<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

Check Point Security Administrator (CCSA) R80.20

Course Overview

Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation – bringing all security protections and functions under one umbrella. With R80 management, security consolidation is fully realized. This course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with all R80 platforms.

Also, our courses go well beyond the standard Check Point classes with improvements such as exam guidance, topics “not in the book” and bonus materials that allow students to explore and use R80.40 hands-on or any other mix of R80.10 through R80.40. 

This course prepares the participants for the CCSA R80.20 certification exam #156-215.80.

With Cadre's enhanced course, the participants will receive 24/7 access to the labs for 6 months. The instructor will also provide additional study guide materials and lecture that are important to know for real-world use of the features covered in the class. Additional lecture to assist in passing the Check Point exam is also included. 

If you choose to take the class Live on-line, Cadre provides a fully modern remote classroom experience with a state-of-the-art high resolution digital whiteboard. The whiteboard is excellent for complex network diagrams. 

Duration:  3 Days 

Prerequisites: Basic knowledge of networking.  6 months to 1 year of experience with Check Point products recommended.

Price: $2,995 (Group discounts available)

CHECK AVAILABILITY

 

Who Should Attend

Technical persons who support, install, deploy or administer Check Point Software Blade modules should attend this course. This could include the following:  

  • Security Managers
  • System Administrators
  • Network Engineers
  • Support Analysts
  • Professionals who want to earn Check Point Certified Security Administrator (CCSA) R80.20 certification, exam # 156-215.80.

Course Topics:

  • Introduction to Check Point Technology
  • Security Policy Management
  • Policy Layers
  • Check Point Security Solutions and Licensing
  • Traffic Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation

Course Objectives:

Upon successful completion of this course, students will be able to: 

  • Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic
  • Describe the key elements of Check Point’s unified Security Management Architecture
  • Recognize SmartConsole features, functions and tools
  • Understand Check Point deployment options
  • Describe the basic functions of Gaia
  • Describe the essential elements of a Security Policy
  • Understand how traffic inspection takes place in a unified Security Policy
  • Summarize how administration roles and permissions assist in managing policy
  • Recall how to implement backup techniques
  • Understand the Check Point policy layer concept
  • Recognize Check Point security solutions and products and how they work to protect your network
  • Understand licensing and contract requirements for Check Point security products
  • Identify tools designed to monitor data, determine threats and recognize performance improvements
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities
  • Understand Site-to-Site and Remote Access VPN deployments and communities
  • Understand how to analyze and interpret VPN traffic
  • Recognize how to define users and user groups
  • Understand how to manage user access for internal and external users
  • Understand the basic concepts of ClusterXL technology and its advantages
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions

Lab Exercises Include:

  • Working with Gaia Portal
  • Modifying an Existing Security Policy
  • Configuring Hide and Static NAT
  • Managing Administrator Access
  • Installing and Managing a Remote Security Gateway 
  • Managing Backups
  • Defining Access Control Policy Layers
  • Defining and Sharing Security Policy Layers
  • Working with Licenses and Contracts
  • Working with Check Point Logs
  • Maintaining Check Point Logs
  • Configuring a Site-to-Site VPN 
  • Providing User Access
  • Working with Cluster XL
  • Verifying Network Compliance
  • Working with CP View