CCSA & CCSE
Check Point Certified Security Administrator and Expert (CCSA & CCSE) R80
Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation –
bringing all security protections and functions under one umbrella. With R80 management, security consolidation is fully
realized. This three-day course covers everything you need to start-up, configure and manage the daily operations of your
Check Point infrastructure with R80.
Course Description
Learn How To
• Install R80 management and a security gateway in a distributed environment
• Configure objects, rules, and settings to define a security policy
• Work with multiple concurrent administrators and define permission profiles
• Configure a Virtual Private Network and work with Check Point clustering
• Perform periodic administrator tasks as specified in administrator job descriptions
CCSE
• Backup your Security Gateway and Management Server
• Build, test and troubleshoot a clustered Security Gateway
• Upgrade and troubleshoot a Management Server
• Configure and maintain security acceletration solutions
• Manage, test and optimize corporate VPN tunnels
Prerequisites
• Basic knowledge of networking
• TCP/IP Knowledge and IP Addressing
How You Will Benefit
• Be prepared to defend against network threats
• Evaluate existing security policies and optimize the rule base
• Manage user access to corporate LANs
• Implement Check Point backup techniques
• Build, test and troublehoot numerous deployment scenarios
• Migrate to a clustering security solution
• Create events for compliance reporting
• Manage internal and external access to corporate resources
Exam# 156-215.80 & 156-315.80
What You Need To Know
• Check Point Technology Overview
• Security Policy Management
• Monitoring Traffic and Connections
• Network Address Translations
• Basic Concepts of VPN
• Managing User Access
• Working with ClusterXL
• Administrator Task Implementation
• Check Point Technology Overview
• Deployment Platforms and Security Policies
• Monitoring Traffic and Connections
• Network Address Translations
• User Management and Authentication
• Using SmartUpdate
• Implementing Identity Awareness
• Configuring VPN tunnels
• Resolving security administration issues