18756 Stone Oak Park Way, Suite200, San Antonio TX 78258 USA
100 Queen St W, Brampton, ON L6X 1A4, Canada
country flagUnited States
share button

CCSA R80.20 Check Point Cyber Security Administrator Training


What CCSA R80.20 Check Point Cyber Security Administrator training is all about?

CCSA R80.20 Check Point Cyber Security Administrator Training aims at developing the fundamental skills to understand and analyze the essential concepts for configuration of Check Point Security Gateway and Management Software Blades. Students from various technical fields can opt to learn through this blended-live training course. Professional individuals currently engaged in support, installation, deploying, or administration of Check Point Software Blades can opt for this training module.

An individual who currently has around six months to 1 year of prior expertise in Check Point products can opt for this course. Some quick information on networking and TCP/IP is also essential. Basics about Windows, network technology, the internet, and UNIX is also necessary. CCSA R80.20 Check Point Cyber Security Administrator Training course objectives include Introduction to Check Point Technology, Policy Layers, Security Policy Management, Traffic Visibility, Basic concepts of VPN, Check Point Security Solutions and Licensing and management of user access.

This technical training course also gives a deep insight into working with ClusterXL and Administrator Task Implementation. Our training involves interactive learning that helps to better grasp the subject matter with classroom training ambiance.

Schedule
  • Delivery Format:
Date: Aug 24, 2020 | 10:00 am - 6:00 pm EST
Location: Online
$3000 USD
  • Delivery Format:
Date: Sep 14, 2020 | 10:00 am - 6:00 pm EST
Location: Online
$3000 USD
  • Delivery Format:
Date: Sep 28, 2020 | 10:00 am - 6:00 pm EST
Location: Online
$3000 USD
What are the course objectives for CCSA R80.20 Check Point Cyber Security Administrator training?
  • Introducing about Check Point Technology
  • Policies for Security Management
  • Licensing and Check Point Security Solutions.
  • Visibility of the traffic.
  • Concepts of VPN.
  • User Access Management.
  • Functioning with ClusterXL.
  • Implementing tasks for Administrator.
Who should attend CCSA R80.20 Check Point Cyber Security Administrator training?

The primary audience for this course are technical professionals who assist, deploy, install and administer Check Point Software Blades. Additionally, professionals who have a very good experience in IT can enroll for this training.

What is the course outline for CCSA R80.20 Check Point Cyber Security Administrator training?
  • 1. Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
  • 2. Describe the key elements of Check Point?s unified Security Management Architecture.
  • 3. Recognize SmartConsole features, functions and tools.
  • 4. Understand Check Point deployment options.
  • 5. Describe the basic functions of Gaia.
  • 6. Describe the essential elements of a Security Policy.
  • 7. Understand how traffic inspection takes place in a unified Security Policy.
  • 8. Summarize how administration roles and permissions assist in managing policy.
  • 9. Recall how to implement backup techniques.
  • 10. Understand the Check Point policy layer concept.
  • 11. Recognize Check Point security solutions and products and how they work to protect your network.
  • 12. Understand licensing and contract requirements for Check Point security products.
  • 13. Identify tools designed to monitor data, determine threats and recognize performance improvements.
  • 14. Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
  • 15. Understand Site-to-Site and Remote Access VPN deployments and communities.
  • 16. Understand how to analyze and interpret VPN traffic.
  • 17. Recognize how to define users and user groups.
  • 18. Understand how to manage user access for internal and external users.
  • 19. Understand the basic concepts of ClusterXL technology and its advantages.
  • 20. Understand how to perform periodic administrator tasks as specified in administrator job descriptions.
  • 21. Lab Exercises Include:
  • a). Working with Gaia Portal
  • b). Modifying an Existing Security Policy
  • c). Configuring Hide and Static NAT
  • d). Managing Administrator Access
  • e). Installing and Managing a Remote Security Gateway
  • f). Managing Backups
  • g). Defining Access Control Policy Layers
  • h). Defining and Sharing Security Policy Layers
  • i). Working with Licenses and Contracts
  • j). Working with Check Point Logs
  • k). Maintaining Check Point Logs
  • l). Configuring a Site-to-Site VPN
  • m). Providing User Access
  • n). Working with Cluster XL
  • o). Verifying Network Compliance
  • p). Working with CP View