PHONE

+44 330 133 4431

SUPPORT

enquiries@ausarsec.com

Check Point Security Administration (CCSA)

£1,850.00 + VAT

Book online today or, if you need help choosing the right course or would like to discuss business discounts, call us on 0330 133 4431

Virtual Live Class
}

3 Days

Attend From Anywhere

R

All day

Who should take this course?

Any technical persons who support, install, deploy or administers check point software blades should be taking this course. The could include the following:

  • System administrators
  • Support analysts
  • Security managers
  • Network engineers
  • Anyone seeking CCSA certification

Please note, whilst this course aligns to many of the objectives of the Check Point CCSA exam candidates should have practical experience and undertake further self-study in order to be fully prepared for the certification

Course Overview

Prerequisites

  • General knowledge of TCP/IP
  • Working knowledge of Windows, UNIX, network technology, and the Internet

What you’ll learn in this Course?

  • How to Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
  • Describe the key elements of Check Point’s unified Security Management Architecture.
  • Recognize SmartConsole features, functions and tools.
  • Understand Check Point deployment options.
  • Describe the basic functions of Gaia.
  • Describe the essential elements of a Security Policy.
  • Understand how traffic inspection takes place in a unified Security Policy.
  • Summarize how administration roles and permissions assist in managing policy.
  • Recall how to implement backup techniques.
  • Understand the Check Point policy layer concept.
  • Recognize Check Point security solutions and products and how they work to protect your network.
  • Understand licensing and contract requirements for Check Point security products.
  • Identify tools designed to monitor data, determine threats and recognize performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
  • Understand Site-to-Site and Remote Access VPN deployments and communities.
  • Understand how to analyze and interpret VPN traffic.
  • Recognize how to define users and user groups.
  • Understand how to manage user access for internal and external users.
  • Understand the basic concepts of ClusterXL technology and its advantages.
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions.

Course Outline

Course Exercises

  • Introduction to Check Point Technology
  • Security Policy Management
  • Policy Layers
  • Check Point Security Solutions and Licensing
  • Traffic Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation

Lab Exercises

  • Working with Gaia Portal
  • Modifying an Existing Security Policy
  • Configuring Hide and Static NAT
  • Managing Administrator Access
  • Installing and Managing a Remote Security Gateway
  • Managing Backups
  • Defining Access Control Policy Layers
  • Defining and Sharing Security Policy Layers
  • Working with Licenses and Contracts
  • Working with Check Point Logs
  • Maintaining Check Point Logs
  • Configuring a Site-to-Site VPN
  • Providing User Access
  • Working with Cluster XL
  • Verifying Network Compliance
  • Working with CP View

Why choose Aursarsec

  • Our instructors make learning fun,
  • Years of cybersecurity experience
  • Years of training experience
  • Personalised experience
  • Dedicated labs
  • Read more about Ausarsec

Who should take this course?

Any technical persons who support, install, deploy or administers check point software blades should be taking this course. The could include the following:

  • System administrators
  • Support analysts
  • Security managers
  • Network engineers
  • Anyone seeking CCSA certification

Please note, whilst this course aligns to many of the objectives of the Check Point CCSA exam candidates should have practical experience and undertake further self-study in order to be fully prepared for the certification

Course Overview

Prerequisites

  • General knowledge of TCP/IP
  • Working knowledge of Windows, UNIX, network technology, and the Internet

What you’ll learn in this Course?

  • How to Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
  • Describe the key elements of Check Point’s unified Security Management Architecture.
  • Recognize SmartConsole features, functions and tools.
  • Understand Check Point deployment options.
  • Describe the basic functions of Gaia.
  • Describe the essential elements of a Security Policy.
  • Understand how traffic inspection takes place in a unified Security Policy.
  • Summarize how administration roles and permissions assist in managing policy.
  • Recall how to implement backup techniques.
  • Understand the Check Point policy layer concept.
  • Recognize Check Point security solutions and products and how they work to protect your network.
  • Understand licensing and contract requirements for Check Point security products.
  • Identify tools designed to monitor data, determine threats and recognize performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
  • Understand Site-to-Site and Remote Access VPN deployments and communities.
  • Understand how to analyze and interpret VPN traffic.
  • Recognize how to define users and user groups.
  • Understand how to manage user access for internal and external users.
  • Understand the basic concepts of ClusterXL technology and its advantages.
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions.

Course Outline

Course Exercises

  • Introduction to Check Point Technology
  • Security Policy Management
  • Policy Layers
  • Check Point Security Solutions and Licensing
  • Traffic Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation

Lab Exercises

  • Working with Gaia Portal
  • Modifying an Existing Security Policy
  • Configuring Hide and Static NAT
  • Managing Administrator Access
  • Installing and Managing a Remote Security Gateway
  • Managing Backups
  • Defining Access Control Policy Layers
  • Defining and Sharing Security Policy Layers
  • Working with Licenses and Contracts
  • Working with Check Point Logs
  • Maintaining Check Point Logs
  • Configuring a Site-to-Site VPN
  • Providing User Access
  • Working with Cluster XL
  • Verifying Network Compliance
  • Working with CP View

Why choose Aursarsec

  • Our instructors make learning fun,
  • Years of cybersecurity experience
  • Years of training experience
  • Personalised experience
  • Dedicated labs
  • Read more about Ausarsec