Check Point Certified Security Administrator Training | Check Point CCSA-R80 Training

Check Point Certified Security Administrator Training | Check Point CCSA-R80 Training

Introduction:

Check Point Certified Security Administrator Training | Check Point CCSA-R80 Training Course Description

Today, managing security is a complex endeavor, making it more important to consolidate. With R80 management, security consolidation is fully realized. This three-day Check Point Certified Security Administrator Training | Check Point CCSA-R80 Training course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience/Target Group

This course is recommended for technical professionals, who support, install, deploy or administer Check Point Software Blades.

Check Point Certified Security Administrator Training | Check Point CCSA-R80 TrainingRelated Courses:

Duration: 3 days

What You Will Learn:

Describe the key elements of Check Point?s unified, secure management architecture
Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic
Recognize SmartConsole features and functions
Understand Check Point deployment options
Describe the basic functions of the Gaia OS
Describe the elements of a unified security policy
Understand how traffic inspection takes place in a unified security policy
Summarize how administration roles and permissions assist in managing policy
Implement Check Point backup techniques
Recognize Check Point Security Solutions and Products and how they work to protect your network
Understand licensing and contract requirements for Check Point security products
Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities
Understand Site-to-Site and Remote Access VPN deployments and VPN communities
Understand how to analyze and interpret VPN tunnel traffic
Recognize how to define users and user groups
Manage user access for internal and external users
Understand the basic concepts of ClusterXL technology and its advantages
Understand how to perform periodic administrator tasks as specified in administrator job descriptions

Course Content:

Modules:

Introduction to Check Point Technology
Security Policy Management
Check Point Security Solutions and Licensing
Traffic Visibility
Basic Concepts of VPN
Managing User Access
Working with ClusterXL
Administrator Task ImplementationUnified Gateway

Labs:

Defining roles and users in Gaia Portal
Installing and navigating SmartConsole
Configuring objects, rules, and settings to define a Security Policy
Publishing database changes
Installing and managing a remote Security Gateway
Performing Hide and Static Network Address Translation
Configuring Application Control and URL filtering Access Control policy layers
Working with multiple concurrent Administrators and testing permissions profiles
Working with Check Point licenses
Viewing and maintaining logs
Configuring a Virtual Private Network
Providing User Access
Working with Check Point clustering
Producing Check Point reports

Request More Information

Time Frame: 0-3 Months4-12 Months

Print Friendly, PDF & Email

No Comments Yet.

Leave a comment