You are on page 1of 1

CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA)

(Supported Versions: R80.10 and above)

WHO SHOULD ATTEND?


Technical professionals who support, install, deploy or administer Check Point Software Blades.
COURSE GOAL:
Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway
and Management Software Blades.
PREREQUISITES:
 General knowledge of TCP/IP
 Working knowledge of Windows and/or UNIX, network technology and the Internet

COURSE TOPICS COURSE OBJECTIVES


 Introduction to Check Point Technology  Interpret the concept of a Firewall and understand the
 Security Policy Management mechanisms used for controlling network traffic.
 Policy Layers  Describe the key elements of Check Point’s unified
 Check Point Security Solutions and Licensing Security Management Architecture.
 Traffic Visibility  Recognize SmartConsole features, functions and tools.
 Basic Concepts of VPN  Understand Check Point deployment options.
 Managing User Access  Describe the basic functions of Gaia.
 Working with ClusterXL  Describe the essential elements of a Security Policy.
 Administrator Task Implementation  Understand how traffic inspection takes place in a
unified Security Policy.
 Summarize how administration roles and permissions
LAB EXERCISES assist in managing policy.
 Working with Gaia Portal  Recall how to implement backup techniques.
 Modifying an Existing Security Policy  Understand the Check Point policy layer concept.
 Configuring Hide and Static NAT  Recognize Check Point security solutions and products
 Managing Administrator Access and how they work to protect your network.
 Installing and Managing a Remote Security Gateway  Understand licensing and contract requirements for
 Managing Backups Check Point security products.
 Defining Access Control Policy Layers  Identify tools designed to monitor data, determine
 Defining and Sharing Security Policy Layers threats and recognize performance improvements.
 Working with Licenses and Contracts  Identify tools designed to respond quickly and
efficiently to changes in gateways, tunnels, remote
 Working with Check Point Logs
users, traffic flow patterns, and other activities.
 Maintaining Check Point Logs
 Understand Site-to-Site and Remote Access VPN
 Configuring a Site-to-Site VPN deployments and communities.
 Providing User Access  Understand how to analyze and interpret VPN traffic.
 Working with Cluster XL  Recognize how to define users and user groups.
 Verifying Network Compliance  Understand how to manage user access for internal
 Working with CP View and external users.
 Understand the basic concepts of ClusterXL
technology and its advantages.

CCSA
 Understand how to perform periodic administrator tasks
CERTIFICATION as specified in administrator job descriptions.
INFORMATION
Prepare for exam #156-215.80 at VUE.com/checkpoint

©2019 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
November 15, 2019

You might also like