CCSA – Check Point Certified Security Administrator (CCSA) version R80.40

- Check Point, Instructor Lead Training
- 98 (Registered)
-
Course Description
- Three-day course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.
ATC
ATC partners are regulated by Check Point to ensure the consistent delivery of high-quality learning experience. This mandates that our delivery utilizes vendor accredited courseware, certified instructors offering real-world experience, digital labs and high-class facilities.
We deliver public and private instructor-led learning services, which can be delivered both face to face in a classroom, virtually online or a combination of the two. Additionally, we provide a range of digital learning solutions including e-learning.
Delivery options include the ability to support standard vendor certification, bespoke and tailored content, ensuring we meet the needs of the learner and organization.
Certification
This course will prepare you to pass exam #156-215.80 – Check Point Certified Security Administrator (CCSA)
Learning Outcomes
- Know how to perform periodic administrator tasks
• Describe the basic functions of the Gaia operating system
• Recognize SmartConsole features, functions, and tools .
• Describe the Check Point Firewall infrastructure
• Understand how SmartConsole is used by administrators to grant permissions and user access
• Learn how Check Point security solutions and products work and how they protect networks
• Understand licensing and contract requirements for Check Point security products
• Describe the essential elements of a Security Policy
• Understand the Check Point policy layer concept
• Understand how to enable the Application Control and URL Filtering software blades to block access to various applications
• Describe how to configure manual and automatic NAT
• Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
• Identify SmartEvent components used to store network activity logs and identify events
• Know how Site-to-Site and Remote Access VPN deployments and communities work
• Explain the basic concepts of ClusterXL technology and its advantages
Payments
You can enroll with your Check Point Learning Credits.
If you are Check Point Partner you can also get free training via the Co-op Program. Check your eligibility and request funds here or For any further questions or additional assistance, please E-Mail: [email protected]
We provide Invoices for Company Sponsored Trainings.
Course Content
-
Chapter 1: Introduction to Check Point Technology
Check Point’s technology is organized within a unified single management framework. As an IT giant, the company provides network security, endpoint security, cloud security, mobile security, data security an d security management through its’ vast array of products. In this chapter, you will be introduced to Check Point’s unified security management architecture, basic firewall administration, and some of the main security features.
-
Chapter 2: Introduction to Check Point Deployment
The constantly changing varia tion of software products has fostered the emergence of specialized roles for administra tors to manage the deployment process. There are different deployment scenarios for Check Point software products. In this chapter, you will learn about the different Check Point deployment options and basic functions of the Gaia operating system.
-
Chapter 3: Check Point Security Management Operations
Security Administrators manage all security operations using SmartConsole in a Check Point network environment. This requires that adminis trators have a thorough understanding of how the features and functions in SmartConsole work. Th e SmartConsole is an all-encompassing, unified console for managing Security Po licies, monitoring events, ma naging user access, installing updates, adding new devices and appliances, and managing a multi-domain environment.
-
Chapter 4: Check Point Licensing
Whether designing a solution for corporate headqu arters, a data center, or a branch office, creating a system based on Check Point’s So ftware Blade architecture is the key to implementing an effective security solution. The Check Point Software Blade architecture supports a complete and increasing selec tion of Software Blades, each delivering a modular security function. As your busin ess grows and new threats and challenges emerge, Check Point’s Software Blade architecture quickly and flexibly expands services as needed without the addition of new hard ware. In addition, simple methods for activating and installing licens es for Check Point products make it easy to manage all licenses throughout the entire organiza tion solely from the SmartConsole.
-
Chapter 5: Security Policy management
Managing the Security Policy for a large netw ork can quickly become a resource-intensive task. To help manage the network Security Po licy, it is important to know the components of a Security Policy and how they impact traf fic inspection. In this chapter, you will also learn about many SmartConsole features and capabilities that enhance the management of the Security Policy.
-
Chapter 6: Policy Layers
Security Policy management can be labor in tensive. To simplify the process, R80.40 organizes policies into Policy Laye rs. In this chapter, we will cover the benefits of having Rule Base options for policy management.
