Check Point Certified Security Administrator (CCSA) R80 Blades 1

Check Point Certified Security Administrator (CCSA) R80 Blades 1 Training in United Kingdom
Check Point Certified Security Administrator (CCSA) R80 Blades 1

Check Point Certified Security Administrator (CCSA) R80 Blades 1

3 Days Course
Check Point Courses
1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

Reviews

Course Details

Overview

Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation – bringing all security protections and functions under one umbrella. With R80 management, security consolidation is fully realized. This three-day course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80.

Objectives

  • Describe the key elements of Check Points unified, secure management architecture
  • Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic
  • Recognize SmartConsole features and functions
  • Understand Check Point deployment options
  • Describe the basic functions of the Gaia OS
  • Describe the elements of a unified security policy
  • Understand how traffic inspection takes place in a unified security policy
  • Summarize how administration roles and permissions assist in managing policy
  • Implement Check Point backup techniques
  • Recognize Check Point Security Solutions and Products and how they work to protect your network
  • Understand licensing and contract requirements for Check Point security products
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities
  • Understand Site-to-Site and Remote Access VPN deployments and VPN communities
  • Understand how to analyze and interpret VPN tunnel traffic
  • Recognize how to define users and user groups
  • Manage user access for internal and external users
  • Understand the basic concepts of ClusterXL technology and its advantages
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions

Outline

  • Introduction to Check Point Technology
  • Security Policy Management
  • Check Point Security Solutions and Licensing
  • Traffic Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation Unified Gateway

Lab Exercises

  • Defining roles and users in Gaia Portal
  • Installing and navigating SmartConsole
  • Configuring objects, rules, and settings to define a Security Policy
  • Publishing database changes
  • Installing and managing a remote Security Gateway
  • Performing Hide and Static Network Address Translation
  • Configuring Application Control and URL filtering Access Control policy layers
  • Working with multiple concurrent Administrators and testing permissions profiles
  • Working with Check Point licenses
  • Viewing and maintaining logs
  • Configuring a Virtual Private Network
  • Providing User Access
  • Working with Check Point clustering
  • Producing Check Point reports

Target Audience

  • This course is recommended for technical professionals, who support, install, deploy or administer Check Point Software Blades.

Pre-Requisites

  • General knowledge of TCP/IP
  • Working knowledge of Windows and/or UNIX, network technology and the Internet

Course Schedule