Check Point Certified Security Administrator Training | Check Point CCSA-R80 Training

classroom Live training locations in Canada onsite training virtual training live
Classroom Live Online Live Onsite Training Self-Paced

Check Point Certified Security Administrator Training | Check Point CCSA-R80 Training

Introduction:

Check Point Certified Security Administrator Training | Check Point CCSA-R80 Training

Check Point Certified Security Administrator Training | Check Point CCSA-R80 Training Course Description

Today, managing security is a complex endeavor, making it more important to consolidate. With R80 management, security consolidation is fully realized. This three-day Check Point Certified Security Administrator Training | Check Point CCSA-R80 Training course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80.

Duration

3 days

Who Should Attend

This course is recommended for technical professionals, who support, install, deploy or administer Check Point Software Blades.

What You Will Learn

Describe the key elements of Check Point?s unified, secure management architecture
Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic
Recognize SmartConsole features and functions
Understand Check Point deployment options
Describe the basic functions of the Gaia OS
Describe the elements of a unified security policy
Understand how traffic inspection takes place in a unified security policy
Summarize how administration roles and permissions assist in managing policy
Implement Check Point backup techniques
Recognize Check Point Security Solutions and Products and how they work to protect your network
Understand licensing and contract requirements for Check Point security products
Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities
Understand Site-to-Site and Remote Access VPN deployments and VPN communities
Understand how to analyze and interpret VPN tunnel traffic
Recognize how to define users and user groups
Manage user access for internal and external users
Understand the basic concepts of ClusterXL technology and its advantages
Understand how to perform periodic administrator tasks as specified in administrator job descriptions

Course Outline

Modules:

Introduction to Check Point Technology
Security Policy Management
Check Point Security Solutions and Licensing
Traffic Visibility
Basic Concepts of VPN
Managing User Access
Working with ClusterXL
Administrator Task ImplementationUnified Gateway

Labs:

Defining roles and users in Gaia Portal
Installing and navigating SmartConsole
Configuring objects, rules, and settings to define a Security Policy
Publishing database changes
Installing and managing a remote Security Gateway
Performing Hide and Static Network Address Translation
Configuring Application Control and URL filtering Access Control policy layers
Working with multiple concurrent Administrators and testing permissions profiles
Working with Check Point licenses
Viewing and maintaining logs
Configuring a Virtual Private Network
Providing User Access
Working with Check Point clustering
Producing Check Point reports

Whether you are looking for general information or have a specific question, we want to help

Request More Information

Time Frame: 0-3 Months4-12 Months

Location

If multiple locations, please list in the additional comments field.

On-site
Virtual


Public Training Schedule
Private Group Training

Print Friendly, PDF & Email