加入 Systematic Facebook 擁躉群  

這個頁面上的內容需要較新版本的 Adobe Flash Player。

取得 Adobe Flash Player


想定期知道最新課程及優惠嗎?
免費訂閱本中心的課程通訊!
觀看課程通訊
Reasonable Spread:
Permission email marketing

【基礎普通話拼音課程】費用全免!

Check Point CCSA R77 國際認可證書課程

  • 課程時間
  • 課程簡介
  • 課程特點
  • 認證要求
  • 考試須知
  • 課程內容

推介服務:課堂錄影隨時睇
編號 地點 可預約星期及時間 學費低至 85 折  
PI1712MV 旺角 一至五:11:30 - 22:30   六及日:10:30 - 21:30   (公眾假期休息) 95 折後只需 $2,356 按此報名
PI1712OV 觀塘 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 9 折後只需 $2,232 按此報名
PI1712PV 北角 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 9 折後只需 $2,232 按此報名
PI1712SV 沙田 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 85 折後只需 $2,108 按此報名
PI1712YV 屯門 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 85 折後只需 $2,108 按此報名
* 各政府部門可使用 P Card 付款  
免費試睇: 首 1 小時,請致電與本中心職員預約。 查看各地點電話
旺角 2332-6544
觀塘 3563-8425
北角 3580-1893
沙田 2151-9360
屯門 3523-1560
免費重睇: 學員可於享用時期內於報讀地點不限次數地重看課堂錄影,從而可反覆重溫整個課程!
導師解答: 學員可於觀看某一課堂錄影後提出課堂直接相關的問題,課程導師會樂意為學員以單對單的形式解答!
合格保障: 半費重考。開始觀看最後 1 堂之 1 個月內為保障期限。請務必向本中心購買考試券。
課時: 18 小時
享用時期: 6 星期 (可於報讀日至 4 星期內觀看整個課程,另加 2 星期備用時期)。進度由您控制,可快可慢。
課堂錄影導師: Franco (任教課程清單)
課堂錄影隨時睇: 詳情及示範片段


合格保障:學員若考試不合格,本中心均會代付考試費,令學員可 半費重考 !詳情...


隨著網絡技術日益普及,大家都開始擔心網絡和資訊保安的問題。故此各大網絡硬件和軟件製造商紛紛推出多個保安產品以提升企業網絡保安水平。 Check Point 便是當中的翹楚。 Check Point 是著名的防火牆 (Firewall) 及虛擬私人網絡 (VPN) 的生產商,其產品遍佈全球。故此掌握 Check Point 技術乃是大勢所趨。

為證明您能掌握各項 Check Point 技術, Check Point 推出了一系列的認證。而最為普遍的有:

- CCSA R77 (Check Point Certified Security Administrator R77)

- CCSE R77 (Check Point Certified Security Expert R77)

CCSA R77 是 Check Point 入門級的認證,考過 CCSA R77 後,同學便可以考取更高級的 CCSE R77 認證。

本課程專為同學考取 CCSA R77 國際認可證書而設,導師將在課堂上使用 Check Point R77 示範和教授各項 Check Point 技術。修畢課程後,便可參加考試 156-215.77 ( Check Point Security Administration R77 ),合格後便可成為 CCSA R77!


課程時數: 合共 18 小時
適合人士: 對防火牆及虛擬私人網絡技術有興趣的人士
授課語言: 以廣東話為主,輔以英語
課程筆記: 本中心導師親自編寫英文筆記

1. Franco 親自教授: Franco 善於控制學習節奏,深入淺出,令學員在輕鬆的氣氛下掌握知識。
2. Franco 親自編寫筆記: Franco 親自編寫筆記,絕對適合考試及實際操作 Check Point 器材之用,令你無須「死鋤」如字典般厚及不適合香港讀書格調的書本。
3. 理論與實習並重: Franco 的筆記不會紙上談兵,筆記內有大量商業實習。
4. 提供模擬考試題目: 本中心為學員提供充足的模擬考試題目,每條考試題目均附有標準答案。而較難理解的題目,均會附有解釋。
5. 考試合格保障: 本中心 CCSA R77 學員於第一次考 CCSA R77 若不合格,可申請半費重考 CCSA R77 一次,但必須符合下列的四項要求:
1. 於【CCSA R77 國際認可證書課程】之課堂出席率須達 85% 或以上。
2. 學員必須於本中心應考 CCSA R77 考試。
3. 學員於第一次應考 CCSA R77 考試前,必須進行本中心的 CCSA R77 試前測驗,並取得 90% 或以上的分數。
4. 於上課結束日之 1 個月內作出申請。
6. 免費重讀: 傳統課堂學員可於課程結束後三個月內免費重看課堂錄影。

