CCSA+CCSE: Check Point Cyber Security Administrator and Engineering Bundle (R80.10)Newly Released

CCSA+CCSE: Check Point Cyber Security Administrator and Engineering Bundle (R80.10) Course Description

Duration: 5.00 days (40 hours)

Price: $5,000.00

CCSA+CCSE: Check Point Cyber Security Administrator and Engineering Bundle (R80.10) course covering Check Point Security Administration & Engineering (R80.10) provides you with an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

CCSA-R80.10: The goal of this course is to provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

CCSE-R80.10: The goal of this course is to provide an understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this CCSA+CCSE: Check Point Cyber Security Administrator and Engineering Bundle (R80.10) Course

  • » This special combo or bundle course is recommended for Systems Administrators, Network Engineers, Security Managers, Support Analysts and any other IT professional working with Check Point Software Blades or seeking CCSA and CCSE certifications.

Back to Top

CCSA+CCSE: Check Point Cyber Security Administrator and Engineering Bundle (R80.10) Course Objectives

  • » Introduction to Check Point Technology
  • » Security Policy Management
  • » Policy Layers
  • » Check Point Security Solutions and Licensing
  • » Traffic Visibility
  • » Basic Concepts of VPN
  • » Managing User Access
  • » Working with ClusterXL
  • » Administrator Task Implementation
  • » System Management
  • » Automation and Orchestration
  • » Redundancy
  • » Acceleration
  • » SmartEvent
  • » Mobile and Remote Access
  • » Threat Prevention

Back to Top

CCSA+CCSE: Check Point Cyber Security Administrator and Engineering Bundle (R80.10) Course Outline

      1. CCSA
        1. Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
        2. Describe the key elements of Check Point?s unified Security Management Architecture.
        3. Recognize SmartConsole features, functions and tools.
        4. Understand Check Point deployment options.
        5. Describe the basic functions of Gaia.
        6. Describe the essential elements of a Security Policy.
        7. Understand how traffic inspection takes place in a unified Security Policy.
        8. Summarize how administration roles and permissions assist in managing policy.
        9. Recall how to implement backup techniques.
        10. Understand the Check Point policy layer concept.
        11. Recognize Check Point security solutions and products and how they work to protect your network.
        12. Understand licensing and contract requirements for Check Point security products.
        13. Identify tools designed to monitor data, determine threats and recognize performance improvements.
        14. Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
        15. Understand Site-to-Site and Remote Access VPN deployments and communities.
        16. Understand how to analyze and interpret VPN traffic.
        17. Recognize how to define users and user groups.
        18. Understand how to manage user access for internal and external users.
        19. Understand the basic concepts of ClusterXL technology and its advantages.
        20. Understand how to perform periodic administrator tasks as specified in administrator job descriptions.
        21. Labs
          1. Working with Gaia Portal
          2. Modifying an Existing Security Policy
          3. Configuring Hide and Static NAT
          4. Managing Administrator Access
          5. Installing and Managing a Remote Security Gateway
          6. Managing Backups
          7. Defining Access Control Policy Layers Defining and Sharing Security Policy Layers
          8. Working with Licenses and Contracts
          9. Working with Check Point Logs
          10. Maintaining Check Point Logs
          11. Configuring a Site-to-Site VPN
          12. Providing User Access
          13. Working with Cluster XL
          14. Verifying Network Compliance
          15. Working with CP View
      2. CCSE
        1. Identify advanced CLI commands.
        2. Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes.
        3. Describe the Check Point Firewall infrastructure.
        4. Describe advanced methods of gathering important gateway data using CPView and CPInfo.
        5. Recognize how Check Point?s flexible API architecture supports automation and orchestration.
        6. Discuss advanced ClusterXL functions.
        7. Describe VRRP network redundancy advantages.
        8. Undersand how SecureXL acceleration technology is used to enhance and improve performance.
        9. Understand how CoreXL acceleration technology is used to enhance and improve performance.
        10. Identify the SmartEvent components that store network activity logs and identify events.
        11. Discuss the SmartEvent process that determines which network activities may lead to security issues.
        12. Understand how SmartEvent can assist in detecting, remediating, and preventing security threats.
        13. Discuss the Mobile Access Software Blace and how it secures communication and data.
        14. Understand Mobile Access deployment options.
        15. Recognize Check Point Remote Access solutions.
        16. Discuss Check Point Capsule components and how they protect mobile devices and business documents.
        17. Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.
        18. Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.
        19. Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets.
        20. Labs
          1. Upgrading a Security Management Server to R80.10
          2. Applying Check Point Hotfixes
          3. Configuring a New Security Gateway Cluster
          4. Core CLI Elements of Firewall Administration
          5. Configuring Manual Network Address Translation
          6. Managing Objects Using the Check Point API
          7. Enabling Check Point VRRP
          8. Deploying a Secondary Security Management Server
          9. Viewing the Chain Modules
          10. Working with SecureXL
          11. Working with CoreXL
          12. Evaluating Threats with SmartEvent
          13. Managing Mobile Access
          14. Understanding IPS Protections
          15. Deploying IPS Geo Protection
          16. Reviewing Threat Prevention Settings and Protections
          17. Deploying Threat Emulation and Threat Extraction

