For business inquiries : (+971) 561803315

For special requests : (+971) 561803315

A propos de la formation CCSA, Check Point Certified Security Administrator R81

The CCSA (Check Point Certified Security Administrator) R81 training is designed to prepare participants for the CCSA R81 certification exam by equipping them with the necessary techniques and methodologies. Participants will learn to implement security policies, network address translation (NAT), and utilize features like the Intrusion Prevention System (IPS).

Détails
Objectifs pédagogiques de la formation CCSA, Check Point Certified Security Administrator R81
  • Install and configure Check Point R81 product
  • Implement network address translation (NAT)
  • Deploy security policies and monitor traffic
  • Prepare for the official CCSA certification exam
  • Implement application control policy-URL filtering and user management.

Qui devrait suivre cette formation CCSA, Check Point Certified Security Administrator R81 ?

Public visé par la formation CCSA, Check Point Certified Security Administrator R81

This training is ideal for technicians, administrators, and system/network/security engineers aiming to obtain the CCSA R81 certification and develop practical skills in configuring and managing Check Point security solutions.  

Prérequis de la formation CCSA, Check Point Certified Security Administrator R81

Participants should have a good understanding of TCP/IP and basic knowledge of computer security to fully benefit from this training.

Formations Similaires

  • CISA – Certified Information Systems Auditor Détails
  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation CCSA, Check Point Certified Security Administrator R81


Module 1: Introduction to Check Point R81 Architecture
Overview of Check Point products.
New features in version R81.

Module 2: Gaia Deployment: Installing Check Point Appliances
Introduction to the Gaia system.
Three-tier architecture elements.
Modular architecture of Software Blades.
Check Point Infinity.
Distributed and standalone architecture.
Management server. SIC protocol.
Hands-on exercises: Installation of Check Point R81.

Module 3: Security Management Server Management
Getting started with SmartConsole R81.
Security policy. Rule management.
Unified Policies.
Packet inspection.
Inline Policies (sub-rules).
Hands-on exercises: Installation of SmartConsole. Creating objects. Creating a security policy. Activating anti-spoofing.

Module 4: Network Address Translation (NAT)
Address translation rules with IPv4 and IPv6.
Static NAT (One To One NAT) and dynamic NAT (Many To One NAT)/PAT.
Manual NAT.
ARP and routing issues.
Hands-on exercises: Implementing automatic NAT of static type, Hide, and manual transaction rules.

Module 5: Visibility: Log Management, Monitoring, and Reporting
Log management policy.
Tracking connections with Logs & Monitor (formerly SmartView Tracker).
SmartView Monitor, features, and alert thresholds.
Hands-on exercises: Activating monitoring, using the Suspicious Activity Monitoring Protocol, traffic visualization, monitoring the security policy state.

Module 6: License and Multi-Site Management
License structure.
License management in SmartUpdate and SmartConsole.
Types of licenses.
Contract and service management.
Monitoring license status.
Policy Packages definition.
Policy Packages management.
Layer definition and types.
Packet inspection in an Ordered Layer.
Layer sharing (Policy Layers Sharing).

Module 7: Administrator Management
Permission Profiles.
Limiting administrators' scope of action.
Concurrent user management.
Session management.
Hands-on exercises: Creating a new Permission Profile with limited permissions.

Module 8: HTTPS Decryption
Rule creation.
Certificate management.
Server Name Indications (SNI).
Hands-on exercises: Implementing HTTPS inspection.

Module 9: Application Control / URL Filtering
Limitations of a traditional firewall by IP and port.
Access control.
AppWiki. URL Filtering.
User Check.
Hands-on exercises: Web and Application filtering: creating and sharing Web and Application Filtering policy as Inline Layer and Ordered Layer.

Module 10: User-based Policy / Threat Prevention
Need to retrieve user identity.
Identity Awareness R81 authentication methods.
Access Role objects.
Threat Prevention policy and its Software Blades.
Rule management.
Security profiles.
Autonomous Threat Prevention.

Formations Similaires
CISA – Certified Information Systems Auditor Détails
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click