-
Chapter 7: Managing User Access
An integral part of configuring the optimal network centers around defining users and user groups. Users and user groups are added to the database manually through LDAP and User Directory or with the help of Active Dire ctory. Defining users and managing internal and external user access is easily achieve d through SmartConsole. Activating Check Point’s Identity Awareness Software Blade for a granular view of users, groups and machines, provides unmatched access control through the cr eation of accurate, identitybased policies.
-
Chapter 8: Network Address Translation
Network Address Translation allows for the use of non-routable IP addresses in a network. It provides additional security benefits by protecting the identity of network hosts and managing network traffic. Different NAT conf igurations affect the way that Security Gateways handle the resu lting traffic connections.
-
Chapter 9: Traffic Visibility
SmartConsole lets you transform log data into security intelligence by tightly integrating logging, monitoring and event management. Monitoring network activity and analyzing threat data is key to protectin g an organization’s network. SmartConsole traffic visibility tools are designed to help administrators effectively monitor tr affic and connections, analyze log data, troubleshoot events, and qu ickly respond to changes in traffic flow patterns or suspicious security activities.
-
Chapter 10: Monitoring System States
Security Management Servers and Security Ga teways work together to monitor the state of a Security Enforcement System. SmartConsole and SmartView Mo nitor provide a complete picture for monitoring network activity and the performance. This chapter provides a brief overview of essential tools that help ad ministrators to monitor system states.
-
Chapter 11: Using SmartEvent
Increasingly, Security Administra tors have to know how to pr event, detect and mitigate a range of sophisticated cyber se curity attacks. Check Point’s SmartEvent Software Blade identifies critical security events such as intrusion, Bot incidents, a nd potential data loss before they occur. With its customizable graphical reports and intuitive GUI, administrators can readily monitor pattern s and events as they unfold and provide reporting to key stakeholders in the organization. This chapter will provide an overview of SmartEvent’s architecture, its’ security events and threat prevention capabilities, and reporting features.
-
Chapter 12: Basic Concepts of VPN
The Virtual Private Network (VPN) Software Blade is used to create VPNs to securely communicate and transmit data over the In ternet. Use SmartConsole to create VPN deployments and topologies for a network to easily share internal resources with authenticated users.
-
Chapter 13: Working with ClusterXL
Ensuring that Security Gateways and VPN connections are kept alive in a corporate network are critical to maintaining a smoothly running network. The failure of a Security Gateway or VPN connection can result in the loss of active connectio ns. Many of these connections, such as financial transactions, ca n be mission critical an d losing them results in the loss of critical data. ClusterXL provides an infrastructure that does not lose data in case of a system failure. The cluster is a group of identical and connected Security Gateways. It guarantees that if one fa ils, another immediately takes its place.
-
Chapter 14: Administrator Compliance Tasks
Basic network monitoring is part of an admi nistrator’s daily routine. Although there are many aspects of the network to monitor, th ere are some tasks that may only require occasional implementation. The Compliance Soft ware Blade is an integral part of monitoring the network’s comp liance with security standard s. This chapter provides a brief overview of tasks performed and tools such as CPView used by administrators to retrieve gateway status info rmation and maintain security.
Requirements
- Basic knowledge of networking
- 6 months to 1 year of experience with Check Point products recommended
Features
- Identify key components and configurations
- Create and confirm administrator users for the domain
- Validate existing licenses for products installed on your network
- Create and modify Check Point Rule Base objects
- Demonstrate how to share a layer between Security Policies
- Analyze network traffic and use traffic visibility tools
- Monitor Management Server States using SmartConsole
- Demonstrate how to run specific SmartEvent reports
- Configure a SmartEvent server to monitor relevant patterns
- Configure and deploy a site-to-site VPN
- Configure and test ClusterXL with a High Availability configuration
- Understand how to use CPView to gather gateway information
- Perform periodic tasks as specified in administrator job descriptions
- Test VPN connection and analyze the tunnel traffic
- Demonstrate how to create custom reports
- Demonstrate how to configure event Alerts in SmartEvent
- Utilize various traffic visibility tools to maintain Check Point logs
Target audiences
- Technical professionals who need to deploy and manage Endpoint Security within their security environment.