Date: 11/18/2024 - 11/22/2024 (Monday - Friday) | 10:00 AM - 6:00 PM (EST)
Location: ONLINE (Virtual Classroom Live)
Delivery Format: VIRTUAL CLASSROOM LIVE
Request Quote & Enroll
Check Point Cyber Security Administration and Security Engineering Bundle (R80.20 GAiA)
Check Point Cyber Security Administration and Security Engineering Bundle (R80.20 GAiA) Course Details:
This special CCSA and CCSE bundle covering Check Point Security Administration & Engineering (R80.10) provides you with an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.
CCSA-R80.10: The goal of this course is to provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.
CCSE-R80.10: The goal of this course is to provide an understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
Date: 12/02/2024 - 12/06/2024 (Monday - Friday) | 10:00 AM - 6:00 PM (EST)
Location: ONLINE (Virtual Classroom Live)
Delivery Format: VIRTUAL CLASSROOM LIVE
Request Quote & Enroll
Date: 12/16/2024 - 12/20/2024 (Monday - Friday) | 10:00 AM - 6:00 PM (EST)
Location: ONLINE (Virtual Classroom Live)
Delivery Format: VIRTUAL CLASSROOM LIVE
Request Quote & Enroll
CCSA Course Outline
- Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
- Describe the key elements of Check Point?s unified Security Management Architecture.
- Recognize SmartConsole features, functions and tools.
- Understand Check Point deployment options.
- Describe the basic functions of Gaia.
- Describe the essential elements of a Security Policy.
- Understand how traffic inspection takes place in a unified Security Policy.
- Summarize how administration roles and permissions assist in managing policy.
- Recall how to implement backup techniques.
- Understand the Check Point policy layer concept.
- Recognize Check Point security solutions and products and how they work to protect your network.
- Understand licensing and contract requirements for Check Point security products.
- Identify tools designed to monitor data, determine threats and recognize performance improvements.
- Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
- Understand Site-to-Site and Remote Access VPN deployments and communities.
- Understand how to analyze and interpret VPN traffic.
- Recognize how to define users and user groups.
- Understand how to manage user access for internal and external users.
- Understand the basic concepts of ClusterXL technology and its advantages.
- Understand how to perform periodic administrator tasks as specified in administrator job descriptions.
CCSE Course Outline
- Identify advanced CLI commands.
- Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes.
- Describe the Check Point Firewall infrastructure.
- Describe advanced methods of gathering important gateway data using CPView and CPInfo.
- Recognize how Check Point?s flexible API architecture supports automation and orchestration.
- Discuss advanced ClusterXL functions.
- Describe VRRP network redundancy advantages.
- Undersand how SecureXL acceleration technology is used to enhance and improve performance.
- Understand how CoreXL acceleration technology is used to enhance and improve performance.
- Identify the SmartEvent components that store network activity logs and identify events.
- Discuss the SmartEvent process that determines which network activities may lead to security issues.
- Understand how SmartEvent can assist in detecting, remediating, and preventing security threats.
- Discuss the Mobile Access Software Blace and how it secures communication and data.
- Understand Mobile Access deployment options.
- Recognize Check Point Remote Access solutions.
- Discuss Check Point Capsule components and how they protect mobile devices and business documents.
- Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.
- Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.
- Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets.
*Please Note: Course Outline is subject to change without notice. Exact course outline will be provided at time of registration.
Upon completion of this course, students are able to:
- Introduction to Check Point Technology
- Security Policy Management
- Policy Layers
- Check Point Security Solutions and Licensing
- Traffic Visibility
- Basic Concepts of VPN
- Managing User Access
- Working with ClusterXL
- Administrator Task Implementation
- System Management
- Automation and Orchestration
- Redundancy
- Acceleration
- SmartEvent
- Mobile and Remote Access
- Threat Prevention
CCSA Lab Exercises Include:
Lab 1: Working with Gaia Portal
Lab 2: Modifying an Existing Security Policy
Lab 3: Configuring Hide and Static NAT
Lab 4: Managing Administrator Access
Lab 5: Installing and Managing a Remote Security Gateway
Lab 6: Managing Backups
Lab 7: Defining Access Control Policy Layers Defining and Sharing Security Policy Layers
Lab 8: Working with Licenses and Contracts
Lab 9: Working with Check Point Logs
Lab 10: Maintaining Check Point Logs
Lab 11: Configuring a Site-to-Site VPN
Lab 12: Providing User Access
Lab 13: Working with Cluster XL
Lab 14: Verifying Network Compliance
Lab 15: Working with CP View
CCSE Lab Exercises Include:
Lab 16: Upgrading a Security Management Server to R80.10
Lab 17: Applying Check Point Hotfixes
Lab 18: Configuring a New Security Gateway Cluster
Lab 19: Core CLI Elements of Firewall Administration
Lab 20: Configuring Manual Network Address Translation
Lab 21: Managing Objects Using the Check Point API
Lab 22: Enabling Check Point VRRP
Lab 23: Deploying a Secondary Security Management Server
Lab 24: Viewing the Chain Modules
Lab 25: Working with SecureXL
Lab 26: Working with CoreXL
Lab 27: Evaluating Threats with SmartEvent
Lab 28: Managing Mobile Access
Lab 29: Understanding IPS Protections
Lab 30: Deploying IPS Geo Protection
Lab 31: Reviewing Threat Prevention Settings and Protections
Lab 32: Deploying Threat Emulation and Threat Extraction
- General knowledge of TCP/IP
- Working knowledge of Windows, UNIX, network technology, and the internet
Technical persons who support, install, deploy, or administer Check Point Software Blades, which includes:
- System administrators
- Support analysts
- Security managers
- Network engineers
- Anyone seeking CCSA certification and CCSE certification