Check Point Cyber Security Administrator (CCSA) R80.40
Check Point Cyber Security Administrator (CCSA) R80 is a three-day training course intended for technical staff and includes the installation, setup and management of Check Point Software solutions. The objective of the course is to understand the basic concepts and acquire the skills necessary to configure Check Point Firewall and Check Point Management.
- Basic knowledge of TCP/IP
- Knowledge of the basics of Windows and UNIX, network services and Internet usage
- Introduction to Check Point technology
- Creation of Policies (ACL)
- Policy layers
- Check Point Security Solutions and Licensing
- Traffic visibility
- VPN
- Managing User Access
- Working with ClusterXL
- Practical Implementation
- Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic
- Describe the key elements of Check Point’s unified Security Management Architecture
- Recognize SmartConsole features, functions and tools
- Understand Check Point deployment options
- Describe the basic functions of Gaia
- Describe the essential elements of a Security Policy
- Understand how traffic inspection takes place in a unified Security Policy
- Administrator roles in creation of Management policies
- Backup techniques
- Policy layer concept
- Recognition and understanding of Check Point security solutions and products and how they work to protect your network
- Check Point solution licensing
- Using tools designed to monitor data, find threats and improve performance
- Using tools designed for quick response and efficient changes to Firewall, tunnels, remote users, traffic flow and other activities
- Understand Site-to-Site and Remote Access VPN
- Analysis and interpretation of VPN traffic
- Defining Users and User Groups
- Access management of all Users
- Basic concepts of ClusterXL technology and its advantages
- Periodic Administration
- Working with Gaia
- Modifying an Existing Security Policy
- Configuring Dynamic and Static NAT
- Managing Administrator Access
- Installing and Managing a Remote Firewall
- Backup
- Defining Access Control Policy
- Defining Security Policy
- Licensing
- Working with Check Point Logs
- Configuring a Site-to-Site VPN
- Providing User Access
- Working with ClusterXL
- Verifying Network Compliance
- Working with CP View