只要你於下列科目取得合格成績,便可獲 Check Point 頒發 CCSA R77 國際認可證書:

考試編號 科目名稱
156-215.77 Check Point Certified Security Administrator R77



本中心為 Check Point 指定的 CCSA R77 考試試場,報考時請致電本中心,登記欲報考之科目考試編號、考試日期及時間 ( 最快可即日報考 ) 。臨考試前要出示身份證及繳付考試費 HK$2,000 。

臨考試前要繳付考試費 HK$2,000,及必須出示下列兩項有效之身份證明文件,否則考生不可進行考試,而已繳付之考試費亦不會退回:
1. 香港身份證 及
2. 附有考生姓名及簽名的證件 (如信用咭、香港特區護照、BNO等)


考試題目由澳洲考試中心傳送到你要應考的電腦,考試時以電腦作答。所有考試題目均為英文,而大多數的考試題目為單項選擇題 ( 意即 O) 或多項選擇題 ( 意即 口 ) 。作答完成後會立即出現你的分數,結果即考即知!考試不合格便可重新報考,不限次數。欲知道作答時間、題目總數、合格分數等詳細考試資料,可瀏覽本中心網頁
"各科考試分數資料"。





1 Firewall Technology Overview
1.1 OSI Reference Model
1.2 Firewall technologies
1.2.1 Packet filtering
1.2.2 Stateful Inspection
1.2.3 Application Intelligence
1.3 Inspection architecture
1.4 Deployment topology
1.4.1 Layer 3 deployment
1.4.2 Layer 3 deployment with DMZ
1.4.3 Layer 2 deployment
1.5 Security Policy Management
1.5.1 Security Management Server
1.5.2 Security Gateway
1.5.3 SmartConsole Software
1.5.3.1 SmartDashboard
1.5.3.2 SmartView Tracker
1.5.3.3 SmartView Monitor
1.5.3.4 SmartReporter
1.5.3.5 SmartEvent and SmartEvent architecture
1.5.3.6 SmartUpdate
1.5.3.7 SmartProvisioning
1.6 Secure Internal Communication (SIC)
1.6.1 Internal Certificate Authority (ICA)
1.6.2 SIC between security management servers and components

2 Check Point Products
2.1 Check Point Appliances
2.2 Smart-1 Appliances
2.3 GAiA
2.3.1 WebUI
2.3.1.1 Config Lock
2.3.1.2 Console
2.3.1.3 Monitoring tab
2.3.1.4 System overview
2.3.2 Command Line Interface and Expert Mode
2.3.2.1 Command Line Interface
2.3.2.2 Expert Mode
2.3.3 Critical Check Point Directories
2.3.3.1 $FWDIR/conf
2.3.3.2 Rule Bases
2.3.3.3 Objects
2.3.3.4 User database
2.3.3.5 $FWDIR/log
2.3.3.6 $FWDIR/bin
2.3.4 Performance Pack and SecureXL
2.3.5 CoreXL

