Check Point Certified Security Administrator (CCSA) R82

Course Code: CP-CCSA

This comprehensive three-day course prepares individuals with the fundamental knowledge, practical skills, and hands-on experience required to configure, operate, and manage daily tasks for Check Point Quantum Security Gateways and Management Software Blades on the GAiA operating system, now updated for R82. The course emphasizes both foundational security principles and new R82 features, providing in-depth exposure to the enhanced security capabilities and simplified management introduced in this release.

  • Duration: 3 Days
  • Level: Administrator
  • Technology: Check Point Quantum Security
  • Delivery Method: ILT/VILT

Technical professionals seeking foundational skills in configuring, managing, and administering Check Point Quantum Security Gateways and Management Software.

Check Point Deployment Administrator (suggested) 

Base Knowledge:

- Unix-like and/or Windows OS

- Internet Fundamentals

- Networking Fundamentals

- Networking Security

- System Administration

- TCP/IP Networking

Upon successful completion of the CCSA R82 course, participants will be able to:

- Understand the architecture and primary components of Check Point's Quantum Security Gateway and Management solutions, including the three-tier architecture and Gaia operating system.

- Describe the essential elements of Check Point Security Policies, including policy layers, traffic inspection, and network address translation (NAT).

- Interpret how communication is secured and traffic is routed within Check Point environments, leveraging both physical and virtual infrastructure.

- Identify and manage SmartConsole features, administrator roles, and permission profiles to streamline secure multi-user operations.

- Recognize and utilize Check Point's licensing structure, contract requirements, and the management tools available for monitoring and compliance.

- Articulate modern approaches to threat prevention, including the implementation of Check Point’s AI-powered security engines to block advanced zero-day threats.

- Explain and deploy VPN solutions (Site-to-Site and Remote Access) with a focus on new post-quantum encryption capabilities.

- Review the latest innovations in automated HTTPS Inspection, DNS protection, and secure application/data access.

- Monitor data, recognize security events, and optimize system performance using enhanced diagnostics and integrated visualization tools.

- Understand how to perform regular and advanced administrative tasks, backups, disaster recovery, and security system updates in a dynamic enterprise environment

The Check Point Certified Security Engineering #156-315.81.20 exam covers the following topics: 

- Check Point Technology Overview

- Deployment Platforms and Security Policies

- Monitoring Traffic and Connections

- Network Address Translations

- User Management and Authentication

- Using SmartUpdate

- Implementing Identity Awareness

- Configuring VPN tunnels

- Resolving security administration issues.

Download our course content

Click Here

Modules

- Explore Gaia on the Security Management Server

- Explore Gaia on the Dedicated Log Server

- Explore Gaia on the Security Gateway Cluster Members

- Connect to SmartConsole

- Navigate GATEWAYS & SERVERS Views

- Navigate SECURITY POLICIES Views

- Navigate LOGS & EVENTS Views

- Navigate MANAGE & SETTINGS Views

- Create New Administrators and Assign Profiles

- Test Administrator Profile Assignments

- Manage Concurrent Administrator Sessions

- Take Over Another Session and Verify Session Status

- View and Modify GATEWAYS & SERVERS Objects

- View and Modify Network Objects

- View and Modify Service Objects

- Verify the Security Policy

- Modify Security Policies

- Install the Standard Security Policy

- Test the Security Policy

- Add an Ordered Layer

- Configure and Deploy the Ordered Layer Rules

- Test the Ordered Layer Policy

- Create an Inline DMZ Layer

- Test the Inline DMZ Layer

- Configure Log Management

- Enhance Rulebase View, Rules, and Logging

- Review Logs and Search for Data

- Configure the Monitoring Blade

- Monitor the Status of the Systems

- Adjust the Security Policy for Identity Awareness

- Configure the Identity Collector

- Define the User Access Role

- Test Identity Awareness

- Enable HTTPS Inspection

- Adjust Access Control Rules

- Deploy the Security Gateway Certificate

- Test and Analyze Policy with HTTPS Inspection

- Adjust the Access Control Policy

- Create and Adjust Application Control and URL

- Test and Adjust the Application Control and URL Filtering Rules

- Enable Autonomous Threat Prevention

- Test Autonomous Threat Prevention

- Introduction to Quantum Security

- Administrator Account Management

- Object Management

- Security Policy Management

- Policy Layers

- Security Operations Monitoring

- Identity Awareness

- HTTPS Inspection

- Application Control and URL Filtering

- Threat Prevention Fundamentals