Check Point Certified Security Administrator (CCSA) R81.20

Course Code: CP-CCSA

This three-day course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system. Learn How To: - Install R80 management and a security gateway in a distributed environment - Configure objects, rules, and settings to define a security policy - Work with multiple concurrent administrators and define permission profiles - Configure a Virtual Private Network and work with Check Point clustering - Perform periodic administrator tasks as specified in administrator job descriptions

  • Duration: 3 Days
  • Level: Administrator
  • Technology: Check Point Secruity
  • Delivery Method: ILT/VILT
  • Training Credits: IGS

Technical Professionals who architect, upgrade, maintain, and support Check Point products.

CCSA Training or Certification, fundamental Unix and Windows knowledge, certificate management experience, system administration and networking knowledge.

After completing this course, delegates will be able to:

- Provide an overview of the upgrade service and options available.

- Identify basic interfaces used to manage the Check Point environment.

- Identify the types of technologies that Check Point supports for automation.

- Explain the purpose of the Check Management High Availability (HA) deployment.

- Identify the workflow followed to deploy a Primary and solution Secondary servers.

- Explain the basic concepts of Clustering and ClusterXL, including protocols, synchronization, connection stickyness.

- Identify how to exclude services from synchronizing or delaying synchronization.

- Explain the policy installation flow.

- Explain the purpose of dynamic objects, updatable objects, and network feeds.

- Understand how to manage user access for internal and external users.

- Describe the Identity Awareness components and configurations.

- Describe different Check Point Threat Prevention solutions.

- Articulate how the Intrusion Prevention System is configured.

- Obtain knowledge about Check Point’s IoT Protect.

- Explain the purpose of Domain-based VPNs.

- Describe situations where externally managed certificate authentication is used.

- Describe how client security can be provided by Remote Access.

- Discuss the Mobile Access Software Blade.

- Explain how to determine if the configuration is compliant with the best practices.

- Define performance tuning solutions and basic configuration workflow.

- Identify supported upgrade and migration methods and procedures for Security Management Servers and dedicated Log and SmartEvent Servers.

- Identify supported upgrade methods and procedures for Security Gateways.

The Check Point Certified Security Engineering #156-315.81.20 exam covers the following topics: 

- Check Point Technology Overview

- Deployment Platforms and Security Policies

- Monitoring Traffic and Connections

- Network Address Translations

- User Management and Authentication

- Using SmartUpdate

- Implementing Identity Awareness

- Configuring VPN tunnels

- Resolving security administration issues.

Download our course content

Click Here


- Deploying SmartConsole

- Installing a Security Management Server

- Installing a Security Gateway

- Configuring Objects in SmartConsole

- Establishing Secure Internal Communication

- Managing Administrator Access

- Managing Licenses

- Creating a Security Policy

- Configuring Order Layers

- Configuring a Shared Inline Layer

- Configuring NAT

- Integrating Security with a Unified Policy

- Elevating Security with Autonomous Threat Prevention

- Configuring a Locally Managed Site-to-Site VPN

- Elevating Traffic View

- Monitoring System States

- Maintaining the Security Environment

- Security Architecture 

- Security Management 

- SmartConsole 

- Deployment 

- Object Management 

- Licenses and Contracts 

- Policy Rule and Rulebase

- Policy Packages 

- Policy Layers 

- Traffic Inspection 

- Network Address Translation 

- Application Control

- URL Filtering

- Logging 

- Snapshots 

- Backup and Restore 

- Gaia 

- Permissions 

- Policy Installation