Check Point Cyber Security Engineering (CCSE) R80.40

Check Point Cyber Security Engineering (CCSE) R80.40

Check Point Cyber Security Engineering (CCSE) R80 is a training course designed for experts performing advanced configuration of Check Point Software solutions. The objective of the course is to understand and acquire the skills necessary to configure and manage the Check Point Next Generation Firewall in an optimum manner.

  • CCSA training/certification
  • Knowledge of the basics of Windows, UNIX, network services, TCP/IP and Internet usage
  • System Management
  • Automation and Orchestration
  • Redundancy
  • Optimization
  • SmartEvent
  • Mobile and Remote Access
  • Threat Prevention
  1. Advanced CLI commands
  2. Apply upgrades, patches and hotfixes
  3. Describe the Check Point Firewall infrastructure
  4. Advanced methods of centralized log collection using CPView and CPInfo
  5. Use of Check Point API in flexible system automation
  6. Advanced ClusterXL functionalities
  7. VRRP redundancy advantages
  8. Advantages and operation principle of SecureXL
  9. Advantages and operation principle of CoreXL
  10. SmartEvent components that that allow us to store logs and generate incidents
  11. SmartEvent processes that indicate network security breaches
  12. Understanding Smart Event in order to detect and prevent security threats
  13. Principle of operation of Mobile Access Software Blace and its secure communication
  14. Mobile Access installation
  15. Check Point Remote Access solutions
  16. Check Point Capsule, its components and operating principle
  17. Check Point solutions against cyber attacks, such as Zero-day and Advanced Persistent Threats
  18. Principle of operation of SandBlast, Threat Emulation and Threat Extraction in prevention
  19. Check Point Threat Prevention for the purpose of preventing the loss of corporate data on smartphones and tablets
  1. Upgrading a Security Management Server to R80.20
  2. Applying Check Point Hotfixes
  3. Configuring Clusters
  4. Advanced CLI Firewall Administration
  5. Configuring manual NAT
  6. Creating Objects using the Check Point API
  7. Configuring Check Point VRRP
  8. Deploying a Secondary Security Management Server
  9. Viewing the Chain Modules
  10. Working with SecureXL
  11. Working with CoreXL
  12. Threat recognition with SmartEvent
  13. Using Mobile Access
  14. Understanding and configuring IPS
  15. Configuring Threat Prevention and Threat Protection
  16. Configuring Threat Emulation and Threat Extraction
Contact

You can contact our support team at
info-croatia@ingrammicro.com