<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

Check Point Certified Security Administrator (CCSA) R81


Course Overview

Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation – bringing all security protections and functions under one umbrella. This three-day course covers everything you need to start up, configure and manage daily operations of R81.x Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.

Also, our courses go well beyond the standard Check Point classes with improvements such as exam guidance, topics “not in the book” and bonus materials that allow students to explore and use R81 hands-on or any other mix of R80.10 through R81.x

This course prepares the participants for the CCSA R81.10 certification exam #156-218.81.

With Cadre's enhanced course, the participants will receive 24/7 access to the labs for 6 months. The instructor will also provide additional study guide materials and lecture that are important to know for real-world use of the features covered in the class. Additional lecture to assist in passing the Check Point exam is also included. 

If you choose to take the class Live on-line, Cadre provides a fully modern remote classroom experience with a state-of-the-art high resolution digital whiteboard. The whiteboard is excellent for complex network diagrams. 

Duration:  3 Days 

Prerequisites: Basic knowledge of networking. 6 months to 1 year of experience with Check Point products recommended.

Price: $2,995 (Group discounts available)



Who Should Attend

Technical persons who support, install, deploy or administer Check Point Software Blade modules should attend this course. This could include the following:  

  • Security Managers
  • System Administrators
  • Network Engineers
  • Support Analysts
  • Professionals who want to earn Check Point Certified Security Administrator (CCSA) R81 certification, exam # 156-218.81

Course Topics:

  • Introduction to Check Point Technology
  • Security Policy Management
  • Policy Layers
  • Check Point Security Solutions and Licensing
  • Traffic Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation

Course Objectives:

Upon successful completion of this course, students will be able to: 

  • Describe different Check Point Threat Prevention solutions for network attacks
  • Recognize SmartConsole features, functions and tools
  • Understand Check Point's IoT Protection
  • Describe the basic functions of Gaia operating system
  • Describe the essential elements of a Security Policy
  • Understand how to enable the Application Control and URL Filtering software
  • Blades to block access to various applications
  • Understand the Check Point policy layer concept
  • Recognize Check Point security solutions and products and how they work to protect your network
  • Understand licensing and contract requirements for Check Point security products
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
  • Understand the Infinity Threat Prevention system
  • Understand how the Intrusion Prevention System is configured, maintained and tuned
  • Describe how to configure manual and automatic NAT
  • Understand how to SmartConsole is used by administrators to give user access 
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions

Lab Exercises Include:

  • Configure the Security Management Server
  • Use the WebUI to run the First Time Wizard
  • Install the Smart Console
  • Install the Alpha Gateway using the network detailed in the course topology
  • Demonstrate how the Security Management Server and Gateway communicate
  • Test SIC Status
  • Create multiple administrators and apply different roles and permissions for simultaneous administration
  • Create and configure host, network and group objects
  • Create a simplified Security Policy
  • Demonstrate how to use Security Zones in policy
  • Demonstrate how to share a layer between Security Polices
  • Configure Network Address Translation for server and network objects
  • Enable Identity Awareness
  • Deploy user access roles for more granular control of the security policy
  • Generate network traffic and use traffic visibility tools to monitor the data
  • Use SmartConsole and SmartView Monitor to view status, alerts and block suspicious traffic