We are happy to advise you!
0845 470 1000     Contact

Instructor-Led Online Training (ILO)
Live Online Classes in the Virtual Classroom

Find out more and view dates

Check Point Security Administrator & Engineering Fast Track R80 (CCSAEFT-R80)

Detailed Course Outline

CCSA R80.10 - Course Topics

  • Introduction to Check Point Technology
  • Security Policy Management
  • Policy Layers
  • Check Point Security Solutions and Licensing
  • Traffic Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation

CCSA R80.10 - Lab Exercises

  • Working with Gaia Portal
  • Modifying an Existing Security Policy
  • Configuring Hide and Static NAT
  • Managing Administrator Access
  • Installing and Managing a Remote Security Gateway
  • Managing Backups
  • Defining Access Control Policy Layers
  • Defining and Sharing Security Policy Layers
  • Working with Licenses and Contracts
  • Working with Check Point Logs
  • Maintaining Check Point Logs
  • Configuring a Site-to-Site VPN
  • Providing User Access
  • Working with Cluster XL
  • Verifying Network Compliance
  • Working with CP View

CCSE R80.10 - Course Topics

  • System Management
  • Automation and Orchestration
  • Redundancy
  • Acceleration
  • SmartEvent
  • Mobile and Remote Access
  • Threat Prevention

CCSE R80.10 - Lab Exercises

  • Upgrading a Security Management Server to R80.10
  • Applying Check Point Hotfixes
  • Configuring a New Security Gateway Cluster
  • Core CLI Elements of Firewall Administration
  • Configuring Manual Network Address Translation
  • Managing Objects Using the Check Point API
  • Enabling Check Point VRRP
  • Deploying a Secondary Security Management Server
  • Viewing the Chain Modules
  • Working with SecureXL
  • Working with CoreXL
  • Evaluating Threats with SmartEvent
  • Managing Mobile Access
  • Understanding IPS Protections
  • Deploying IPS Geo Protection
  • Reviewing Threat Prevention Settings and Protections
  • Deploying Threat Emulation and Threat Extraction