Check Point Cyber Security Engineering (CCSE) R80.40
Check Point Cyber Security Engineering (CCSE) R80 is a training course designed for experts performing advanced configuration of Check Point Software solutions. The objective of the course is to understand and acquire the skills necessary to configure and manage the Check Point Next Generation Firewall in an optimum manner.
- CCSA training/certification
- Knowledge of the basics of Windows, UNIX, network services, TCP/IP and Internet usage
- System Management
- Automation and Orchestration
- Redundancy
- Optimization
- SmartEvent
- Mobile and Remote Access
- Threat Prevention
- Advanced CLI commands
- Apply upgrades, patches and hotfixes
- Describe the Check Point Firewall infrastructure
- Advanced methods of centralized log collection using CPView and CPInfo
- Use of Check Point API in flexible system automation
- Advanced ClusterXL functionalities
- VRRP redundancy advantages
- Advantages and operation principle of SecureXL
- Advantages and operation principle of CoreXL
- SmartEvent components that that allow us to store logs and generate incidents
- SmartEvent processes that indicate network security breaches
- Understanding Smart Event in order to detect and prevent security threats
- Principle of operation of Mobile Access Software Blace and its secure communication
- Mobile Access installation
- Check Point Remote Access solutions
- Check Point Capsule, its components and operating principle
- Check Point solutions against cyber attacks, such as Zero-day and Advanced Persistent Threats
- Principle of operation of SandBlast, Threat Emulation and Threat Extraction in prevention
- Check Point Threat Prevention for the purpose of preventing the loss of corporate data on smartphones and tablets
- Upgrading a Security Management Server to R80.20
- Applying Check Point Hotfixes
- Configuring Clusters
- Advanced CLI Firewall Administration
- Configuring manual NAT
- Creating Objects using the Check Point API
- Configuring Check Point VRRP
- Deploying a Secondary Security Management Server
- Viewing the Chain Modules
- Working with SecureXL
- Working with CoreXL
- Threat recognition with SmartEvent
- Using Mobile Access
- Understanding and configuring IPS
- Configuring Threat Prevention and Threat Protection
- Configuring Threat Emulation and Threat Extraction