CCSA: Check Point Security Administration (R77.30 GAiA)

CCSA: Check Point Security Administration (R77.30 GAiA) Course Description

Duration: 3.00 days (24 hours)

Check Point Security Administration (R77.30 GAiA) provides you with an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. During this course, you will configure a Security Policy and learn about managing and monitoring a secure network, upgrading and configuring a Security Gateway, and implementing a virtual private network.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this CCSA: Check Point Security Administration (R77.30 GAiA) Course

  • » This course is recommended for Systems Administrators, Support Analysts, Security Engineers, Network Engineers and any other IT professional seeking CCSA certification

Back to Top

This Course is also part of:

Back to Top

CCSA: Check Point Security Administration (R77.30 GAiA) Course Objectives

  • » Introduction to check point technology
  • » Deployment platforms
  • » Introduction to the security policy
  • » Monitoring traffic and connections
  • » Using SmartUpdate
  • » User management and authentication
  • » Identity awareness
  • » Introduction to Check Point VPNs

Back to Top

CCSA: Check Point Security Administration (R77.30 GAiA) Course Outline

      1. Describe Check Point's unified approach to network management and its key elements
      2. Design a distributed environment
      3. Install the Security Gateway in a distributed environment
      4. Perform a backup and restore the current Gateway installation from the command line
      5. Identify critical files needed to purge (or backup), import and export users and groups, and add (or delete) administrators from the command line
      6. Deploy Gateways using the Gaia web interface
      7. Create and configure network, host, and gateway objects
      8. Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard
      9. Create a basicRule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use
      10. Configure NAT rules on Web and Gateway servers
      11. Evaluate existing policies and optimize the rules based on corporate requirements
      12. Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime
      13. Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data
      14. Use packet data to generate reports, troubleshoot system and security issues, and ensure network functionality
      15. Using SmartView Monitor, configure alerts and traffic counters, view a Gateway's status, monitor suspicious activity rules, analyze tunnel activity, and monitor remote user access
      16. Monitor remote gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications
      17. Use SmartUpdate to apply upgrade packages to single or multiple VPN-1Gateways
      18. Upgrade and attach product licenses using SmartUpdate
      19. Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
      20. Manage users to access the corporate LAN by using external databases
      21. Use Identity Awareness to provide granula- level access to network resources
      22. Acquire user information used by the Security Gateway to control access
      23. Define access roles for use in an Identity Awareness rule
      24. Implement Identity Awareness in the Firewall Rule Base
      25. Configure a pre-shared secret site-to-site VPN with partner sites
      26. Configure permanent tunnels for remote access to corporate resources
      27. Configure VPN tunnel sharing, given the difference between host-based, subunit-based, and gateway- based tunnels
      28. Labs
        1. Distributed Installations
        2. Stand-alone Security Gateway Installations
        3. Common Tools
        4. Building a Security Policy Lab 5: Configure the DMZ
        5. Configure NAT
        6. Monitor with SmartView Tracker Lab 8: Client Authentication
        7. Identity Awareness
        8. Site-to-Site VPN between corporate and branch office

Back to Top

This training prepares students for the following exam(s):

  • » 156-215.77 : CCSA: Check Point Certified Security Administrator

Back to Top

Do you have the right background for CCSA: Check Point Security Administration (R77.30 GAiA)?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Michael G.
- Over 22 years of professional experience in the IT field, including more than a decade as a Certified Trainer.
- An expert in Cisco's Routing, Switching, Security, Voice and Wireless areas, as well as select Microsoft, Novell, CompTIA, Sun and CWNP courses.
- High-skilled and acclaimed instructor. Has trained over 900 students at Netcom Learning.


Michael has over 22 years of professional experience in the IT field, including more than a decade as a Certified Trainer. An expert in Cisco's Routing, Switching, Security, Voice and Wireless areas, Michael also teaches select Microsoft, Novell, CompTIA, Sun and CWNP courses.

Michael's dedication and passion for teaching is unmatched. He has trained over 900 students at Netcom Learning since 2006 and his evaluation scores average 8.7 out of 9.
Richard L.
- Over 20 years experience in the IT industry.
- CEH and Microsoft training for many government agencies, including the United States Department of Homeland Security, and the Federal Bureau of Investigation.
- CEH and Microsoft training for Fortune corporations such as Merrill Lynch and ADP.


Richard is a premier Microsoft Certified Trainer and Certified EC-Council Instructor. He has over 20 years of experience as a network administrator, security consultant, vulnerability assessor, and penetration tester for assorted Fortune companies.

Richard??s knowledge on the development and implementation of policies and procedures concerning the security of network data is unsurpassed. He has conducted successful CEH and Microsoft training classes for many government agencies including the United States Department of Homeland Security, the Department of Justice and the Federal Bureau of Investigation, as well as Fortune enterprises such as Merrill Lynch and ADP.

See more...   See more instructors...

Back to Top

Recent Client Testimonials & Reviews

I want to express to you the delight it has been partnering with Rob, our educational consultant, on these 3 key education tracks for my team (Juniper, f5, Checkpoint). I had the liberty of sitting through the original week of Juniper training and experienced first hand the caliber of instructor/course material that Rob secured on our behalf. I was not able to attend the f5 training personally but received like reviews from my team. All in all I found the instruction was top notch, on topic and well delivered and am looking forward to the f5 training in the upcoming weeks.

From the inception Rob was pivotal in understanding our unique requirements and drafted a training schedule that was right on par for our needs. His attention to detail and willingness to understand our requirements directly attested to the successful training we have received. There is no denying that we faced some challenges throughout this engagement but I can say I am truly fortunate to of had Rob on the other side working through the issues. His sense of urgency, constant communication and professionalism were a godsend to say the least. The level of confidence and acumen protruded by Rob was unmatched by the other vendors and put my concerns at ease throughout the process. I wanted to personally thank you for providing such a talented professional such as Rob to this engagement and reiterate my thanks for having such within your employ.

-Leon C.

Course(s) Taken

» Check Point R75

  More testimonials »  

Back to Top