- Introduction to the Check Point Solution
- Introduction to the Check Point Solution
- Deploying Check Point Security Management
- Configuring and deploying a Security Management Server
- Deploying Check Point Security Gateways
- Configuring and deploying a Security Gateway (firewall)
- Creating a Security Policy
- Logs and Monitoring
- How to access security logs and monitor your Check Point deployment
- Support, Documentation, and Training
- Additional resources for learning how to configure, manage, and monitor your Check Point deployment