Check Point Security Administration Training R80 (CCSA)

Print Friendly, PDF & Email


Check Point Security Administration Training R80 (CCSA) Course with Hands-on Labs

Check Point Security Administration Training R80 (CCSA) provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

An introductory Check Point Security Administration Training R80 (CCSA) course that will give you the basic concepts and skills necessary to configure Check Point Gaia Security systems. You will deploy component systems, implement and maintain a Security Policy and learn about managing and monitoring a secure network, upgrading and configuring a Security Gateway and implementing a virtual private network. Lab exercises will include installations, building and merging security policies, utilizing monitoring utilities, configuring NAT, and deploying NAT, Identity Awareness, Threat Management, and VPNs.

Customize It

● If you are familiar with some aspects of this Check Point Security Administration Training R80 (CCSA) course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Audience / Target Group

• This course is recommended for technical professionals, who support, install, deploy or administer Check Point Software Blades.

Check Point Security Administration Training R80 (CCSA) Related Courses

Duration: 3 days


• General knowledge of network technology, TCP/IP, Windows, and UNIX/Linux


After completing this Check Point Security Administration Training R80 (CCSA) course, attendees will be able to:

• At the end of the course, you will be able to:
• Describe the key elements of Check Point?s unified, secure management architecture
• Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic
• Recognize SmartConsole features and functions
• Understand Check Point deployment options
• Describe the basic functions of the Gaia OS
• Describe the elements of a unified security policy
• Understand how traffic inspection takes place in a unified security policy
• Summarize how administration roles and permissions assist in managing policy
• Implement Check Point backup techniques
• Recognize Check Point Security Solutions and Products and how they work to protect your network
• Understand licensing and contract requirements for Check Point security products
• Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
• Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities
• Understand Site-to-Site and Remote Access VPN deployments and VPN communities
• Understand how to analyze and interpret VPN tunnel traffic
• Recognize how to define users and user groups
• Manage user access for internal and external users
• Understand the basic concepts of ClusterXL technology and its advantages
• Understand how to perform periodic administrator tasks as specified in administrator job descriptions

Course Content:

• Introduction to Check Point Technology
• Security Policy Management
• Check Point Security Solutions and Licensing
• Traffic Visibility
• Basic Concepts of VPN
• Managing User Access
• Working with ClusterXL
• Administrator Task ImplementationUnified Gateway


• Defining roles and users in Gaia Portal
• Installing and navigating SmartConsole
• Configuring objects, rules, and settings to define a Security Policy
• Publishing database changes
• Installing and managing a remote Security Gateway
• Performing Hide and Static Network Address Translation
• Configuring Application Control and URL filtering Access Control policy layers
• Working with multiple concurrent Administrators and testing permissions profiles
• Working with Check Point licenses
• Viewing and maintaining logs
• Configuring a Virtual Private Network
• Providing User Access
• Working with Check Point clustering
• Producing Check Point reports

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment