Course Catalog
Check Point Certified Security Administrator (CCSA)
Code: Check Point CCSA
Duration: 3 Day
$3000 USD

OVERVIEW

In this course, you will learn the basic concepts and skills necessary to configure Check Point Next Generation Firewalls. During this course, you will configure a security policy and learn about managing and monitoring a secure network, upgrading and configuring a security gateway, and implementing a virtual private network (VPN).

Note: Supported versions R81.10 and previous versions

DELIVERY FORMAT

This course is available in the following formats:

Virtual Classroom

Duration: 3 Day
Classroom

Duration: 3 Day

CLASS SCHEDULE

Delivery Format: Virtual Classroom
Date: Apr 08 2024 - Apr 10 2024 | 10:00 - 18:00 EST
Location: Online
Course Length: 3 Day

$ 3000

Delivery Format: Virtual Classroom
Date: Apr 29 2024 - May 01 2024 | 10:00 - 18:00 EST
Location: Online
Course Length: 3 Day

$ 3000

Delivery Format: Virtual Classroom
Date: May 20 2024 - May 22 2024 | 10:00 - 18:00 EST
Location: Online
Course Length: 3 Day

$ 3000

Delivery Format: Virtual Classroom
Date: Jun 03 2024 - Jun 05 2024 | 10:00 - 18:00 EST
Location: Online
Course Length: 3 Day

$ 3000

Delivery Format: Virtual Classroom
Date: Jun 24 2024 - Jun 26 2024 | 10:00 - 18:00 EST
Location: Online
Course Length: 3 Day

$ 3000

GOALS
  • Security Architecture
  • Application Control
  • Deployment
  • Licensing
  • Gaia Portal
  • Hide/Static NAT
  • URL Filtering
  • Monitoring States
  • IoT
  • Traffic Visibility
  • Security Events
  • Threat Extraction
  • Threat Emulation
  • Policy Layers
  • Browser SmartConsole
  • Infinity Threat Protection
  • User Access
OUTLINE

  • Know how to perform periodic administrator tasks.
  • Describe the basic functions of the Gaia operating system.
  • Recognize SmartConsole features, functions, and tools.
  • Understand how SmartConsole is used by administrators to give user access.
  • Learn how Check Point security solutions and products work and how they protect networks.
  • Understand licensing and contract requirements for Check Point security products.
  • Describe the essential elements of a Security Policy.
  • Understand the Check Point policy layer concept.
  • Understand how to enable the Application Control and URL Filtering software.
  • Blades to block access to various applications.
  • Describe how to configure manual and automatic NAT.
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
  • Describe different Check Point Threat Prevention solutions for network attacks.
  • Articulate how the Intrusion Prevention System is configured, maintained and tuned.
  • Understand the Infinity Threat Prevention system.
  • Knowledge about Check PointÂ’s IoT Protect.
  • Know how to perform periodic administrator tasks.
  • Describe the basic functions of the Gaia operating system.
  • Recognize SmartConsole features, functions, and tools.
  • Understand how SmartConsole is used by administrators to give user access.
  • Learn how Check Point security solutions and products work and how they protect networks.
  • Understand licensing and contract requirements for Check Point security products.
  • Describe the essential elements of a Security Policy.
  • Understand the Check Point policy layer concept.
  • Understand how to enable the Application Control and URL Filtering software.
  • Blades to block access to various applications.
  • Describe how to configure manual and automatic NAT.
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
  • Describe different Check Point Threat Prevention solutions for network attacks.
  • Articulate how the Intrusion Prevention System is configured, maintained and tuned.
  • Understand the Infinity Threat Prevention system.
  • Knowledge about Check PointÂ’s IoT Protect.
LABS

  • Configure the Security Management Server.
  • Use the WebUI to run the First Time Wizard.
  • Install the Smart Console.
  • Configure the Security Management Server.
  • Use the WebUI to run the First Time Wizard.
  • Install the Smart Console.
  • Install the Alpha Gateway using the network detailed in the course topology.
  • Demonstrate how the Security Management Server and Gateway communicate.
  • Test SIC Status.
  • Create multiple administrators and apply different roles and permissions for simultaneous administration.
  • Validate existing licenses for products installed on the network.
  • Create and configure host, network and group objects.
  • Create a simplified Security Policy.
  • Demonstrate how to use Security Zones in policy.
  • Demonstrate how to share a layer between Security Polices.
  • Configure Network Address Translation for server and network objects.
  • Enable Identity Awareness.
  • Deploy user access roles for more granular control of the security Policy.
  • Generate network Traffic and use traffic visibility tools to monitor the data.
  • Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic.
  • Configure the Security Management Server.
  • Use the WebUI to run the First Time Wizard.
  • Install the Smart Console.
  • Configure the Security Management Server.
  • Use the WebUI to run the First Time Wizard.
  • Install the Smart Console.
  • Install the Alpha Gateway using the network detailed in the course topology.
  • Demonstrate how the Security Management Server and Gateway communicate.
  • Test SIC Status.
  • Create multiple administrators and apply different roles and permissions for simultaneous administration.
  • Validate existing licenses for products installed on the network.
  • Create and configure host, network and group objects.
  • Create a simplified Security Policy.
  • Demonstrate how to use Security Zones in policy.
  • Demonstrate how to share a layer between Security Polices.
  • Configure Network Address Translation for server and network objects.
  • Enable Identity Awareness.
  • Deploy user access roles for more granular control of the security Policy.
  • Generate network Traffic and use traffic visibility tools to monitor the data.
  • Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic.
WHO SHOULD ATTEND

Technical persons who support, install, deploy, or administer Check Point Software Blades should attend this course. This could include the following:

  • System administrators
  • Support analysts
  • Security managers
  • Network engineers
  • Anyone seeking CCSA certification
PREREQUISITES

  • General knowledge of TCP/IP
  • Working knowledge of Windows, UNIX, network technology, and the Internet