3 Gaia and R77 Installation
3.1 Compatibility and prerequisites
3.1.1 GAiA and SecurePlatform Hardware Compatibility List
3.1.2 Open Server Hardware Requirements
3.1.2.1 Security Gateway Open Server Hardware Requirements
3.1.2.2 Security Management Open Server Hardware Requirements
3.1.2.3 Management Console Requirements
3.2 Install Gaia
3.2.1 Demonstration Topology
3.2.2 Demonstration: Install Gaia in a management server (172.16.1.11)
3.2.3 Demonstration: Install Gaia in a security gateway (172.16.1.1)
3.3 Install and basic configure Check Point R77 Products
3.3.1 Standalone deployment and Distributed deployment
3.3.1.1 Standalone deployment
3.3.1.2 Distributed deployment
3.3.2 Demonstration: Configure Gaia and install R77 management server (172.16.1.11)
3.3.3 Demonstration: Configure Gaia and install R77 security gateway (172.16.1.1)
3.3.4 Demonstration: Configure additional IP addresses and default gateway in the security gateway (172.16.1.1)
3.3.5 Demonstration: Install SmartConsole in Windows
3.3.5.1 Download SmartConsole from Management Server
3.3.5.2 Install prerequisites
3.3.5.3 Install SmartConsole
3.3.6 Demonstration: Accessing to security management server through SmartDashboard
3.4 Establish SIC between Management Server and Security Gateway
3.4.1 Demonstration: Establish SIC between Management Server and Security Gateway

4 Firewall Policy
4.1 SmartMap
4.1.1 Demonstration: Enable SmartMap
4.1.2 Demonstration: Actualize Network Objects
4.1.3 Demonstration: Create Host Objects
4.1.4 Demonstrations: Export SmartMap
4.2 Rule Base
4.2.1 Components
4.2.2 Enforcement Order
4.2.3 Demonstration: Building the Rule Base
4.3 Stealth rule and cleanup rule
4.3.1 Stealth rule
4.3.2 Cleanup rule
4.3.3 Demonstration: Stealth rule and cleanup rule
4.4 Implied rules
4.4.1 Demonstration: Configuring implied rules
4.5 Anti-spoofing
4.5.1 Lab: Verifying anti-spoofing configurations
4.6 Rule base order
4.7 Policy management and version control
4.7.1 Policy package management
4.7.1.1 Demonstration: Managing policy packages
4.7.2 Database revision control
4.7.2.1 Demonstration: Database revision control
4.8 Group, hide and disable rules
4.8.1 Rules grouping
4.8.1.1 Demonstration: Rules grouping
4.8.2 Rules hiding
4.8.2.1 Demonstration: Rules hiding
4.8.3 Rules disabling
4.8.3.1 Demonstration: Rules disabling

5 Monitoring traffic and connections
5.1 SmartView Tracker
5.1.1 Demonstration: Login to SmartView Tracker
5.1.2 Log Types
5.1.3 SmartView Tracker Tabs
5.1.4 Log file management
5.1.4.1 Demonstration: Log file management: Export
5.1.4.2 Lab: Log file management: Switch active file
5.1.4.3 Demonstration: Log file management: Purge active file
5.1.5 Manage active connections
5.1.5.1 Demonstration: Block “harmful” active connections
5.2 SmartView Monitor
5.2.1 Demonstration: Login to SmartView Monitor
5.2.2 Monitoring alerts
5.2.3 Demonstration: Enabling monitoring in security gateway
5.2.4 Managing suspicious activities
5.2.4.1 Demonstration: Managing suspicious activity rules
5.3 Email Notification
5.3.1 Demonstration: Email notification
5.4 Alerts
5.4.1 Demonstration: Alerts
5.5 System Alerts and Thresholds
5.5.1 Demonstration: System Alerts and Thresholds
5.6 Custom Commands
5.6.1 Demonstration: Custom Commands

6 NAT (Network Address Translation)
6.1 Overview
6.2 Dynamic (Hide) Mode NAT
6.2.1 Process of Dynamic (Hide) Mode NAT
6.2.2 Demonstration: Dynamic (Hide) Mode NAT
6.2.3 Demonstration: Analysing Dynamic (Hide) Mode NAT traffic in Wireshark
6.3 Static Mode NAT
6.3.1 Process of Static Mode NAT
6.3.2 Demonstration: Static Mode NAT
6.3.3 Demonstration: Analysing Static Mode NAT traffic in Wireshark
6.4 Manual NAT
6.4.1 Demonstration: Manual NAT
6.4.2 Demonstration: Analysing Manual NAT traffic in Wireshark
6.5 More about Check Point NAT concepts
6.5.1 Bidirectional NAT
6.5.2 Configure Bidirectional NAT
6.5.3 Translate destination on client side
6.5.4 ARP

