0% found this document useful (0 votes)
60 views1 page

Check Point Cyber Security Administrator (Ccsa) : Course Topics Course Objectives

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 1

CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA)

(Supported Versions: R80.10 and above)

WHO SHOULD ATTEND?


Technical professionals who support, install, deploy or administer Check Point Software Blades.
COURSE GOAL:
Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway
and Management Software Blades.
PREREQUISITES:
 General knowledge of TCP/IP
 Working knowledge of Windows and/or UNIX, network technology and the Internet

COURSE TOPICS COURSE OBJECTIVES


 Introduction to Check Point Technology  Interpret the concept of a Firewall and understand the
 Security Policy Management mechanisms used for controlling network traffic.
 Policy Layers  Describe the key elements of Check Point’s unified
 Check Point Security Solutions and Licensing Security Management Architecture.
 Traffic Visibility  Recognize SmartConsole features, functions and tools.
 Basic Concepts of VPN  Understand Check Point deployment options.
 Managing User Access  Describe the basic functions of Gaia.
 Working with ClusterXL  Describe the essential elements of a Security Policy.
 Administrator Task Implementation  Understand how traffic inspection takes place in a
unified Security Policy.
 Summarize how administration roles and permissions
LAB EXERCISES assist in managing policy.
 Working with Gaia Portal  Recall how to implement backup techniques.
 Modifying an Existing Security Policy  Understand the Check Point policy layer concept.
 Configuring Hide and Static NAT  Recognize Check Point security solutions and products
 Managing Administrator Access and how they work to protect your network.
 Installing and Managing a Remote Security Gateway  Understand licensing and contract requirements for
 Managing Backups Check Point security products.
 Defining Access Control Policy Layers  Identify tools designed to monitor data, determine
 Defining and Sharing Security Policy Layers threats and recognize performance improvements.
 Working with Licenses and Contracts  Identify tools designed to respond quickly and
efficiently to changes in gateways, tunnels, remote
 Working with Check Point Logs
users, traffic flow patterns, and other activities.
 Maintaining Check Point Logs
 Understand Site-to-Site and Remote Access VPN
 Configuring a Site-to-Site VPN deployments and communities.
 Providing User Access  Understand how to analyze and interpret VPN traffic.
 Working with Cluster XL  Recognize how to define users and user groups.
 Verifying Network Compliance  Understand how to manage user access for internal
 Working with CP View and external users.
 Understand the basic concepts of ClusterXL
technology and its advantages.

CCSA
 Understand how to perform periodic administrator tasks
CERTIFICATION as specified in administrator job descriptions.
INFORMATION
Prepare for exam #156-215.80 at VUE.com/checkpoint

©2019 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
November 15, 2019

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy