Check Point Cyber Security Administrator (CCSA) R80.40

Check Point Cyber Security Administrator (CCSA) R80.40

Check Point Cyber Security Administrator (CCSA) R80 is a three-day training course intended for technical staff and includes the installation, setup and management of Check Point Software solutions. The objective of the course is to understand the basic concepts and acquire the skills necessary to configure Check Point Firewall and Check Point Management.

  • Basic knowledge of TCP/IP
  • Knowledge of the basics of Windows and UNIX, network services and Internet usage
  • Introduction to Check Point technology
  • Creation of Policies (ACL)
  • Policy layers
  • Check Point Security Solutions and Licensing
  • Traffic visibility
  • VPN
  • Managing User Access
  • Working with ClusterXL
  • Practical Implementation
  1. Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic
  2. Describe the key elements of Check Point’s unified Security Management Architecture
  3. Recognize SmartConsole features, functions and tools
  4. Understand Check Point deployment options
  5. Describe the basic functions of Gaia
  6. Describe the essential elements of a Security Policy
  7. Understand how traffic inspection takes place in a unified Security Policy
  8. Administrator roles in creation of Management policies
  9. Backup techniques
  10. Policy layer concept
  11. Recognition and understanding of Check Point security solutions and products and how they work to protect your network
  12. Check Point solution licensing
  13. Using tools designed to monitor data, find threats and improve performance
  14. Using tools designed for quick response and efficient changes to Firewall, tunnels, remote users, traffic flow and other activities
  15. Understand Site-to-Site and Remote Access VPN
  16. Analysis and interpretation of VPN traffic
  17. Defining Users and User Groups
  18. Access management of all Users
  19. Basic concepts of ClusterXL technology and its advantages
  20. Periodic Administration
  1. Working with Gaia
  2. Modifying an Existing Security Policy
  3. Configuring Dynamic and Static NAT
  4. Managing Administrator Access
  5. Installing and Managing a Remote Firewall
  6. Backup
  7. Defining Access Control Policy
  8. Defining Security Policy
  9. Licensing
  10. Working with Check Point Logs
  11. Configuring a Site-to-Site VPN
  12. Providing User Access
  13. Working with ClusterXL
  14. Verifying Network Compliance
  15. Working with CP View
Contact

You can contact our support team at
info-croatia@ingrammicro.com