7 IPS (Intrusion Prevention System)
7.1 Demonstration: Activating IPS
7.2 IPS Profile
7.2.1 IPS pre-defined profiles
7.2.1.1 Default_Protection
7.2.1.2 Recommended_Protection
7.3 IPS Protections / Signatures
7.4 Geo Protection
7.4.1 The IP-to-country database
7.4.2 Configuring Geo Protection
7.5 DShield Storm Center
7.6 Demonstration: IPS: Header rejection (Block suspicious websites)
7.7 Demonstration: Blocking suspicious “PING”
7.8 Demonstration: TTL Masking
7.9 IPS under heavy loading

8 Application Control and URL Filtering
8.1 Demonstration: Enabling Application Control and URL Filtering
8.2 AppWiki
8.3 Demonstration: Blocking YouTube (Part 1)
8.4 Demonstration: Blocking YouTube (Part 2)
8.5 Another case study of using Application Control

9 User management and authentication
9.1 User Authentication
9.1.1 Demonstration: Create users for authentication
9.1.2 Demonstration: User Authentication
9.2 Session Authentication
9.2.1 Demonstration: Installing Session Authentication agent
9.2.2 Demonstration: Session Authentication
9.3 Client Authentication
9.3.1 Sign on methods
9.3.2 Demonstration: Client Authentication - Manual sign on by HTTP
9.3.3 Demonstration: Client Authentication - Manual sign on by Telnet
9.4 LDAP (Lightweight Directory Access Protocol)
9.4.1 Introduction to LDAP
9.4.2 Retrieving information from a SmartDirectory (LDAP) Server
9.4.3 DN (Distinguished Name)
9.4.4 Demonstration: LDAP Authentication
9.5 Identity Awareness
9.5.1 Source of identity
9.5.2 AD Query
9.5.3 Captive Portal (Browser-Based Authentication)
9.5.4 Identity Agents
9.5.5 Demonstration: Identity awareness for staff (internal users)
9.5.6 Demonstration: Identity awareness for visitor guests

10 VPN (Virtual Private Network)
10.1 Introduction of VPN
10.2 Encryption and decryption
10.3 Diffie-Hellman (DH)
10.4 Hashing
10.5 IKE (Internet Key Exchange)
10.5.1 IKE phase 1
10.5.2 IKE phase 2
10.6 VPN Communities
10.7 VPN Topologies
10.7.1 Meshed VPN Community
10.7.2 Star VPN Community
10.7.3 Two-star and meshed
10.8 Demonstration: Site-to-site VPN Part 1
10.9 Demonstration: Site-to-site VPN Part 2
10.10 Demonstration: Site-to-site VPN Part 3

11 Miscellaneous topics
11.1 Reset SIC
11.1.1 Lab: Reset SIC
11.2 Password recovery of Check Point administrator
11.2.1 Lab: Reset Check Point Administrator password
11.3 Backup and restoration options
11.3.1 Snapshot
11.3.2 Backup
11.3.3 upgrade_export and upgrade_import
11.4 Permissions to Install
11.5 Connection persistence when installing a new policy
11.5.1 Keep all connections
11.5.2 Keep data connections
11.5.3 Rematch connections

12 Appendix 1: Demonstration Topology


 

更多綜合課程
  法律課程
  • 代理人的法律責任
  • 公司董事和合夥人的法律責任
  • 婚姻的法律責任
  • 遺產繼承的合法權益
  英文課程
  • IPA 拼音:級別 1 2 3 4
  普通話課程
  • 基礎普通話拼音 (免費)
  • 進階普通話拼音
  • 普通話會話:級別 1 2 3
  西班牙語文課程
  • 級別 1 2 3
  中醫課程
  • 濕疹與皮膚敏感病
  • 暗瘡與色斑 | 鼻敏感與感冒
  • 脫髮與白髮 | 從五官看健康
  攝影課程
  • 攝影初級
  • 攝影中級 (風景專題)
  風水命理課程
  • 紫微斗數:級別 1 2 3
  • 子平八字:級別 1 2 3
  • 八字風水:級別 1 2 3
  • 奇門遁甲:級別 1 2 3

這個頁面上的內容需要較新版本的 Adobe Flash Player。

取得 Adobe Flash Player