You are on page 1of 1

CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA) R80.

10
WHO SHOULD ATTEND?
Technical professionals who support, install, deploy or administer Check Point Software Blades.
COURSE GOAL:
Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway
and Management Software Blades.
PREREQUISITES:
• General knowledge of TCP/IP
• Working knowledge of Windows and/or UNIX, network technology and the Internet

COURSE TOPICS COURSE OBJECTIVES


• Introduction to Check Point Technology • Interpret the concept of a Firewall and understand the
• Security Policy Management mechanisms used for controlling network traffic.
• Policy Layers • Describe the key elements of Check Point’s unified
• Check Point Security Solutions and Licensing Security Management Architecture.
• Traffic Visibility • Recognize SmartConsole features, functions and tools.
• Basic Concepts of VPN • Understand Check Point deployment options.
• Managing User Access • Describe the basic functions of Gaia.
• Working with ClusterXL • Describe the essential elements of a Security Policy.
• Administrator Task Implementation • Understand how traffic inspection takes place in a
unified Security Policy.
• Summarize how administration roles and permissions
LAB EXERCISES assist in managing policy.
• Working with Gaia Portal • Recall how to implement backup techniques.
• Modifying an Existing Security Policy • Understand the Check Point policy layer concept.
• Configuring Hide and Static NAT • Recognize Check Point security solutions and products
• Managing Administrator Access and how they work to protect your network.
• Installing and Managing a Remote Security Gateway • Understand licensing and contract requirements for
• Managing Backups Check Point security products.
• Defining Access Control Policy Layers • Identify tools designed to monitor data, determine
• Defining and Sharing Security Policy Layers threats and recognize performance improvements.
• Working with Licenses and Contracts • Identify tools designed to respond quickly and
• Working with Check Point Logs efficiently to changes in gateways, tunnels, remote
users, traffic flow patterns, and other activities.
• Maintaining Check Point Logs
• Understand Site-to-Site and Remote Access VPN
• Configuring a Site-to-Site VPN deployments and communities.
• Providing User Access • Understand how to analyze and interpret VPN traffic.
• Working with Cluster XL • Recognize how to define users and user groups.
• Verifying Network Compliance • Understand how to manage user access for internal
• Working with CP View and external users.
• Understand the basic concepts of ClusterXL

CCSA
CERTIFICATION technology and its advantages.
INFORMATION • Understand how to perform periodic administrator tasks
Prepare for exam #156-215.80 at VUE.com/checkpoint as specified in administrator job descriptions.

©2017 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content
March 9, 2017

You might also like