Check Point (CCSA-R80)

Check Point Certified Security Administrator R80 (CCSA-R80)

Who should attend

Technical professionals who support, install, deploy or administer Check Point Software Blades.

Prerequisites

Prior to taking this course, it is recommended that you possess the following:

  • General knowledge of TCP/IP
  • Working knowledge of Windows and/or UNIX, network technology and the Internet

Course Objectives

At the end of the course, you will be able to:

  • Describe the key elements of Check Point?s unified, secure management architecture
  • Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic
  • Recognize SmartConsole features and functions
  • Understand Check Point deployment options
  • Describe the basic functions of the Gaia OS
  • Describe the elements of a unified security policy
  • Understand how traffic inspection takes place in a unified security policy
  • Summarize how administration roles and permissions assist in managing policy
  • Implement Check Point backup techniques
  • Recognize Check Point Security Solutions and Products and how they work to protect your network
  • Understand licensing and contract requirements for Check Point security products
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities
  • Understand Site-to-Site and Remote Access VPN deployments and VPN communities
  • Understand how to analyze and interpret VPN tunnel traffic
  • Recognize how to define users and user groups
  • Manage user access for internal and external users
  • Understand the basic concepts of ClusterXL technology and its advantages
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions

Course Content

Today, managing security is a complex endeavor, making it more important to consolidate. With R80 management, security consolidation is fully realized. This three-day course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80.