Back to Top

Do you have the right background for CCSA+CCSE: Check Point Cyber Security Administrator and Engineering Bundle (R80.10)?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Michael G.
- Over 22 years of professional experience in the IT field, including more than a decade as a Certified Trainer.
- An expert in Cisco's Routing, Switching, Security, Voice and Wireless areas, as well as select Microsoft, Novell, CompTIA, Sun and CWNP courses.
- High-skilled and acclaimed instructor. Has trained over 900 students at Netcom Learning.

Bio:

Michael has over 22 years of professional experience in the IT field, including more than a decade as a Certified Trainer. An expert in Cisco's Routing, Switching, Security, Voice and Wireless areas, Michael also teaches select Microsoft, Novell, CompTIA, Sun and CWNP courses.

Michael's dedication and passion for teaching is unmatched. He has trained over 900 students at Netcom Learning since 2006 and his evaluation scores average 8.7 out of 9.
Richard L.
- Over 20 years experience in the IT industry.
- CEH and Microsoft training for many government agencies, including the United States Department of Homeland Security, and the Federal Bureau of Investigation.
- CEH and Microsoft training for Fortune corporations such as Merrill Lynch and ADP.

Bio:

Richard is a premier Microsoft Certified Trainer and Certified EC-Council Instructor. He has over 20 years of experience as a network administrator, security consultant, vulnerability assessor, and penetration tester for assorted Fortune companies.

Richard??s knowledge on the development and implementation of policies and procedures concerning the security of network data is unsurpassed. He has conducted successful CEH and Microsoft training classes for many government agencies including the United States Department of Homeland Security, the Department of Justice and the Federal Bureau of Investigation, as well as Fortune enterprises such as Merrill Lynch and ADP.

See more...   See more instructors...

Back to Top

Recent Client Testimonials & Reviews

I want to express to you the delight it has been partnering with Rob, our educational consultant, on these 3 key education tracks for my team (Juniper, f5, Checkpoint). I had the liberty of sitting through the original week of Juniper training and experienced first hand the caliber of instructor/course material that Rob secured on our behalf. I was not able to attend the f5 training personally but received like reviews from my team. All in all I found the instruction was top notch, on topic and well delivered and am looking forward to the f5 training in the upcoming weeks.

From the inception Rob was pivotal in understanding our unique requirements and drafted a training schedule that was right on par for our needs. His attention to detail and willingness to understand our requirements directly attested to the successful training we have received. There is no denying that we faced some challenges throughout this engagement but I can say I am truly fortunate to of had Rob on the other side working through the issues. His sense of urgency, constant communication and professionalism were a godsend to say the least. The level of confidence and acumen protruded by Rob was unmatched by the other vendors and put my concerns at ease throughout the process. I wanted to personally thank you for providing such a talented professional such as Rob to this engagement and reiterate my thanks for having such within your employ.

-Leon C.

Course(s) Taken

» Check Point R75

  More testimonials »  

Back to Top

Ways to contact us

Back to Top