fbpx

Check Point Cyber Security Administrator

////Check Point Cyber Security Administrator

Check Point Cyber Security Administrator

Course ID: CCSA R80 3 Days
   

Check Point Cyber Security Administrator

Overview

This three-day course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80.

Description

Audience

Technical professionals who support, install, deploy or administer Check Point Software Blades.

Certification

Certificate of Cloud Security Knowledge

Exam

R80 CCSA

Investment

Instructor-led / Virtual Instructor-led

Singapore: USD3,000
India: USD3,000

PREREQUISITES

  • General knowledge of TCP/IP
  • Working knowledge of Windows and/or UNIX, network technology and the Internet

OBJECTIVES

  • Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic
  • Describe the key elements of Check Point’s unified Security Management Architecture
  • Recognize SmartConsole features, functions and tools.
  • Understand Check Point deployment option
  • Describe the basic functions of Gaia
  • Describe the essential elements of a Security Policy
  • Understand how traffic inspection takes place in a unified Security Policy
  • Summarize how administration roles and permissions assist in managing policy
  • Recall how to implement backup techniques
  • Understand the Check Point policy layer concept
  • Recognize Check Point security solutions and products and how they work to protect your network
  • Understand licensing and contract requirements for Check Point security products
  • Identify tools designed to monitor data, determine threats and recognize performance improvements
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities
  • Understand Site-to -Site and Remote Access VPN deployments and communities
  • Understand how to analyze and interpret VPN traffic
  • Recognize how to define users and user groups
  • Understand how to manage user access for internal and external users
  • Understand the basic concepts of ClusterXL technology and its advantages
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions

COURSE CONTENT

Module 1: Introduction to Check Point Technology

Module 2: Security Policy Management

Module 3: Policy Layers

Module 4: Check Point Security Solutions and Licensing

Module 5: Traffic Visibility

Module 6: Basic Concepts of VPN

Module 7: Managing User Access

Module 8: Working with ClusterXL

Module 9: Administrator Task Implementation

What’s Next

  • Check Point Certified Security Engineering

Subscribe to our mailing list for special offers and promotions.

Processing...
Thank you! Your subscription has been confirmed. You'll hear from us soon.
ErrorHere