Training Check Point

Training goals

code: CP-CCSA | version: R82.x

This course provides students with the fundamental knowledge, skills, and hands-on experience needed to configure, manage, and monitor an existing Quantum Security Environment. Students will learn how to access and navigate the Gaia Portal and the Gaia Command Line Interface, manage Administrator access, create and configure Network Objects, create new Security Policies, configure Ordered Layers and a Shared Inline Layer, elevate the traffic view and monitor system states, configure Identity Awareness, elevate security with HTTPS Inspection, configure Application Control and URL Filtering, and configure Autonomous Threat Prevention.

 

Target Audience

  • Security Administrators
  • Security Engineers
  • Security Analysts
  • Security Consultants
  • Security Architects

 

NIST/NICE Work Role Categories

  • Implementation & Operation
  • Protection & Defense

 

Conspect Show list

  • Module 1: Introduction to Quantum Security
    • Identify the primary components of the Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
    • Lab Tasks
      • Explore Gaia on the Security Management Server
      • Explore Gaia on the Dedicated Log Server
      • Explore Gaia on the Security Gateway Cluster Members
      • Connect to SmartConsole
      • Navigate GATEWAYS & SERVERS Views
      • Navigate SECURITY POLICIES Views
      • Navigate LOGS & EVENTS Views
      • Navigate MANAGE & SETTINGS Views
  • Module 2: Administrator Account Management
    • Explain the purpose of SmartConsole administrator accounts.
    • Identify useful features for administrator collaboration, such as session management, concurrent administration, and concurrent policy installation.
    • Lab Tasks
      • Create New Administrators and Assign Profiles
      • Test Administrator Profile Assignments
      • Manage Concurrent Administrator Sessions
      • Take Over Another Session and Verify Session Status
  • Module 3: Object Management
    • Explain the purpose of SmartConsole Objects.
    • Give examples of SmartConsole Physical and Logical Objects.
    • Lab Tasks
      • View and Modify GATEWAYS & SERVERS Objects
      • View and Modify Network Objects
      • View and Modify Service Objects
  • Module 4: Security Policy Management
    • Explain the purpose of Security Policies.
    • Identify the essential elements of a Security Policy.
    • Identify features and capabilities that enhance the configuration and management of the Security Policy.
    • Lab Tasks
      • Verify the Security Policy
      • Modify Security Policies
      • Install the Standard Security Policy
      • Test the Security Policy
  • Module 5: Policy Layers
    • Demonstrate an understanding of the Check Point policy layer concept.
    • Explain how policy layers affect traffic inspection.
    • Lab Tasks
      • Add an Ordered Layer
      • Configure and Deploy the Ordered Layer Rules
      • Test the Ordered Layer Policy
      • Create an Inline DMZ Layer
      • Test the Inline DMZ Layer
  • Module 6: Security Operations Monitoring
    • Explain the purpose of Security Operations Monitoring.
    • Tune the Log Server configuration.
    • Use predefined and custom queries to filter the logging results.
    • Monitor the state of Check Point systems.
    • Lab Tasks
      • Configure Log Management
      • Enhance Rulebase View, Rules, and Logging
      • Review Logs and Search for Data
      • Configure the Monitoring Blade
      • Monitor the Status of the Systems
  • Module 7: Identity Awareness
    • Explain the purpose of the Identity Awareness solution.
    • Identify the essential elements of Identity Awareness.
    • Lab Tasks
      • Adjust the Security Policy for Identity Awareness
      • Configure the Identity Collector
      • Define the User Access Role
      • Test Identity Awareness
  • Module 8: HTTPS Inspection
    • Explain the purpose of the HTTPS Inspection solution.
    • Identify the essential elements of HTTPS Inspection.
    • Lab Tasks
      • Enable HTTPS Inspection
      • Adjust Access Control Rules
      • Deploy the Security Gateway Certificate
      • Test and Analyze Policy with HTTPS Inspection
  • Module 9: Application Control and URL Filtering
    • Explain the purpose of the Application Control and URL Filtering solutions.
    • Identify the essential elements of Application Control and URL Filtering.
    • Lab Tasks
      • Adjust the Access Control Policy
      • Create and Adjust Application Control and URL
      • Test and Adjust the Application Control and URL Filtering Rules
  • Module 10: Threat Prevention Fundamentals
    • Explain the purpose of the Threat Prevention solution.
    • Identify the essential elements of Autonomous Threat Prevention.
    • Lab Tasks
      • Enable Autonomous Threat Prevention
      • Test Autonomous Threat Prevention
Download conspect training as PDF

Additional information

Prerequisites

Base Knowledge

  • Unix-like and/or Windows OS
  • Internet Fundamentals
  • Networking Fundamentals
  • Networking Security
  • System Administration
  • TCP/IP Networking

 

Check Point Courses

  • Check Point Deployment Administrator (suggested)
Difficulty level
Duration 3 days
Certificate

The participants will obtain certificates signed by Check Point Software Technologies Ltd. (course completion).

This course additionally helps prepare for CCSA R82 exam #156-215.82 available at Pearson VUE test centers www.vue.com/checkpoint

Trainer

Authorized Check Point Software Technologies Ltd. Trainer

Other training Check Point | Core Training

Training thematically related

Security

Contact form

Please fill form below to obtain more info about this training.







* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

PRICE 1200 EUR We also accept payment using IGS (Infinity Global Services) credits issued by Check Point. In such cases, please contact us at szkolenia@compendium.pl

Promotions available

enter the promotion code:
(green color = code correct)
the discount will be applied after entering the correct code
 

FORM OF TRAINING ?

 

TRAINING MATERIALS ?

 

SELECT TRAINING DATE

  • hybrid training: HYBRID
    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
  • hybrid training: HYBRID
    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
Book a training appointment
close

Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

Dlearning training

You may participate from at any place in the world. It is sufficient to have a computer (or, actually a tablet, or smartphone) connected to the Internet. Compendium CE provides each Distance Learning training participant with adequate software enabling connection to the Data Center. For more information, please visit dlearning.eu site

close

Paper materials

Traditional materials: The price includes standard materials issued in the form of paper books, printed or other, depending on the arrangements with the manufacturer.

Electronic materials

Electronic materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.

Upcoming Check Point training

Training schedule Check Point