Check Point Certified Security Administrator (CCSA)

by DASVM Claim Listing

By achieving the CCSA – Check Point Certified Security Administrator certification you will validate your ability to install, configure, and manage Check Point Security Gateway and Management Software Blade systems on the GAiA operating system.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

DASVM Logo

img Duration

40 Hours

Course Details

By achieving the CCSA – Check Point Certified Security Administrator certification you will validate your ability to install, configure, and manage Check Point Security Gateway and Management Software Blade systems on the GAiA operating system.

Learn how to: Install R80 management and a security gateway in a distributed environment Configure objects, rules, and settings to define a security policy Work with multiple concurrent administrators and define permission profiles Configure a Virtual Private Network and work with Check Point clustering Perform periodic administrator tasks as specified in administrator job descriptions.

 

Course Content:

  • Introduction to Check Point Architecture
  • Identify the basic functions of the Web UI.
  • Create and confirm admin users for the network.
  • Configure network messages.
  • Confirm existing network configuration settings.
  • Install and tour the GUI.
  • Describe the key elements of Check Point’s unified, 3-tiered architecture.
  • Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic.
  • Recognize SmartConsole features, functions and tools.
  • Understand Check Point deployment options.
  • Security Policy Management
  • Create multiple administrators and apply different roles/permissions for concurrent administration.
  • Create and configure network, host and gateway objects.
  • Evaluate and manipulate rules in a unified Access Control security policy.
  • Apply policy layers and analyze how they affect traffic inspection.
  • Prepare and schedule backups for the gateway.
  • Describe the essential elements of a unified security policy.
  • Understand how traffic inspection takes place in a unified security policy.
  • Summarize how administration roles and permissions assist in managing policy.
  • Recall how to implement Check Point backup techniques.
  • Check Point Security Solutions
  • Evaluate and manage different Check Point security solutions deployed for network access control.
  • Evaluate and manage Check Point security solutions for threat protection.
  • Examine how the Compliance blade monitors your Check Point security infrastructure.
  • Validate existing licenses for products installed on your network.
  • Recognize Check Point security solutions & products and the way they protect your network.
  • Understand licensing and contract requirements for Check Point security solutions.
  • Traffic Visibility
  • Generate network traffic and use traffic visibility tools to monitor the data.
  • Compare and contrast various tools available for viewing traffic
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities.
  • Basic Concepts of VPN
  • Configure and deploy a site-to-site VPN.
  • Test the VPN connection and analyze the tunnel traffic.
  • Understand VPN deployments and Check Point Communities.
  • Understand how to analyze and interpret VPN tunnel traffic.
  • Managing User’s Access
  • Create and define user access for a guest wireless user.
  • Test Identity Awareness connection.
  • Recognize how to define users and user groups for your environment.
  • Understand how to manage user access for internal users and guests.
  • Working with Cluster XL
  • Install and configure ClusterXL with a High Availability configuration.
  • Describe the basic concept of ClusterXL technology and its advantages.
  • Administrator Task Implementation
  • Review rule-base performance for policy control.
  • Understand how to perform periodic administrator tasks as specified in Administrator job descriptions.
  • SmartEvent Reports
  • Generate reports that effectively summarize network activity.
  • Recognize how to effectively create, customize and generate network activity reports.

 

Course Prerequisites:

  • Basic knowledge of networking
  • General knowledge of networking and TCP/IP. Working knowledge of Windows, UNIX, network technology, and the internet.
  • 6 months to 1 year of experience with Check Point products recommended
  • BTM Layout Branch

    #7, Ground Floor, 29th Main, 4th Cross, BTM Layout 2nd Stage, BTM Layout, Bangalore

Check out more CCSA (Check Point Certified Security Administrator) courses in India

IONX (Institute Of Network Experts) Logo

Network Security Architect Professional

Professionals in network security architecture are specialists committed to securing digital systems. They evaluate the risks, create and put into place security measures, and keep an eye out for weaknesses in network activity.

by IONX (Institute Of Network Experts) [Claim Listing ]
Hectranet Logo

Checkpoint Firewall CCSA

Check Point Security Administration (R75) is a foundation course for Check Point’s Security Gateway product. CCSA training provides an understanding of basic concepts and skills necessary to configure Check Point Firewall.

by Hectranet [Claim Listing ]
Zybeak Technologies Logo

Certified Information Security Manager

Certified Information Security Manager (CISM) is an advanced certification which indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.

by Zybeak Technologies [Claim Listing ]
Golars Networks Logo

Check Point (CCSA)

Check Point (CCSA) course is offered by Golars Networks. We have established ourselves as a trusted destination for nurturing the digital world with world-class computer networking solutions, network security solutions, network consulting & training programs.

by Golars Networks [Claim Listing ]
IP Expert Logo

Cyber Security Expert

This Cyber Security Expert program is a Master level course that will provide you with the skills needed to become an expert in Cyber Security. you will learn comprehensive methods to protect your infrastructure, including protecting data and information.

by IP Expert [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy