Check Point Certified Security Administrator (CCSA) R81

CP_Elite

Course Overview

Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation – bringing all security protections and functions under one umbrella. This three-day course covers everything you need to start up, configure and manage daily operations of R81.x Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.

Also, our courses go well beyond the standard Check Point classes with improvements such as exam guidance, topics “not in the book” and bonus materials that allow students to explore and use R81 hands-on or any other mix of R80.10 through R81.x

This course prepares the participants for the CCSA R81.10 certification exam #156-218.81.

With Cadre's enhanced course, the participants will receive 24/7 access to the labs for 6 months. The instructor will also provide additional study guide materials and lecture that are important to know for real-world use of the features covered in the class. Additional lecture to assist in passing the Check Point exam is also included. 

If you choose to take the class Live on-line, Cadre provides a fully modern remote classroom experience with a state-of-the-art high resolution digital whiteboard. The whiteboard is excellent for complex network diagrams. 

Duration:  3 Days 

Prerequisites: Basic knowledge of networking. 6 months to 1 year of experience with Check Point products recommended.

Price: $2,995 (Group discounts available)

CHECK AVAILABILITY

 

Who Should Attend

Technical persons who support, install, deploy or administer Check Point Software Blade modules should attend this course. This could include the following:  

  • Security Managers
  • System Administrators
  • Network Engineers
  • Support Analysts
  • Professionals who want to earn Check Point Certified Security Administrator (CCSA) R81 certification, exam # 156-218.81

Course Topics:

  • Security Architecture                                                                         
  • Application Control                                                                                   
  • Deployment                                                                                      
  • Licensing
  • IoT
  • URL Filtering
  • Gaia Portal
  • Hide/Static NAT
  • Monitoring States
  • Traffic Visibility
  • Security Events
  • Threat Extraction and Emulation
  • Policy Layers
  • Browser SmartConsole
  • Infinity Threat Prevention
  • User Access

Course Objectives:

Upon successful completion of this course, students will be able to: 

  • Know how to perform periodic administrator tasks
  • Describe the basic functions of the Gaia operating system
  • Recognize SmartConsole features, functions, and tools
  • Understand how SmartConsole is used by administrators to give user access
  • Learn how Check Point security solutions and products work and how they protect networks
  • Understand licensing and contract requirements for Check Point security products
  • Describe the essential elements of a Security Policy
  • Understand the Check Point policy layer concept
  • Understand how to enable the Application Control and URL Filtering software
  • Blades to block access to various applications
  • Describe how to configure manual and automatic NAT
  • Identify tools designed to monitor data, determine threats and recognize opportunities for network attacks
  • Articulate how the Intrusion Prevention System is configured, maintained, and tuned
  • Understand the Infinity Threat Prevention system
  • Knowledge about Check Point’s IoT Protect

Lab Exercises Include:

  • Configure the Security Management Server
  • Use the WebUI to run the First Time Wizard
  • Install the Smart Console
  • Install the Alpha Gateway using the network detailed in the course topology
  • Demonstrate how the Security Management Server and Gateway communicate
  • Test SIC Status
  • Create multiple administrators and apply different roles and permissions for simultaneous administration
  • Validate existing licenses for products installed on the network
  • Create and configure host, network and group objects
  • Create a simplified Security Policy
  • Demonstrate how to use Security Zones in policy
  • Demonstrate how to share a layer between Security Polices
  • Configure Network Address Translation for server and network objects
  • Enable Identity Awareness
  • Generate network Traffic and use traffic visibility tools to monitor the data
  • Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic

CHECK AVAILABILITY