WHO SHOULD ATTEND?
Technical professionals who support, install, deploy, or manage Check Point CloudGuard IaaS solutions within their security environment.

COURSE GOAL:
Provide an understanding of the basic concepts and skills necessary to configure and deploy Check Point CloudGuard IaaS products in public cloud platforms such as Microsoft Azure, Amazon Web Services
(AWS), and Google Cloud Platform.

PREREQUISITES:
Check Point CCSA training/certification

COURSE TOPICS
• Understanding Cloud Fundamentals
• Introducing CloudGuard Protections
• Deploying CloudGuard
• CloudGuard Security Policy
• Automating CloudGuard Protections
• Dome9 Security for IaaS Cloud Infrastructure

LAB EXERCISES
• Build Azure Virtual Networks with CloudGuard Protections
• Build an AWS Cloud with CloudGuard Security
• Automate CloudGuard Protections in Azure
• Configure a Transit VPC

Examkingdom 156-560 exam objectives Exam pdf,

MCTS Training, MCITP Trainnig

Best Check Point 156-560 Free downloads , Check Point 156-560 dumpsDumps at Certkingdom.com

COURSE OBJECTIVES:
• Explain cloud network functions, service models, and deployment options.
• Identify CloudGuard’s primary components that protect cloud environments and datacenters.
• Understand the key elements and basic concepts of the Secure Public Cloud Blueprint.
• Describe the deployment options available for CloudGuard IaaS instances.
• Recall the general troubleshooting resources and the misconfiguration issues that impact CloudGuard deployments.
• Recognize the security policy layers and security object settings used in cloud security configurations.
• Learn how to create an adaptive Security Policy with a cloud-context aware rulebase.
• Understand the process of automating Security Policy enforcement on Security Gateways.
• Recognize the types of cloud automation resources that support adaptive security protections.
• Describe the cloud components and methods that support autoprovisioning CloudGuard instances.
• Describe the Dome9 SaaS protections available for IaaS public cloud infrastructures.
• Understand how to define users, build Security Policy, and configure system logging and alerts.
• Learn how to control network security access within public cloud environments.
• Identify the reports that find non-compliant cloud resources in public cloud accounts.
• Know which tools provide automated remediations to non-compliant cloud resources.
• Understand how to use cloud analytics to improve the visibility of a cloud account’s security status.

Question: 1
Which of the following is the Customer’s Responsibility in the shared responsibility model used in the cloud?

A. Customer Employee Training
B. Infrastructure Patching
C. Physical and Environment Controls
D. Infrastructure Configuration

Answer: A

Explanation:
Customer Responsibilities: Customers are responsible for the data in their cloud (OS, updates,
security patches, data integrity of their apps, encryption, assent classficiation, IAM
> Guest OS and Application Patching and Configuration
> Customer Emploeyee Training
> Service, Communication and Data Security

Question: 2
Which of the following is a common limitation of cloud platforms?

A. Network address translations
B. Custom Route Tables
C. Identity and Access Management
D. Packet Forwarding

Answer: A

Question: 3
Which Pillar includes the following principals
• Experiment more often
• Go Global in minutes-
• Use serverless architectures

A. Reliability
B. Cost Optimization
C. Performance Efficiency
D. Operational Excellence

Answer: C

Click to rate this post!
[Total: 0 Average: 0]
News Reporter