Course Catalog
Check Point Cybersecurity Boot Camp (CCSA+CCSE)
Code: CCSA & CCSE
Duration: 5 Day
$5000 USD

OVERVIEW

In this five-day bundle course, you will learn the basic concepts and skills necessary to configure Check Point Next Generation Firewalls. During this course, you will configure a security policy and learn about managing and monitoring a secure network, upgrading and configuring a security gateway, and implementing a virtual private network (VPN). You will also learn the advanced concepts and skills necessary to configure Check Point Next Generation Firewalls. During this course, you will configure a security policy and learn about managing and monitoring a secure network, upgrading and configuring a security gateway, and implementing a virtual private network (VPN).

Note: Supported versions R81.10 and previous versions

DELIVERY FORMAT

This course is available in the following formats:

Virtual Classroom

Duration: 5 Day
Classroom

Duration: 5 Day

CLASS SCHEDULE

Delivery Format: Virtual Classroom
Date: Apr 08 2024 - Apr 12 2024 | 10:00 - 18:00 EST
Location: Online
Course Length: 5 Day

$ 5000

Delivery Format: Virtual Classroom
Date: Apr 29 2024 - May 03 2024 | 10:00 - 18:00 EST
Location: Online
Course Length: 5 Day

$ 5000

Delivery Format: Virtual Classroom
Date: May 20 2024 - May 24 2024 | 10:00 - 18:00 EST
Location: Online
Course Length: 5 Day

$ 5000

Delivery Format: Virtual Classroom
Date: Jun 03 2024 - Jun 07 2024 | 10:00 - 18:00 EST
Location: Online
Course Length: 5 Day

$ 5000

Delivery Format: Virtual Classroom
Date: Jun 24 2024 - Jun 28 2024 | 10:00 - 18:00 EST
Location: Online
Course Length: 5 Day

$ 5000

GOALS
  • Security Architecture
  • Application Control
  • Deployment
  • Licensing
  • Gaia Portal
  • Hide/Static NAT
  • URL Filtering
  • Monitoring States
  • IoT
  • Traffic Visibility
  • Security Events
  • Threat Extraction
  • Threat Emulation
  • Policy Layers
  • Browser SmartConsole
  • Infinity Threat Protection
  • User Access
  • System Management
  • Automation and Orchestration
  • Redundancy
  • Acceleration
  • SmartEvent
  • Mobile and Remote Access
  • Threat Prevention
OUTLINE

