Check Point Certified Security Expert (CCSE) R81.20 (includes 180 days' lab access) [ARR_CKT_CCSE_R81_20]

Total time
Location
At location
Starting date and place

Check Point Certified Security Expert (CCSE) R81.20 (includes 180 days' lab access) [ARR_CKT_CCSE_R81_20]

Global Knowledge Network Training Ltd.
Logo Global Knowledge Network Training Ltd.
Provider rating: starstarstarstarstar_border 7.5 Global Knowledge Network Training Ltd. has an average rating of 7.5 (out of 2 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places

placeArrow ECS - Virtual
7 Apr 2025 until 9 Apr 2025
placeArrow ECS - Virtual
28 Apr 2025 until 30 Apr 2025
placeArrow ECS - Virtual
7 May 2025 until 9 May 2025
placeArrow ECS - Virtual
19 May 2025 until 21 May 2025
placeArrow ECS - London
2 Jun 2025 until 4 Jun 2025
placeArrow ECS - Virtual
2 Jun 2025 until 4 Jun 2025
placeArrow ECS - Virtual
16 Jun 2025 until 18 Jun 2025
placeArrow ECS - Virtual
30 Jun 2025 until 2 Jul 2025
placeArrow ECS - Virtual
14 Jul 2025 until 16 Jul 2025
placeArrow ECS - Virtual
28 Jul 2025 until 30 Jul 2025
placeArrow ECS - Virtual
11 Aug 2025 until 13 Aug 2025
placeArrow ECS - Virtual
1 Sep 2025 until 3 Sep 2025
placeArrow ECS - London
22 Sep 2025 until 24 Sep 2025
placeArrow ECS - Virtual
22 Sep 2025 until 24 Sep 2025
placeArrow ECS - Virtual
13 Oct 2025 until 15 Oct 2025
placeArrow ECS - Virtual
3 Nov 2025 until 5 Nov 2025
placeArrow ECS - London
24 Nov 2025 until 26 Nov 2025
placeArrow ECS - Virtual
24 Nov 2025 until 26 Nov 2025
placeArrow ECS - Virtual
15 Dec 2025 until 17 Dec 2025

Description

OVERVIEW

This core course covers the fundamentals needed to deploy, configure, and manage daily operations of Check Point Security Gateways and Management Software Blades that run on the Gaia operating system.

Learn advanced concepts and develop skills necessary to design, deploy, and upgrade Check Point Security environments.

OBJECTIVES

• Identify basic interfaces used to manage the Check Point environment. 

• Identify the types of technologies that Check Point supports for automation. 

• Explain the purpose of the Check Management High Availability (HA) deployment. 

• Identify the workflow followed to deploy a Primary and solution Secondary servers.  

• Explain the basic concepts of Cluste…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Check Point, Security, CompTIA A+ / Network+ / Security+, Internet Security, and IT Security.

OVERVIEW

This core course covers the fundamentals needed to deploy, configure, and manage daily operations of Check Point Security Gateways and Management Software Blades that run on the Gaia operating system.

Learn advanced concepts and develop skills necessary to design, deploy, and upgrade Check Point Security environments.

OBJECTIVES

• Identify basic interfaces used to manage the Check Point environment. 

• Identify the types of technologies that Check Point supports for automation. 

• Explain the purpose of the Check Management High Availability (HA) deployment. 

• Identify the workflow followed to deploy a Primary and solution Secondary servers.  

• Explain the basic concepts of Clustering and ClusterXL, including protocols, synchronization, connection stickyness. 

• Identify how to exclude services from synchronizing or delaying synchronization. 

• Explain the policy installation flow. 

• Explain the purpose of dynamic objects, updatable objects, and network feeds. 

• Understand how to manage user access for internal and external users.

• Describe the Identity Awareness components and configurations. 

• Describe different Check Point Threat Prevention solutions. 

• Articulate how the Intrusion Prevention System is configured. 

• Obtain knowledge about Check Point’s IoT Protect. 

• Explain the purpose of Domain-based VPNs. 

• Describe situations where externally managed certificate authentication is used. 

• Describe how client security can be provided by Remote Access. 

• Discuss the Mobile Access Software Blade. 

• Explain how to determine if the configuration is compliant with the best practices. 

• Define performance tuning solutions and basic configuration workflow. 

• Identify supported upgrade and migration methods and procedures for Security Management Servers and dedicated Log and SmartEvent Servers. 

• Identify supported upgrade methods and procedures for Security Gateways.


AUDIENCE

Technical Professionals who architect, upgrade, maintain, and support Check Point products.


CERTIFICATION

Prepare for exam #156-315.81.20 at www.VUE.com/checkpoint

Exam vouchers are available at an additional cost - please ask for details.

Full information on Check Point’s Certification Program can be viewed at https://www.checkpoint.com/downloads/training/check-point-certification-faq.pdf


NEXT STEP

Attend two Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master (CCSM).

Attend four Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master Elite (CCSM Elite).

•Check Point Certified Endpoint Specialist (CCES)

•Check Point Certified Troubleshooting Administrator (CCTA)

•Check Point Certified Automation Specialist (CCAS)

•Check Point Certified Cloud Specialist (CCCS)

•Check Point Certified MDSM Specialist (CCMS) 

•Check Point Certified VSX Specialist (CCVS)

•Check Point Certified Troubleshooting Expert (CCTE)

•Check Point Certified Maestro Expert (CCME)

•Check Point Certified Cloud Network Security Expert for AWS (CNSE-AWS)

•Check Point Certified Cloud Network Security Expert for Azure (CNSE-AZURE)


CONTENT

Topics:

• Advanced Deployments

• Management High Availability

• Advanced Gateway Deployment

• Advanced Policy Configuration

• Advanced User Access Management

• Custom Threat Protection

• Advanced Site-to-Site VPN

• Remote Access VPN

• Mobile Access VPN

• Advanced Security Monitoring

• Performance Tuning

• Advanced Security Maintenance

Exercises:

• Navigating the Environment and Using the Management API 

• Deploying Secondary Security Management Server 

• Configuring a Dedicated Log Server 

• Deploying SmartEvent 

• Configuring a High Availability Security Gateway Cluster 

• Working with ClusterXL 

• Configuring Dynamic and Updateable Objects 

• Verifying Accelerated Policy Installation and Monitoring Status 

• Elevating Security with HTTPS Inspection

• Deploying Identity Awareness 

• Customizing Threat Prevention 

• Configuring a Site-to-Site VPN with an Interoperable Device 

• Deploying Remote Access VPN 

• Configuring Mobile Access VPN 

• Monitoring Policy Compliance 

• Reporting SmartEvent Statistics 

• Tuning Security Gateway Performance

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.