Training Check Point

Training goals

code: CP-CCSB | version: R81.x

The Check Point Cybersecurity Boot Camp (CCSB) is a volume comprised of the Check Point Certified Security Administrator (CCSA) course and a modified Check Point Certified Security Expert (CCSE) course.

Learn basic and advanced concepts and develop skills necessary to administer IT security fundamental and intermediate tasks.

COURSE OBJECTIVES – SECURITY ADMINISTRATOR PART

  • Describe the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
  • Identify the basic workflow to install Security Management Server and Security Gateway for a single-domain solution.
  • Create SmartConsole objects that correspond to the organization’s topology for use in policies and rules.
  • Identify the tools available to manage Check Point licenses and contracts, including their purpose and use.
  • Identify features and capabilities that enhance the configuration and management of the Security Policy.
  • Demonstrate an understanding of Application Control & URL Filtering and Autonomous Threat Prevention capabilities and how to configure these solutions to meet an organization’s security requirements.
  • Describe how to analyze and interpret VPN tunnel traffic.
  • Identify how to monitor the health of supported Check Point hardware using the Gaia Portal and the command line.
  • Describe the different methods for backing up Check Point system information and discuss best practices and recommendations for each method.

COURSE OBJECTIVES – SECURITY EXPERT PART

  • Identify the types of technologies that Check Point supports for automation.
  • Explain the purpose of the Check Management High Availability (HA) deployment.
  • Explain the basic concepts of Clustering and ClusterXL, including protocols,synchronization, and connection stickyness.
  • Explain the purpose of dynamic objects, updatable objects, and network feeds.
  • Describe the Identity Awareness components and configurations.
  • Describe different Check Point Threat Prevention solutions.
  • Articulate how the Intrusion Prevention System is configured.
  • Explain the purpose of Domain-based VPNs.
  • Describe situations where externally managed certificate authentication is used.
  • Describe how client security can be provided by Remote Access.
  • Discuss the Mobile Access Software Blade.
  • Define performance tuning solutions and basic configuration workflow.
  • Identify supported upgrade methods and procedures for Security Gateways.

WHO SHOULD ATTEND?

Technical professionals and experts who support, administer, or perform advanced deployment configurations of Check Point products.

Conspect Show list

  • Security Management
  • SmartConsole
  • Deployment
  • Object Management
  • Licenses and Contracts
  • Policy Rules and Rulebase
  • Policy Packages
  • Policy Layers
  • Traffic Inspection
  • Network Address Translation
  • Application Control
  • URL Filtering
  • Logging
  • Snapshots
  • Backup and Restore
  • Gaia
  • Permissions
  • Policy Installation
  • Advanced Deployments
  • Management High Availability
  • Advanced Gateway Deployment
  • Advanced Policy Configuration
  • Advanced User Access Management
  • Custom Threat Protection
  • Advanced Site-to-Site VPN
  • Remote Access VPN
  • Mobile Access VPN
  • Advanced Security Monitoring
  • Performance Tuning
  • Advanced Security Maintenance
  • Lab Exercises
    • Deploy SmartConsole
    • Install a Security Management Server
    • Install a Security Gateway
    • Configure Objects in SmartConsole
    • Establish Secure Internal Communication
    • Manage Administrator Access
    • Manage Licenses
    • Create a Security Policy
    • Configure Order Layers
    • Configure a Shared Inline Layer
    • Configure NAT
    • Integrate Security with a Unified Policy
    • Elevate Security with Autonomous Threat Prevention
    • Configure a Locally Managed Site-to-Site VPN
    • Elevate Traffic View
    • Monitor System States
    • Maintain the Security Environment
    • Navigate the Environment and Use the Management API
    • Deploy Secondary Security Management Server
    • Configure a Dedicated Log Server
    • Deploy SmartEvent
    • Configure a High Availability Security Gateway Cluster
    • Work with ClusterXL
    • Configure Dynamic and Updateable Objects
    • Verify Accelerated Policy Installation and Monitoring Status
    • Elevate Security with HTTPS Inspection
    • Deploy Identity Awareness
    • Customize Threat Prevention
    • Configure a Site-to-Site VPN with an Interoperable Device
    • Deploy Remote Access VPN
    • Configure Mobile Access VPN
    • Monitor Policy Compliance
    • Report SmartEvent Statistics
    • Tune Security Gateway Performance
Download conspect training as PDF

Additional information

Prerequisites

One-year experience on Check Point products. Working knowledge of Windows, UNIX, networking technology, the Internet and TCP/IP is recommended.

Difficulty level
Duration 5 days
Certificate

The participants will obtain certificates signed by Check Point Software Technologies Ltd. (course completion).

This course additionally helps prepare for CCSA #156-215.81 and CCSE #156-315.81 exams available at Pearson VUE test centers.

Trainer

Authorized Check Point Software Technologies Ltd. Trainer

Other training Check Point | Core Training

Training thematically related

Security

Contact form

Please fill form below to obtain more info about this training.







* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

PRICE 2400 EUR We also accept payment using IGS (Infinity Global Services) credits issued by Check Point. In such cases, please contact us at szkolenia@compendium.pl

Promotions available

enter the promotion code:
(green color = code correct)
the discount will be applied after entering the correct code
 

FORM OF TRAINING ?

 

TRAINING MATERIALS ?

 

SELECT TRAINING DATE

  • hybrid training: HYBRID
    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
  • hybrid training: HYBRID
    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
  • hybrid training: HYBRID
    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
Book a training appointment
close

Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

Dlearning training

You may participate from at any place in the world. It is sufficient to have a computer (or, actually a tablet, or smartphone) connected to the Internet. Compendium CE provides each Distance Learning training participant with adequate software enabling connection to the Data Center. For more information, please visit dlearning.eu site

close

Paper materials

Traditional materials: The price includes standard materials issued in the form of paper books, printed or other, depending on the arrangements with the manufacturer.

Electronic materials

Electronic materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.

Upcoming Check Point training

Training schedule Check Point