<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

Check Point Training

Check Point Security Administrator (CCSA) R80.10

Course Overview

Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation – bringing all security protections and functions under one umbrella. With R80 management, security consolidation is fully realized. This course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80.

This course prepares the participants for the CCSA R80.10 certification exam #156-215.80. The participants will receive 6 months access to the labs. 

Duration:  3 Days 

Prerequisites: Basic knowledge of networking.  6 months to 1 year of experience with Check Point products recommended.

Price: $2,695



Who Should Attend

Technical persons who support, install, deploy or administer Check Point Software Blade modules should attend this course. This could include the following:  

  • Security Managers
  • System Administrators
  • Network Engineers
  • Support Analysts
  • Professionals who want to earn Check Point Certified Security Administrator (CCSA) R80.10 certification, exam # 156-215.80.



  • Install R80 management and a security gateway in a distributed environment
  • Configure objects, rules, and settings to define a security policy
  • Work with multiple concurrent administrators and define permission profiles
  • Configure a Virtual Private Network and work with Check Point clustering
  • Perform periodic administrator tasks as specified in administrator job descriptions 


Chapter 1:  Working with Gaia Portal

  • Identify important operating system level settings configured through the Web UI
  • Create and confirm administrator users for the domain
  • Configure network messages
  • Confirm existing configuration settings
  • Perform an installation of the SmartConsole application
  • Connect and tour SmartConsole 

Chapter 2 :  Modifying an existing Security Policy

  • Create and configure network, host, and gateway objects
  • Evaluate and manipulate rules in a unified Access Control Security Policy
  • Configure Network Address Translation for server and network objects
  • Create multiple administrators and apply different roles and permissions for concurrent administration
  • Install a remote Security Gateway in a distributed environment using the network detailed in the course topology
  • Verify SIC establishment between the Security Management Server and the remote Security Gateway
  • Create basic Rule Base with site specific rules
  • Prepare and schedule backups for the gateway 

Chapter 3:  Defining Access Control Policy Layers

  • Assign the Application Control layer to an existing Security Policy
  • Understand how to establish the Application Control and URL Filtering software blades to block access to various application
  • Demonstrate how to share a layer between Security Policies

Chapter 4:  Activating the Compliance Software blade

  • Enable to Compliance software blade
  • Validate existing licenses for products installed on the network

Chapter 5:  Working with Check Point Logs

  • Generate network traffic and use traffic visibility tools to monitor the data
  • Utilize various traffic visibility tools to maintain Check Point logs

Chapter 6:  Configuring site-to-site VPN Between Alpha and Bravo

  • Configure and deploy a site-to-site VPN
  • Test the VPN connection and analyze the tunnel traffic 

Chapter 7:  Providing User Access

  • Enable Identity Awareness
  • Deploy User Access role for more granular control of the Security Policy 

Chapter 8:  Working with ClusterXL

  • Test ClusterXL High Availability 

Chapter 9:  Verifying Network Compliance

  • Review the results of a compliance scan
  • Perform periodic task as specified in administrator job descriptions
  • Understand how to use CPView to gather basic gateway status information



What our clients are saying:

"Tim provided some extra content to compliment the Check Point material. Tim didn't just read from the slides, he taught the material and used examples while including the class."

"Being able to take the training from home was a huge plus. It was more of a relaxed environment."

"I think that Tim's additional "bonus" materials/topics he provided (PKI, Certs, x500, x509, LDAP, Rule Quiz Handout, and AD) was very beneficial as it helped me to better understand processes going on in the back ground."