logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Check Point Cyber Security Administrator (CCSA)

SS Course: 2001093

Course Overview

TOP

The goal of this course is to provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

                                                                  

Scheduled Classes

TOP

What You'll Learn

TOP

Upon completion of this course, students are able to:

  • Introduction to Check Point Technology
  • Security Policy Management
  • Policy Layers
  • Check Point Security Solutions and Licensing
  • Traffic Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation

Outline

TOP
Viewing outline for:
  • Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
  • Describe the key elements of Check Point?s unified Security Management Architecture.
  • Recognize SmartConsole features, functions and tools.
  • Understand Check Point deployment options.
  • Describe the basic functions of Gaia.
  • Describe the essential elements of a Security Policy.
  • Understand how traffic inspection takes place in a unified Security Policy.
  • Summarize how administration roles and permissions assist in managing policy.
  • Recall how to implement backup techniques.
  • Understand the Check Point policy layer concept.
  • Recognize Check Point security solutions and products and how they work to protect your network.
  • Understand licensing and contract requirements for Check Point security products.
  • Identify tools designed to monitor data, determine threats and recognize performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
  • Understand Site-to-Site and Remote Access VPN deployments and communities.
  • Understand how to analyze and interpret VPN traffic.
  • Recognize how to define users and user groups.
  • Understand how to manage user access for internal and external users.
  • Understand the basic concepts of ClusterXL technology and its advantages.
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions.

 

 

Lab Exercises Include:

 

  1. Working with Gaia Portal
  2. Modifying an Existing Security Policy
  3. Configuring Hide and Static NAT
  4. Managing Administrator Access
  5. Installing and Managing a Remote Security Gateway
  6. Managing Backups
  7. Defining Access Control Policy Layers Defining and Sharing Security Policy Layers
  8. Working with Licenses and Contracts
  9. Working with Check Point Logs
  10. Maintaining Check Point Logs
  11. Configuring a Site-to-Site VPN
  12. Providing User Access
  13. Working with Cluster XL
  14. Verifying Network Compliance
  15. Working with CP View

Prerequisites

TOP

Prior to taking this course, it is recommended that learners possess the following:

  • General knowledge of TCP/IP
  • Working knowledge of Windows and/or UNIX
  • Working knowledge of network technology
  • Working knowledge of the Internet

    Who Should Attend

    TOP

    This course is recommended for technical professionals who support, install, deploy or administer Check Point Software Blades.

    Next Step Courses

    TOP