Check Point Certified Security Administrator (CCSA) and Expert (CCSE) R81.20 5-day Boot Camp (includes 180 days' lab access) [ARR_CKT_CCSAEBC_R81_20]
Starting dates and places
placeArrow ECS - London 25 Nov 2024 until 29 Nov 2024 |
placeArrow ECS - Virtual 25 Nov 2024 until 29 Nov 2024 |
Description
OVERVIEW
The Check Point Cybersecurity Boot Camp is a fast-paced course intended for Security Experts and other technical professionals with prior training and/or practical experience with Check Point Security Management Servers and Security Gateways running on the Gaia operating system.
This course is not for new users to Check Point – previous certification/experience is recommended.
Learn basic and advanced concepts and develop skills necessary to administer IT security fundamental and intermediate tasks.
OBJECTIVES
Security Administrator (CCSA)
• Describe the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
• …
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
OVERVIEW
The Check Point Cybersecurity Boot Camp is a fast-paced course intended for Security Experts and other technical professionals with prior training and/or practical experience with Check Point Security Management Servers and Security Gateways running on the Gaia operating system.
This course is not for new users to Check Point – previous certification/experience is recommended.
Learn basic and advanced concepts and develop skills necessary
to administer IT security fundamental and intermediate
tasks.
OBJECTIVES
Security Administrator (CCSA)
• Describe the primary components of a Check Point Three-Tier
Architecture and explain how they work together in the Check Point
environment.
• Identify the basic workflow to install Security Management Server and Security Gateway for a single-domain solution.
• Create SmartConsole objects that correspond to the organization’s topology for use in policies and rules.
• Identify the tools available to manage Check Point licenses and contracts, including their purpose and use.
• Identify features and capabilities that enhance the configuration and management of the Security Policy.
• Demonstrate an understanding of Application Control & URL Filtering and Autonomous Threat Prevention capabilities and how to configure these solutions to meet an organization’s security requirements.
• Describe how to analyze and interpret VPN tunnel traffic.
• Identify how to monitor the health of supported Check Point hardware using the Gaia Portal and the command line.
• Describe the different methods for backing up Check Point system information and discuss best practices and recommendations for each method.
Security Expert (CCSE)
• Identify the types of technologies that Check Point supports
for automation.
• Explain the purpose of the Check Management High Availability (HA) deployment.
• Explain the basic concepts of Clustering and ClusterXL, including protocols, synchronization, and connection stickyness.
• Explain the purpose of dynamic objects, updatable objects, and network feeds.
• Describe the Identity Awareness components and configurations.
• Describe different Check Point Threat Prevention solutions.
• Articulate how the Intrusion Prevention System is configured.
• Explain the purpose of Domain-based VPNs.
• Describe situations where externally managed certificate authentication is used.
• Describe how client security can be provided by Remote Access.
• Discuss the Mobile Access Software Blade.
• Define performance tuning solutions and basic configuration workflow.
• Identify supported upgrade methods and procedures for Security Gateways.
AUDIENCE
Technical professionals who support, administer, or perform advanced deployment configurations of Check Point products.
CERTIFICATION
Prepare for exams #156-215.81.20 and #156-315.81.20 at www.VUE.com/checkpoint
Exam vouchers are available at an additional cost - please ask
for details.
Full information on Check Point’s Certification Program can be
viewed at
https://www.checkpoint.com/downloads/training/check-point-certification-faq.pdf
NEXT STEP
Attend two Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master (CCSM).
Attend four Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master Elite (CCSM Elite).
• Check Point Certified Endpoint Specialist (CCES)
• Check Point Certified Troubleshooting Administrator (CCTA)
• Check Point Certified Automation Specialist (CCAS)
• Check Point Certified Cloud Specialist (CCCS)
• Check Point Certified MDSM Specialist (CCMS)
• Check Point Certified VSX Specialist (CCVS)
• Check Point Certified Troubleshooting Expert (CCTE)
• Check Point Certified Maestro Expert (CCME)
• Check Point Certified Cloud Network Security Expert for AWS (CNSE-AWS)
• Check Point Certified Cloud Network Security Expert for Azure (CNSE-AZURE)
CONTENT
Topics:
• Security Management
• SmartConsole
• Deployment
• Object Management
• Licenses and Contracts
• Policy Rules and Rulebase
• Policy Packages
• Policy Layers
• Traffic Inspection
• Network Address Translation
• Application Control
• URL Filtering
• Logging
• Snapshots
• Backup and Restore
• Gaia
• Permissions
• Policy Installation
• Advanced Deployments
• Management High Availability
• Advanced Gateway Deployment
• Advanced Policy Configuration
• Advanced User Access Management
• Custom Threat Protection
• Advanced Site-to-Site VPN
• Remote Access VPN
• Mobile Access VPN
• Advanced Security Monitoring
• Performance Tuning
• Advanced Security Maintenance
Security Administrator (CCSA)
• Deploy SmartConsole
• Install a Security Management Server
• Install a Security Gateway
• Configure Objects in SmartConsole
• Establish Secure Internal Communication
• Manage Administrator Access
• Manage Licenses
• Create a Security Policy
• Configure Order Layers
• Configure a Shared Inline Layer
• Configure NAT
• Integrate Security with a Unified Policy
• Elevate Security with Autonomous Threat Prevention
• Configure a Locally Managed Site-to-Site VPN
• Elevate Traffic View
• Monitor System States
• Maintain the Security Environment
Security Expert (CCSE)
• Navigate the Environment and Use the Management API
• Deploy Secondary Security Management Server
• Configure a Dedicated Log Server
• Deploy SmartEvent
• Configure a High Availability Security Gateway Cluster
• Work with ClusterXL
• Configure Dynamic and Updateable Objects
• Verify Accelerated Policy Installation and Monitoring Status
• Elevate Security with HTTPS Inspection
• Deploy Identity Awareness
• Customize Threat Prevention
• Configure a Site-to-Site VPN with an Interoperable Device
• Deploy Remote Access VPN
• Configure Mobile Access VPN
• Monitor Policy Compliance
• Report SmartEvent Statistics
• Tune Security Gateway Performance
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.