CCSA Exam Cram (Exam: CP2000) 🔍
Tony Piltzecker; Les Stovall Coriolis Group Books, Exam Cram Ser, Scottsdale, Oct. 2001
英语 [en] · PDF · 25.0MB · 2001 · 📗 未知类型的图书 · 🚀/duxiu/ia · Save
描述
Title from title screen
Preparation for CCSA CP2000 (156-205) exam
Includes bibliographical references and index
Text
Mode of access: Internet via World Wide Web
Digitized and made available by: Books 24x7.com
备选标题
Checkpoint Certified Security Administrator
备选标题
CCSA exam cram [electronic resource]
备选作者
Piltzecker, Tony, 1975-; Books24x7, Inc
备选作者
Piltzecker, Tony, Stoval, Les
备用出版商
Scottsdale, Ariz.: Coriolis Group
备用出版商
Coriolis Group, LLC, the
备用版本
United States, United States of America
备用版本
Exam cram, Scottsdale, Ariz, ©2001
备用版本
1st edition, October 23, 2001
元数据中的注释
Type: 英文图书
元数据中的注释
Bookmarks:
1. (p1) Introduction
2. (p2) Self-Assessment
3. (p3) Chapter 1 Check Point Certification Exams
3.1. (p4) Assessing Exam-Readiness
3.2. (p5) The Exam Situation
3.3. (p6) Exam Layout and Design
3.4. (p7) Check Point's Testing Format
3.5. (p8) Question-Handling Strategies
3.6. (p9) Mastering the Inner Game
3.7. (p10) Additional Resources
4. (p11) Chapter 2 Introduction to FireWall-1
4.1. (p12) Defining Firewalls
4.2. (p13) Types of Attacks
4.2.1. (p14) Port Scanning
4.2.2. (p15) Denial of Service (DoS)
4.2.3. (p16) Impersonation
4.2.4. (p17) Man-in-the-Middle
4.3. (p18) Limitations of Firewalls
4.4. (p19) Firewall Methods
4.4.1. (p20) Packet Filtering
4.4.2. (p21) Application Layer Gateways (Proxies)
4.4.3. (p22) Stateful Inspection
4.5. (p23) Stateful Inspection and Fire Wall-1
4.6. (p24) Components of Fire Wall-1
4.6.1. (p25) The Firewall Module
4.6.2. (p26) The Management Module
4.7. (p27) Additional Check Point Products
4.7.1. (p28) VPN-1 Gateway
4.7.2. (p29) VPN-1 SecuRemote
4.7.3. (p30) FloodGate-1
4.7.4. (p31) Meta-IP
4.8. (p32) Other Advantages of FireWall-1
4.8.1. (p33) Network Address Translation (NAT)
4.8.2. (p34) Content Vectoring
4.8.3. (p35) Firewall Synchronization
4.8.4. (p36) Ease of Management
4.9. (p37) FireWall-1 Licensing
4.9.1. (p38) Determining the Number of Licenses Needed
4.9.2. (p39) Purchasing FireWall-1 Products
4.10. (p40) Practice Questions
4.11. (p41) Need to Know More?
5. (p42) Chapter 3 Installing and Configuring FireWall-1
5.1. (p43) Preinstallation Checklist
5.2. (p44) Installing FireWall-1 on a Windows NT Server
5.2.1. (p45) Choosing an Installation Type
5.2.2. (p46) Installing the Management Clients
5.2.3. (p47) Applying the License
5.2.4. (p48) Creating Administrators
5.2.5. (p49) Configuring the External Interface
5.2.6. (p50) Configuring GUI Clients
5.2.7. (p51) Specifying Remote Enforcement Modules
5.2.8. (p52) IP Forwarding
5.2.9. (p53) Key Hit Session
5.3. (p54) Uninstalling from Windows NT
5.4. (p55) Installing FireWall-1 on Solaris
5.4.1. (p56) Beginning the Installation
5.4.2. (p57) Post-Installation Steps
5.4.3. (p58) Installing the GUI Clients
5.4.4. (p59) Choosing and Licensing an Installation Type
5.4.5. (p60) Creating Administrators
5.4.6. (p61) Configuring GUI Clients
5.4.7. (p62) SMTP and SNMP Configuration
5.4.8. (p63) Configuring Groups
5.4.9. (p64) IP Forwarding
5.4.10. (p65) Key Hit Session
5.5. (p66) Uninstalling from Solaris
5.6. (p67) Distributed Installation
5.6.1. (p68) Choosing an Installation Type
5.6.2. (p69) Applying the License
5.6.3. (p70) Specifying Management Servers
5.6.4. (p71) IP Forwarding
5.6.5. (p72) High Availability
5.6.6. (p73) Installing the GUI Client and Management Module
5.6.7. (p74) Configuring the GUI Client and Management Module
5.6.8. (p75) Creating Administrators
5.6.9. (p76) Configuring GUI Clients
5.6.10. (p77) Specifying Remote Enforcement Modules
5.6.11. (p78) Key Hit Session
5.7. (p79) Practice Questions
5.8. (p80) Need to Know More?