  • Know how to perform periodic administrator tasks.
  • Describe the basic functions of the Gaia operating system.
  • Recognize SmartConsole features, functions, and tools.
  • Understand how SmartConsole is used by administrators to give user access.
  • Learn how Check Point security solutions and products work and how they protect networks.
  • Understand licensing and contract requirements for Check Point security products.
  • Describe the essential elements of a Security Policy.
  • Understand the Check Point policy layer concept.
  • Understand how to enable the Application Control and URL Filtering software.
  • Blades to block access to various applications.
  • Describe how to configure manual and automatic NAT.
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
  • Describe different Check Point Threat Prevention solutions for network attacks.
  • Articulate how the Intrusion Prevention System is configured, maintained and tuned.
  • Understand the Infinity Threat Prevention system.
  • Knowledge about Check PointÂ’s IoT Protect.
  • Provide an overview of the upgrade service and options available.
  • Explain how to perform management upgrade and migration.
  • Articulate the process using CPUSE features.
  • Articulate the purpose and function of Management High Availability.
  • Explain Primary vs Secondary, Active vs Standby and Synchronization.
  • Explain disaster recovery steps in case the primary management server becomes unavailable.
  • Provide overview of Central Deployment in SmartConsole.
  • Articulate an understanding of Security Gateway cluster upgrade methods.
  • Explain about Multi Version Cluster (MVC) upgrades.
  • Discuss Gaia Commands and how they are used.
  • Explain the main processes on s and s.
  • Describe how to work with scripts and SmartTasks to configure automatic actions.
  • Explain the Management Data Plane Separation (MDPS)
  • Explain kernel operations and traffic flow
  • Articulate Dynamic and Updatable Objects in Security Gateways
  • Explain the policy installation flow and files used.
  • Describe the use of policy installation history.
  • Explain concurrent and accelerated install policy.
  • Describe an overview of APIs and ways to use and authenticate.
  • Explain how to make changes in GAIA and management configuration.
  • Explain how to install policy using API.
  • Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
  • Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
  • Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
  • Discuss Site-to-Site VPN basics, deployment and communities.
  • Describe how to analyze and interpret VPN tunnel traffic.
  • Explain Link Selection and ISP Redundancy options.
  • Explain tunnel management features.
  • Discuss Check Point Remote Access solutions and how they differ from each other.
  • Describe how client security can be provided by Remote Access .
  • Explain authentication methods including machine authentication.
  • Explain Multiple Entry Point (MEP)
  • Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections.
  • Describe Mobile Access deployment options.
  • Discuss various features in Mobile Access like Portals, Link Translation, running Native Applications, Reverse Proxy and more.
  • Explain basic concepts of Clustering and ClusterXL.
  • Explain about Cluster Control Protocol (CCP) and synchronization.
  • Describe advanced ClusterXL functions and modes like Load Sharing, Active-Active, VMAC mode etc.
  • Discuss Cluster Correction Layer (CCL) to provide connection stickyness.
  • Advanced Logs and Monitoring
  • Know how to perform periodic administrator tasks.
  • Describe the basic functions of the Gaia operating system.
  • Recognize SmartConsole features, functions, and tools.
  • Understand how SmartConsole is used by administrators to give user access.
  • Learn how Check Point security solutions and products work and how they protect networks.
  • Understand licensing and contract requirements for Check Point security products.
  • Describe the essential elements of a Security Policy.
  • Understand the Check Point policy layer concept.
  • Understand how to enable the Application Control and URL Filtering software.
  • Blades to block access to various applications.
  • Describe how to configure manual and automatic NAT.
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
  • Describe different Check Point Threat Prevention solutions for network attacks.
  • Articulate how the Intrusion Prevention System is configured, maintained and tuned.
  • Understand the Infinity Threat Prevention system.
  • Knowledge about Check PointÂ’s IoT Protect.
  • Provide an overview of the upgrade service and options available.
  • Explain how to perform management upgrade and migration.
  • Articulate the process using CPUSE features.
  • Articulate the purpose and function of Management High Availability.
  • Explain Primary vs Secondary, Active vs Standby and Synchronization.
  • Explain disaster recovery steps in case the primary management server becomes unavailable.
  • Provide overview of Central Deployment in SmartConsole.
  • Articulate an understanding of Security Gateway cluster upgrade methods.
  • Explain about Multi Version Cluster (MVC) upgrades.
  • Discuss Gaia Commands and how they are used.
  • Explain the main processes on s and s.
  • Describe how to work with scripts and SmartTasks to configure automatic actions.
  • Explain the Management Data Plane Separation (MDPS)
  • Explain kernel operations and traffic flow
  • Articulate Dynamic and Updatable Objects in Security Gateways
  • Explain the policy installation flow and files used.
  • Describe the use of policy installation history.
  • Explain concurrent and accelerated install policy.
  • Describe an overview of APIs and ways to use and authenticate.
  • Explain how to make changes in GAIA and management configuration.
  • Explain how to install policy using API.
  • Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
  • Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
  • Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
  • Discuss Site-to-Site VPN basics, deployment and communities.
  • Describe how to analyze and interpret VPN tunnel traffic.
  • Explain Link Selection and ISP Redundancy options.
  • Explain tunnel management features.
  • Discuss Check Point Remote Access solutions and how they differ from each other.
  • Describe how client security can be provided by Remote Access .
  • Explain authentication methods including machine authentication.
  • Explain Multiple Entry Point (MEP)
  • Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections.
  • Describe Mobile Access deployment options.
  • Discuss various features in Mobile Access like Portals, Link Translation, running Native Applications, Reverse Proxy and more.
  • Explain basic concepts of Clustering and ClusterXL.
  • Explain about Cluster Control Protocol (CCP) and synchronization.
  • Describe advanced ClusterXL functions and modes like Load Sharing, Active-Active, VMAC mode etc.
  • Discuss Cluster Correction Layer (CCL) to provide connection stickyness.
  • Advanced Logs and Monitoring
LABS

