Check Point Jump Start: Quantum Spark Network Security

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Check Point Jump Start: Quantum Spark Network Security

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Check Point Quantum Spark (SMB) Appliances are high-performance, integrated devices offering optional WiFi and LTE support. Standard Check Point Network Security features such as Firewall, VPN, Anti-Virus, Application Control, URL Filtering, Email Security, and SandBlast Zero-Day Protection are supported. This course includes these modules: 1. Introduction 2. Installation 3. WebUI Overview 4. Out-of-the-Box State 5. Policy Customization 6. Smart Accel 7. VoIP Wizard 8. Local Management 9. Centrally Managed 10. SMP 11. Active Directory Sync 12. Threat Prevention 13. SSL Inspection 14. Configure Interface 15. Configure Wireless Networks 16. Enable cellular 17. Reach My Device 18. Reuse Token 19. Configure Watchtower 20. Automatic and Manual Upgrade 21. Site-to-Site VPN 22. Remote Access VPN 23. Monitoring 24. Troubleshooting Overview 25. Backup and Restore 26. Configure OSPF This course is suitable for new Check Point customers with prior experience configuring or administrating Check Point Network Security products.e.g. This is primarily aimed at first- and second-year undergraduates interested in engineering or science, along with high school students and professionals with an interest in programming.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Use Twitter for OSINT and threat intelligence to enhance security posture ethically and effectively
Medium · Startup
Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Learn to leverage Twitter for OSINT and threat intelligence to strengthen security posture
Medium · Cybersecurity
Your Encrypted Laptop Isn’t as Safe as You Think
Encryption alone may not protect your laptop data from theft, understand the limitations and take additional measures
Medium · Cybersecurity
TCP, Firewalls, Port Forwarding & VPNs — How Data Is Sent and Secured
Learn how data is sent and secured over the internet using TCP, firewalls, port forwarding, and VPNs
Medium · Cybersecurity
Up next
Cryptography
Coursera
Watch →