6. (p81) Chapter 4 Implementing Network Objects
6.1. (p82) Managing Your Firewall
6.1.1. (p83) Developing a Color Scheme
6.1.2. (p84) Managing Objects
6.2. (p85) Managing Network Objects
6.2.1. (p86) Workstation Object
6.2.2. (p87) Defining a Workstation as a Gateway
6.3. (p88) Creating Network and Domain Objects
6.3.1. (p89) Network Objects
6.3.2. (p90) Domain Objects
6.4. (p91) Managing Communication Devices
6.4.1. (p92) Defining a Router
6.4.2. (p93) Defining a Switch
6.5. (p94) Creating Firewall Objects
6.6. (p95) Creating Group Objects
6.7. (p96) Configuring Logical Servers
6.8. (p97) Creating Address Range Objects
6.9. (p98) Practice Questions
6.10. (p99) Need to Know More?
7. (p100) Chapter 5 Other Management Objects
7.1. (p101) Services Manager
7.1.1. (p102) TCP Services
7.1.2. (p103) UDP Services
7.1.3. (p104) RPC Services
7.1.4. (p105) ICMP Services
7.1.5. (p106) Other Services
7.1.6. (p107) Group Services
7.1.7. (p108) Port Range Services
7.2. (p109) Resources Manager
7.2.1. (p110) URI Resources
7.2.2. (p111) SMTP Resources
7.2.3. (p112) FTP Resources
7.3. (p113) Server Manager
7.4. (p114) User Manager
7.4.1. (p115) Creating a User Template
7.4.2. (p116) Creating Users
7.4.3. (p117) Creating a Group
7.5. (p118) Time Manager
7.6. (p119) Key Manager
7.7. (p120) Practice Questions
7.8. (p121) Need to Know More?
8. (p122) Chapter 6 Designing a Rule Base
8.1. (p123) Creating a Security Policy
8.2. (p124) Using the Rule Base Wizard
8.3. (p125) Manually Configuring a Rule Base
8.3.1. (p126) The Stealth Rule
8.3.2. (p127) The Cleanup Rule
8.3.3. (p128) Implicit Rules
8.4. (p129) Verifying a Rule Base
8.5. (p130) Installing a Rule Base
8.6. (p131) Uninstalling a Rule Base
8.7. (p132) Practice Questions
8.8. (p133) Need to Know More?
9. (p134) Chapter 7 Administering the Rule Base
9.1. (p135) Configuring Firewall Properties
9.1.1. (p136) The Security Policy Tab
9.1.2. (p137) The Log And Alert Tab
9.1.3. (p138) The Security Servers Tab
9.1.4. (p139) The SYNDefender Tab
9.1.5. (p140) TheLDAPTab
9.1.6. (p141) The Connect Control Tab
9.1.7. (p142) The Remaining Properties Setup Tabs
9.2. (p143) IP Spoofing
9.3. (p144) Disabling Rules
9.4. (p145) Hiding Rules
9.5. (p146) Practice Questions
9.6. (p147) Need to Know More?
10. (p148) Chapter 8 Remote Administration and Firewall Synchronization
10.1. (p149) Understanding How Remote Management Works
10.1.1. (p150) Securing Remote Management
10.1.2. (p151) Remote Management Ports
10.1.3. (p152) Redundant Remote Management
10.2. (p153) Creating a Remote Security Policy
10.2.1. (p154) Adding Remote Rules to a Security Policy
10.2.2. (p155) Creating a New Rule Base
10.3. (p156) Synchronizing Firewall Modules
10.3.1. (p157) Routing
10.3.2. (p158) High Availability
10.3.3. (p159) Setting Up Synchronization in a Unix Environment
10.3.4. (p160) Setting Up Synchronization in a Windows NT Environment
10.3.5. (p161) Configuring Multiple Synchronized Connections
10.3.6. (p162) Synchronization Limitations
10.4. (p163) Practice Questions
10.5. (p164) Need to Know More?
11. (p165) Chapter 9 Network Address Translation
12. (p179) Chapter 10 Implementing Authentication and Encryption
13. (p195) Chapter 11 Monitoring and Performance Tuning
14. (p211) Chapter 12 Sample Test
15. (p212) Chapter 13 Answer Key
16. (p213) Glossary
17. (p214) Index
备用描述
Annotation This Exam Cram study guide covers one of the most rapidly growing certification programs in the industry-the CheckPoint Certified Security Administrator (CCSA) program, which requires candidates to pass the CCSA CP2000 exam. The book efficiently reviews key exam topics such as Firewall-1 system requirements and installation, various Firewall-1 configurations, GUI interface configuration and use, Network Address Translation rules, User Authentication, Encryption Schemes, Rule base efficiency, and the necessity of Network Address Translation. Includes proven features of the exclusive Exam Cram method of study with tips, tricks, and alerts, plus a special tear-out cram sheet and practice exam to provide all the necessary information and skills before taking the test
开源日期
2023-06-28
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。