<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

Check Point Security Administrator (CCSA) R80.20

Course Overview

Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation – bringing all security protections and functions under one umbrella. With R80 management, security consolidation is fully realized. This course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80.

This course prepares the participants for the CCSA R80.20 certification exam #156-215.80.

With Cadre's enhanced course, the participants will receive 24/7 access to the labs for 6 months. The instructor will also provide additional study guide materials and lecture that are important to know for real-world use of the features covered in the class. Additional lecture to assist in passing the Check Point exam is also included. 

If you choose to take the class remotely, Cadre provides a fully modern remote classroom experience with a state-of-the-art high resolution digital whiteboard. The whiteboard is excellent for complex network diagrams. 

Duration:  3 Days 

Prerequisites: Basic knowledge of networking.  6 months to 1 year of experience with Check Point products recommended.

Price: $2,695 (Group discounts available)



Who Should Attend

Technical persons who support, install, deploy or administer Check Point Software Blade modules should attend this course. This could include the following:  

  • Security Managers
  • System Administrators
  • Network Engineers
  • Support Analysts
  • Professionals who want to earn Check Point Certified Security Administrator (CCSA) R80.20 certification, exam # 156-215.80.

Course Objectives:

Upon successful completion of this course, students will be able to: 

  • Install R80 management and a security gateway in a distributed environment
  • Configure objects, rules, and settings to define a security policy
  • Work with multiple concurrent administrators and define permission profiles
  • Configure a Virtual Private Network and work with Check Point clustering
  • Perform periodic administrator tasks as specified in administrator job descriptions 

Course Agenda:

Chapter 1:  Working with Gaia Portal

  • Identify important operating system level settings configured through the Web UI
  • Create and confirm administrator users for the domain
  • Configure network messages
  • Confirm existing configuration settings
  • Perform an installation of the SmartConsole application
  • Connect and tour SmartConsole 

Chapter 2:  Modifying an existing Security Policy

  • Create and configure network, host, and gateway objects
  • Evaluate and manipulate rules in a unified Access Control Security Policy
  • Configure Network Address Translation for server and network objects
  • Create multiple administrators and apply different roles and permissions for concurrent administration
  • Install a remote Security Gateway in a distributed environment using the network detailed in the course topology
  • Verify SIC establishment between the Security Management Server and the remote Security Gateway
  • Create basic Rule Base with site specific rules
  • Prepare and schedule backups for the gateway 

Chapter 3:  Defining Access Control Policy Layers

  • Assign the Application Control layer to an existing Security Policy
  • Understand how to establish the Application Control and URL Filtering software blades to block access to various application
  • Demonstrate how to share a layer between Security Policies

Chapter 4:  Activating the Compliance Software blade

  • Enable to Compliance software blade
  • Validate existing licenses for products installed on the network

Chapter 5:  Working with Check Point Logs

  • Generate network traffic and use traffic visibility tools to monitor the data
  • Utilize various traffic visibility tools to maintain Check Point logs

Chapter 6:  Configuring site-to-site VPN Between Alpha and Bravo

  • Configure and deploy a site-to-site VPN
  • Test the VPN connection and analyze the tunnel traffic 

Chapter 7:  Providing User Access

  • Enable Identity Awareness
  • Deploy User Access role for more granular control of the Security Policy 

Chapter 8:  Working with ClusterXL

  • Test ClusterXL High Availability 

Chapter 9:  Verifying Network Compliance

  • Review the results of a compliance scan
  • Perform periodic task as specified in administrator job descriptions
  • Understand how to use CPView to gather basic gateway status information