Check Point Security Administration & Security Engineering Bundle (CCSA/CCSE)


This 5-day Bootcamp course covers everything needed to start up, configure and manage daily operations of Check Point 3D Security Systems. CCSA course is essential for security administrators who want to configure security policies, secure communications across the Internet, defend against network threats, and manage a secure network. This course covers concepts and skills necessary to implement, configure and maintain Check Point Software Blades including Firewall, IPSEC VPN, IPS, IPSO, network policy management, logging, status and monitoring, URL filtering, anti-virus, anti-malware, anti-spam & email security.


Customize It

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience / Target Group

This course is recommended for:
• Systems Administrators
• Network Engineers
• Support Analysts
• Any other IT professional seeking CCSA certification

Check Point Security Administration & Security Engineering Bundle Training (CCSA/CCSE) Related Courses

Duration: 5 days


After completing this course, attendees will be able to:

• Describe Check Point's unified approach to network management and key elements:
• Design in a distributed environment
• Install the Security Gateway in a distributed environment
• Perform a backup and restore the current Gateway installation from the command line
• Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line
• Deploy Gateways using the Gaia web interface
• Create and configure network, host and gateway objects
• Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard
• Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use
• Configure NAT rules on Web and Gateway servers
• Evaluate existing policies and optimize the rules based on current corporate requirements
• Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime
• Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data
• Use packet data to generate reports, troubleshoot system and security issues, and ensure network functionality
• Using SmartView Monitor, configure alerts and traffic counters, view a Gateway's status, monitor suspicious activity rules, analyze tunnel activity and monitorremote user access
• Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications
• Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways
• Upgrade and attach product licenses using SmartUpdate
• Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
• Manage users to access the corporate LAN by using external databases
• Use Identity Awareness to provide granular level access to network resources
• Acquire user information used by the Security Gateway to control access
• Define Access Roles for use in an Identity Awareness rule
• Implement Identity Awareness in the Firewall Rule Base
• Configure a pre-shared secret site-to-site VPN with partner sites
• Configure permanent tunnels for remote access to corporate resources
• Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels

Course Content:

The CCSE course teaches expert skills to manage and troubleshoot Check Point Software Blades and 3D Security systems including advanced firewall, advanced clustering, VPN and remote access.

• Introduction to Check Point Technology
• Deployment Platforms
• Introduction to the Security Policy
• Monitoring Traffic and Connections
• Using SmartUpdate
• User Management and Authentication
• Identity Awareness
• Introduction to Check Point VPNs


No Comments Yet.

Leave a comment