Check Point Certified Security Administrator (CCSA) R80 Blades 1

Check Point Certified Security Administrator (CCSA) R80 Blades 1 Training in United Kingdom
Check Point Certified Security Administrator (CCSA) R80 Blades 1
  • Check Point Certified Security Administrator (CCSA) R80 Blades 1

    3 Days Course
    Check Point Courses
    1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
    Loading...

    Reviews

    Course Details

    Overview

    Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation – bringing all security protections and functions under one umbrella. With R80 management, security consolidation is fully realized. This three-day course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80.

    Objectives

    • Describe the key elements of Check Points unified, secure management architecture
    • Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic
    • Recognize SmartConsole features and functions
    • Understand Check Point deployment options
    • Describe the basic functions of the Gaia OS
    • Describe the elements of a unified security policy
    • Understand how traffic inspection takes place in a unified security policy
    • Summarize how administration roles and permissions assist in managing policy
    • Implement Check Point backup techniques
    • Recognize Check Point Security Solutions and Products and how they work to protect your network
    • Understand licensing and contract requirements for Check Point security products
    • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
    • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities
    • Understand Site-to-Site and Remote Access VPN deployments and VPN communities
    • Understand how to analyze and interpret VPN tunnel traffic
    • Recognize how to define users and user groups
    • Manage user access for internal and external users
    • Understand the basic concepts of ClusterXL technology and its advantages
    • Understand how to perform periodic administrator tasks as specified in administrator job descriptions

    Outline

    • Introduction to Check Point Technology
    • Security Policy Management
    • Check Point Security Solutions and Licensing
    • Traffic Visibility
    • Basic Concepts of VPN
    • Managing User Access
    • Working with ClusterXL
    • Administrator Task Implementation Unified Gateway

    Lab Exercises

    • Defining roles and users in Gaia Portal
    • Installing and navigating SmartConsole
    • Configuring objects, rules, and settings to define a Security Policy
    • Publishing database changes
    • Installing and managing a remote Security Gateway
    • Performing Hide and Static Network Address Translation
    • Configuring Application Control and URL filtering Access Control policy layers
    • Working with multiple concurrent Administrators and testing permissions profiles
    • Working with Check Point licenses
    • Viewing and maintaining logs
    • Configuring a Virtual Private Network
    • Providing User Access
    • Working with Check Point clustering
    • Producing Check Point reports

    Target Audience

    • This course is recommended for technical professionals, who support, install, deploy or administer Check Point Software Blades.

    Pre-Requisites

    • General knowledge of TCP/IP
    • Working knowledge of Windows and/or UNIX, network technology and the Internet

    Course Schedule

      Oct 2 - Oct 4, 2017
    London