  • Configure the Security Management Server.
  • Use the WebUI to run the First Time Wizard.
  • Install the Smart Console.
  • Configure the Security Management Server.
  • Use the WebUI to run the First Time Wizard.
  • Install the Smart Console.
  • Install the Alpha Gateway using the network detailed in the course topology.
  • Demonstrate how the Security Management Server and Gateway communicate.
  • Test SIC Status.
  • Create multiple administrators and apply different roles and permissions for simultaneous administration.
  • Validate existing licenses for products installed on the network.
  • Create and configure host, network and group objects.
  • Create a simplified Security Policy.
  • Demonstrate how to use Security Zones in policy.
  • Demonstrate how to share a layer between Security Polices.
  • Configure Network Address Translation for server and network objects.
  • Enable Identity Awareness.
  • Deploy user access roles for more granular control of the security Policy.
  • Generate network Traffic and use traffic visibility tools to monitor the data.
  • Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic.
  • Prepare for a Security Management Server Upgrade
  • Upgrade the Security Management Server
  • Deploy a Secondary Security Management Server
  • Configure a Distributed Log Server
  • Upgrade a Security Gateway from SmartConsole
  • Work with the Command Line
  • Use Scripts and SmartTasks
  • Configure Dynamic Objects
  • Monitor Traffic
  • Verify Policy Installation and Status
  • Work with Gaia and Management APIs
  • Work with Acceleration Features
  • Configure a Locally Managed Site to Site VPN
  • Configure a Site to Site VPN with an Interoperable Device
  • Configure Remote Access VPN
  • Configure Mobile Access VPN
  • Configure a High Availability Cluster
  • Work with ClusterXL
  • Configure Policy Compliance
  • Deploy SmartEvent
  • Configure the Security Management Server.
  • Use the WebUI to run the First Time Wizard.
  • Install the Smart Console.
  • Configure the Security Management Server.
  • Use the WebUI to run the First Time Wizard.
  • Install the Smart Console.
  • Install the Alpha Gateway using the network detailed in the course topology.
  • Demonstrate how the Security Management Server and Gateway communicate.
  • Test SIC Status.
  • Create multiple administrators and apply different roles and permissions for simultaneous administration.
  • Validate existing licenses for products installed on the network.
  • Create and configure host, network and group objects.
  • Create a simplified Security Policy.
  • Demonstrate how to use Security Zones in policy.
  • Demonstrate how to share a layer between Security Polices.
  • Configure Network Address Translation for server and network objects.
  • Enable Identity Awareness.
  • Deploy user access roles for more granular control of the security Policy.
  • Generate network Traffic and use traffic visibility tools to monitor the data.
  • Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic.
  • Prepare for a Security Management Server Upgrade
  • Upgrade the Security Management Server
  • Deploy a Secondary Security Management Server
  • Configure a Distributed Log Server
  • Upgrade a Security Gateway from SmartConsole
  • Work with the Command Line
  • Use Scripts and SmartTasks
  • Configure Dynamic Objects
  • Monitor Traffic
  • Verify Policy Installation and Status
  • Work with Gaia and Management APIs
  • Work with Acceleration Features
  • Configure a Locally Managed Site to Site VPN
  • Configure a Site to Site VPN with an Interoperable Device
  • Configure Remote Access VPN
  • Configure Mobile Access VPN
  • Configure a High Availability Cluster
  • Work with ClusterXL
  • Configure Policy Compliance
  • Deploy SmartEvent
WHO SHOULD ATTEND

Technical persons who support, install, deploy, or administer Check Point Software Blades, which includes:

  • System administrators
  • Support analysts
  • Security managers
  • Network engineers
  • Anyone seeking CCSA certification and CCSE certification
PREREQUISITES

  • General knowledge of TCP/IP
  • Working knowledge of Windows, UNIX, network technology, and the internet