Checkpoint firewall CCSA

Exam Description: Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701) is a 120-minute exam associated with the CCNP and CCIE Security Certifications. This exam tests a candidate’s knowledge of implementing and operating core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements. The course, Implementing and Operating Cisco Security Core Technologies, helps candidates to prepare for this exam.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

  • Standalone installation
  • Distributed installation
  • Primary and Secondary installation
  • Rule base, Objects and Smart view tracker

  • Configuring Hide mode or Dynamic NAT
  • Configuring Static NAT
  • Configuring Manual NAT

  • Symmetric Key Cryptography
  • Asymmetric Key Cryptography
  • Public Key Infrastructure, Public and Private Keys
  • Encryption and Decryption, Message Digest, Hashing Algorithm
  • Digital Signature
  • Authentication, Integrity and Non-repudiation
  • Diffie Helman Key exchange

  • Kerberos
  • User Authentication
  • Client Authentication
  • Session Authentication
  • Partially automatic / Fully automatic authentication

  • Tracking and alerting TCP/IP 3 way handshake
  • SYN Defender
  • SYN Relay
  • Passive SYN Defender

  • VPN Fundamentals
  • Creating VPN tunnels
  • Internet Key Exchange (IKE)
  • ISAKMP Phase 1 (SA Negotiation)
  • IPSec Phase 2 (SA Negotiation)
  • AH and ESP headers
  • Site to Site VPN using Pre-shared secret
  • Site to Site VPN using Certificate Authority
  • Site to Site VPN (Secure Remote)

  • Security Servers on the Firewall (SMTP, HTTP and FTP traffic security)
  • The Content Vectoring Protocol (CVP Server)
  • The URL Filtering Protocol (UFP Server)
  • Filtering with UFP Server
  • Filtering with CVP server

  • Backup and Restore Security Gateways and Management Servers
  • Upgrading Standalone Full High Availability
  • Lab: Upgrading to Check Point

  • Check Point Firewall Infrastructure
  • Security Gateway
  • Kernel Tables
  • Check Point Firewall Key Features
  • Network Address Translation
  • FW Monitor

  • VRRP
  • Clustering and Acceleration
  • ClusterXL: Load Sharing
  • Maintenance Tasks and Tools
  • Management HA
  • SecureXL: Security Acceleration
  • CoreXL: Multicore Acceleration

  • User Management
  • Troubleshooting User Authentication and User Directory (LDAP)
  • Identity Awareness

  • Advanced VPN Concepts and Practices
  • Remote Access VPNs
  • Multiple Entry Point VPNs
  • Tunnel Management
  • Troubleshooting
  • VPN Debug

  • Auditing and Reporting Process
  • SmartEvent
  • SmartEvent Architecture
  • SmartReporter