CCSA+CCSE R80.20 Check Point Cyber Security Administrator and Engineering Bundle Training

Category

Checkpoint

Rating
4.4
(4.4)
Price

$5000

Course Description

Aspirants who desire to gather integrated learning on a combination of vital ideas and aptitudes for arranging Check Point Gateway and Management Software Blades must take this CCSA+CCSE R80.10 Check Point Cyber Security Administrator and Engineering Bundle Training course. Opting for the –CCSA-R80.20 course enhances your ability to design Check Point Security Gateway and Management of Software Blades. Another key course objective focuses on the importance of arranging and overseeing the Check Point Next-Generation Firewalls.

This technical training course module includes Introduction to Check Point Technology, Security Policy Management, Policy Layers, Check Point Security solutions and licensing, basic concepts of VPN, traffic visibility, and user access management. Other traits of this course include working with ClusterXL, administrator task implementation, automation and orchestration, system management, acceleration, redundancy, mobile and remote Access, and threat prevention.

Professionals from various relevant backgrounds can engage in this live online training who want to seek CCSA and CCSE certifications. Other professionals who can benefit with this training include Network Engineers, System Administrators, Network Engineers, Support Analysts, Security Managers, and other IT professionals who work with Check Point Software Blades.

Who should attend this course?

This training course is special for professionals who are into bundle course and is recommended for Support Analysts, Network Engineers, Security Managers, Systems Administrators any other IT professional functioning with Check Point Cyber Security Administrator.

What you will learn

  • User Access Management.
  • Visibility of the traffic.
  • Concepts of VPN.
  • Licensing and Check Point Security Solutions.
  • Threat Prevention
  • Acceleration and Automation.
  • Orchestration
  • Remote Access & Mobile authorization.
  • Functioning with ClusterXL.
  • Implementing tasks for Administrator.
  • Redundancy

With Microtek Learning, you’ll receive:

  • Certified Instructor-led training
  • Industry Best Trainers
  • Official Training Course Student Handbook
  • Pre and Post assessments/evaluations
  • Collaboration with classmates (not available for a self-paced course)
  • Real-world knowledge activities and scenarios
  • Exam scheduling support*
  • Learn and earn program*
  • Practice Tests
  • Knowledge acquisition and exam-oriented
  • Interactive online course.
  • Support from an approved expert
  • For Government and Private pricing*
Request Call

Our Clients

For many years, Microtek Learning has been helping organizations, leaders, and professionals to reach their maximum performance by addressing the challenges they are facing.

  • 300+ enterprise clients
  • 100,000+ professionals trained
  • Service 70 of the Fortune 100
  • 96% of our clients would recommend us
our clients

Our Awards

our awards
why choose us

Curriculum

  • Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
  • Describe the key elements of Check Point's unified Security Management Architecture.
  • Recognize SmartConsole features, functions and tools.
  • Understand Check Point deployment options.
  • Describe the basic functions of Gaia.
  • Describe the essential elements of a Security Policy.
  • Understand how traffic inspection takes place in a unified Security Policy.
  • Summarize how administration roles and permissions assist in managing policy.
  • Recall how to implement backup techniques.
  • Understand the Check Point policy layer concept.
  • Recognize Check Point security solutions and products and how they work to protect your network.
  • Understand licensing and contract requirements for Check Point security products.
  • Identify tools designed to monitor data, determine threats and recognize performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
  • Understand Site-to-Site and Remote Access VPN deployments and communities.
  • Understand how to analyze and interpret VPN traffic.
  • Recognize how to define users and user groups.
  • Understand how to manage user access for internal and external users.
  • Understand the basic concepts of ClusterXL technology and its advantages.
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions.
  • CCSA Lab Exercises Include

  • Working with Gaia Portal
  • Modifying an Existing Security Policy
  • Configuring Hide and Static NAT
  • Managing Administrator Access
  • Installing and Managing a Remote Security Gateway
  • Managing Backups
  • Defining Access Control Policy Layers Defining and Sharing Security Policy Layers
  • Working with Licenses and Contracts
  • Working with Check Point Logs
  • Maintaining Check Point Logs
  • Configuring a Site-to-Site VPN
  • Providing User Access
  • Working with Cluster XL
  • Verifying Network Compliance
  • Working with CP View
  • Identify advanced CLI commands.
  • Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes.
  • Describe the Check Point Firewall infrastructure.
  • Describe advanced methods of gathering important gateway data using CPView and CPInfo.
  • Recognize how Check Point's flexible API architecture supports automation and orchestration.
  • Discuss advanced ClusterXL functions.
  • Describe VRRP network redundancy advantages.
  • Undersand how SecureXL acceleration technology is used to enhance and improve performance.
  • Understand how CoreXL acceleration technology is used to enhance and improve performance.
  • Identify the SmartEvent components that store network activity logs and identify events.
  • Discuss the SmartEvent process that determines which network activities may lead to security issues.
  • Understand how SmartEvent can assist in detecting, remediating, and preventing security threats.
  • Discuss the Mobile Access Software Blace and how it secures communication and data.
  • Understand Mobile Access deployment options.
  • Recognize Check Point Remote Access solutions.
  • Discuss Check Point Capsule components and how they protect mobile devices and business documents.
  • Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.
  • Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.
  • Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets.
  • CCSE Lab Exercises Include

  • Upgrading a Security Management Server to R80.20
  • Applying Check Point Hotfixes
  • Configuring a New Security Gateway Cluster
  • Core CLI Elements of Firewall Administration
  • Configuring Manual Network Address Translation
  • Managing Objects Using the Check Point API
  • Enabling Check Point VRRP
  • Deploying a Secondary Security Management Server
  • Viewing the Chain Modules
  • Working with SecureXL
  • Working with CoreXL
  • Evaluating Threats with SmartEvent
  • Managing Mobile Access
  • Understanding IPS Protections
  • Deploying IPS Geo Protection
  • Reviewing Threat Prevention Settings and Protections
  • Deploying Threat Emulation and Threat Extraction
  • REVIEWS ON OUR POPULAR COURSES

    male

    I was sceptical at first whether to enrol with Microtek Learning or not, however, I am glad that I did- I got everything that was promised (maybe more). The trainer was very patient and knowledgeable and with his effort and mine, I was able to clear the exam with ease! Keep up the good work everyone.

    MARTIN

    TORONTO, CANADA

    • (5)
    male

    I'm really impressed with the storytelling skills of the instructor. She makes the session exciting by keeping things simple and easy to understand.

    Prince N.

    Texas

    • (5)
    male

    I was recommended the ITIL 4 Foundation course by an IT professional who had completed the same course at Microtek Learning. The training gave me a thorough understanding of service management that I felt I could take back to my job as an IT Project Management and apply it to improve the value of products and services.

    Marsh George

    Texas

    • (5)
    Accredited By

    Course Details

    • Duration: 5 Days
    • Enrolled: 1579
    • Price: $5000
    side post

    Talk to Learning Advisor

    Get In Touch

    * I authorize Microtek Learning to contact me via Phone/Email