CCSA – Check Point Certified Security Administrator (CCSA) version R81.10

- Check Point, Instructor Lead Training
- 98 (Registered)
-
Course Description
- Three-day course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.
ATC
ATC partners are regulated by Check Point to ensure the consistent delivery of high-quality learning experience. This mandates that our delivery utilizes vendor accredited courseware, certified instructors offering real-world experience, digital labs and high-class facilities.
We deliver public and private instructor-led learning services, which can be delivered both face to face in a classroom, virtually online or a combination of the two. Additionally, we provide a range of digital learning solutions including e-learning.
Delivery options include the ability to support standard vendor certification, bespoke and tailored content, ensuring we meet the needs of the learner and organization.
Certification
This course will prepare you to pass exam #156-215.81 – Check Point Certified Security Administrator (CCSA)
Learning Outcomes
- Know how to perform periodic administrator tasks
• Describe the basic functions of the Gaia operating system
• Recognize SmartConsole features, functions, and tools .
• Describe the Check Point Firewall infrastructure
• Understand how SmartConsole is used by administrators to grant permissions and user access
• Learn how Check Point security solutions and products work and how they protect networks
• Understand licensing and contract requirements for Check Point security products
• Describe the essential elements of a Security Policy
• Understand the Check Point policy layer concept
• Understand how to enable the Application Control and URL Filtering software blades to block access to various applications
• Describe how to configure manual and automatic NAT
• Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
• Identify SmartEvent components used to store network activity logs and identify events
• Know how Site-to-Site and Remote Access VPN deployments and communities work
• Explain the basic concepts of ClusterXL technology and its advantages
Payments
You can enroll with your Check Point Learning Credits.
If you are Check Point Partner you can also get free training via the Co-op Program. Check your eligibility and request funds here or For any further questions or additional assistance, please E-Mail: [email protected]
We provide Invoices for Company Sponsored Trainings.
Course Content
-
Chapter 1: Introduction to Check Point Technology
Check Point’s technology is organized within a unified single management framework. As an IT giant, the company provides network security, endpoint security, cloud security, mobile security, data security an d security management through its’ vast array of products. In this chapter, you will be introduced to Check Point’s unified security management architecture, basic firewall administration, and some of the main security features.
-
Chapter 2: Introduction to Check Point Deployment
The constantly changing varia tion of software products has fostered the emergence of specialized roles for administra tors to manage the deployment process. There are different deployment scenarios for Check Point software products. In this chapter, you will learn about the different Check Point deployment options and basic functions of the Gaia operating system.
-
Chapter 3: Check Point Security Management Operations
Security Administrators manage all security operations using SmartConsole in a Check Point network environment. This requires that adminis trators have a thorough understanding of how the features and functions in SmartConsole work. Th e SmartConsole is an all-encompassing, unified console for managing Security Po licies, monitoring events, ma naging user access, installing updates, adding new devices and appliances, and managing a multi-domain environment.
-
Chapter 4: Check Point Licensing
Whether designing a solution for corporate headqu arters, a data center, or a branch office, creating a system based on Check Point’s So ftware Blade architecture is the key to implementing an effective security solution. The Check Point Software Blade architecture supports a complete and increasing selec tion of Software Blades, each delivering a modular security function. As your busin ess grows and new threats and challenges emerge, Check Point’s Software Blade architecture quickly and flexibly expands services as needed without the addition of new hard ware. In addition, simple methods for activating and installing licens es for Check Point products make it easy to manage all licenses throughout the entire organiza tion solely from the SmartConsole.
-
Chapter 5: Security Policy management
Managing the Security Policy for a large netw ork can quickly become a resource-intensive task. To help manage the network Security Po licy, it is important to know the components of a Security Policy and how they impact traf fic inspection. In this chapter, you will also learn about many SmartConsole features and capabilities that enhance the management of the Security Policy.
-
Chapter 6: Policy Layers
Security Policy management can be labor in tensive. To simplify the process, R80.40 organizes policies into Policy Laye rs. In this chapter, we will cover the benefits of having Rule Base options for policy management.
-
Chapter 7: Application Control & URL Filtering
-
Chapter 8: Managing User Access
An integral part of configuring the optimal network centers around defining users and user groups. Users and user groups are added to the database manually through LDAP and User Directory or with the help of Active Dire ctory. Defining users and managing internal and external user access is easily achieve d through SmartConsole. Activating Check Point’s Identity Awareness Software Blade for a granular view of users, groups and machines, provides unmatched access control through the cr eation of accurate, identitybased policies.
-
Chapter 9: Network Address Translation
Network Address Translation allows for the use of non-routable IP addresses in a network. It provides additional security benefits by protecting the identity of network hosts and managing network traffic. Different NAT conf igurations affect the way that Security Gateways handle the resu lting traffic connections.
-
Chapter 10: Traffic Visibility
SmartConsole lets you transform log data into security intelligence by tightly integrating logging, monitoring and event management. Monitoring network activity and analyzing threat data is key to protectin g an organization’s network. SmartConsole traffic visibility tools are designed to help administrators effectively monitor tr affic and connections, analyze log data, troubleshoot events, and qu ickly respond to changes in traffic flow patterns or suspicious security activities.
-
Chapter 10: Monitoring System States
Security Management Servers and Security Ga teways work together to monitor the state of a Security Enforcement System. SmartConsole and SmartView Mo nitor provide a complete picture for monitoring network activity and the performance. This chapter provides a brief overview of essential tools that help ad ministrators to monitor system states.
-
Chapter 11: Using SmartEvent
Increasingly, Security Administra tors have to know how to pr event, detect and mitigate a range of sophisticated cyber se curity attacks. Check Point’s SmartEvent Software Blade identifies critical security events such as intrusion, Bot incidents, a nd potential data loss before they occur. With its customizable graphical reports and intuitive GUI, administrators can readily monitor pattern s and events as they unfold and provide reporting to key stakeholders in the organization. This chapter will provide an overview of SmartEvent’s architecture, its’ security events and threat prevention capabilities, and reporting features.