 1.1

- Factors that Preclude Acceleration

- Factors that Preclude Templating (Session Acceleration)

- Packet Flow

- VPN Capabilities

- Supported Platforms and Features

- Default Configuration

- Processing Core Allocation

- Allocating Processing Cores

- Adding Processing Cores to the Hardware

- Allocating an Additional Core to the SND

- Allocating a Core for Heavy Logging

- Packet Flows with SecureXL Enabled

- Installing and Configuring the Secondary Security Gateway Re-configuring the Primary Gateway

- Configuring Management Server Routing

- Configuring the Cluster Object

- Testing High Availability

- Installing the Secondary Management Server

- Configuring Management High Availability

Objectives:

Using an external user database such as LDAP, configure User Directory to incorporate user information for authentication services on the network.

Manage internal and external user access to resources for Remote Access or across a VPN.

Troubleshoot user access issues found when implementing Identity Awareness.

- Active Directory OU Structure

- Using LDAP Servers with Check Point

- LDAP User Management with User Directory

- Defining an Account Unit

- Configuring Active Directory Schemas

- Multiple User Directory (LDAP) Servers

- Authentication Process Flow

- Limitations of Authentication Flow

- User Directory (LDAP) Profiles

- Common Configuration Pitfalls

- Some LDAP Tools

- Troubleshooting User Authentication

- Enabling AD Query

- AD Query Setup

- Identifying users behind an HTTP Proxy

- Verifying theres a logged on AD user at the source IP

- Checking the source computer OS

- Using SmartView Tracker

- Creating the Active Directory Object in SmartDashboard

- Verify SmartDashboard Communication with the AD Server

Objectives:

Using your knowledge of fundamental VPN tunnel concepts, troubleshoot a site-to-site or certificate-based VPN on a corporate gateway using IKEView, VPN log files and commandline debug tools.

Optimize VPN performance and availability by using Link Selection and Multiple Entry Point solutions.

Manage and test corporate VPN tunnels to allow for greater monitoring and scalability with multiple tunnels defined in a community including other VPN providers.

- IPsec

- Internet Key Exchange (IKE)

- IKE Key Exchange Process – Phase 1/ Phase 2 Stages

- Connection Initiation

- Link Selection

- How Does MEP Work

- Explicit MEP

- Implicit MEP

- Permanent Tunnels

- Tunnel Testing

- VPN Tunnel Sharing

- Tunnel-Management Configuration

- Permanent-Tunnel Configuration

- Tracking Options

- Advanced Permanent-Tunnel configuration

- VPN Tunnel Sharing Configuration

- VPN Encryption Issues

- vpn debug Command

- vpn debug on | off

- vpn debug ikeon |ikeoff

- vpn Log Files

- vpn debug trunc

- VPN Environment Variables

- vpn Command

- vpn tu

- Comparing SAs

- Configuring Access to the Active Directory Server

- Creating the Certificate

- Importing the Certificate Chain and Generating Encryption Keys

- Installing the Certificate

- Establishing Environment Specific Configuration

- Testing the VPN Using 3rd Party Certificates

- Defining LDAP Users and Groups

- Configuring LDAP User Access

- Defining Encryption Rules

- Defining Remote Access Rules

- Configuring the Client Side

Objectives:

Create Events or use existing event definitions to generate reports on specific network traffic using SmartReporter and SmartEvent in order to provide industry compliance information to management.

Using your knowledge of SmartEvent architecture and module communication, troubleshoot report generation given command-line tools and debug-file information.

- Auditing and Reporting Standards

- SmartEvent Intro

- Component Communication Process

- Event Policy User Interface

- Report Types

- Configure the Network Object in SmartDashboard

- Configuring Security Gateways to work with SmartEvent

- Monitoring Events with SmartEvent

- Generate Reports Based on Activities

156-315-80 Exam Dumps Detail

We are the best Exam Dumps Provider

With a long list of thousands of satisfied customers, we welcome you to join us.

All CertificationsAll Vendors