Check Point Certified Security Administrator R80 Training and Certification Course

7254 Learners

The CCSA R80 (Check Point Certified Security Administrator) course offers an in-depth  insight into the basic concepts and the skills, that are essential for configuring Check Point Security Gateway as well as Managing Software Blades. In other Words, the training enlightens the candidates on managing the complexities and threats posed through security consolidation; with R80, the security consolidation is fully realized. Moreover, the CCSA R80 Training in Delhi aims to insight the candidates on:

  • Effective implementation of the Check Point backup techniques.
  • How to determine as well as manage the threats and identify the opportunities for improving the performance.
  • How to describe the users and user groups.
  • What is Construe the concept of a firewall?
  • Comprehending the scenario of how the traffic inspection takes place.
  • How to manage internal and external user access.
  • Analyzing and interpreting the VPN tunnel traffic.
Target audience
  • System administrators
  • Security managers
  • Network engineers
  • Analysts
Prerequisites

Candidates should have gained at least 6 months to 1 year of experience with the Check Point products recommended : Check Point User and Pearson VUE Test Center account.

The CCSA R80 (Check Point Certified Security Administrator) course offers an in-depth  insight into the basic concepts and the skills, that are essential for configuring Check Point Security Gateway as well as Managing Software Blades. In other Words, the training enlightens the candidates on managing the complexities and threats posed through security consolidation; with R80, the security consolidation is fully realized. Moreover, the CCSA R80 Training in Delhi aims to insight the candidates on:

  • Effective implementation of the Check Point backup techniques.
  • How to determine as well as manage the threats and identify the opportunities for improving the performance.
  • How to describe the users and user groups.
  • What is Construe the concept of a firewall?
  • Comprehending the scenario of how the traffic inspection takes place.
  • How to manage internal and external user access.
  • Analyzing and interpreting the VPN tunnel traffic.
Target audience
  • System administrators
  • Security managers
  • Network engineers
  • Analysts
Prerequisites

Candidates should have gained at least 6 months to 1 year of experience with the Check Point products recommended : Check Point User and Pearson VUE Test Center account.

Check Point Certified Security Administrator R80 Training and Certification Course Course Content

1. Introduction to Check Point Architecture

  • Identify the basic functions of the Web UI.
  • Create and confirm admin users for the network.
  • Configure network messages.
  • Confirm existing network configuration settings.
  • Install and tour the GUI.
  • Describe the key elements of Check Point’s unified, 3-tiered architecture.
  • Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic.
  • Recognize SmartConsole features, functions and tools.
  • Understand Check Point deployment options

2. Security Policy Management

  • Create multiple administrators and apply different roles/permissions for Concurrent administration.
  • Create and configure network, host and gateway objects.
  • Evaluate and manipulate rules in a unified Access Control security policy.
  • Apply policy layers and analyze how they affect traffic inspection.
  • Prepare and schedule backups for the gateway.
  • Describe the essential elements of a unified security policy.
  • Understand how traffic inspection takes place in a unified security policy.
  • Summarize how administration roles and permissions assist in managing policy.
  • Recall how to implement Check Point backup techniques.

3. Check Point Security Solutions

  • Evaluate and manage different Check Point security solutions deployed for network access control.
  • Evaluate and manage Check Point security solutions for threat protection.
  • Examine how the Compliance blade monitors your Check Point security infrastructure.
  • Validate existing licenses for products installed on your network.
  • Recognize Check Point security solutions & products and the way they protect your network.
  • Understand licensing and contract requirements for Check Point security solutions.

4. Traffic Visibility

  • Generate network traffic and use traffic visibility tools to monitor the data.
  • Compare and contrast various tools available for viewing traffic
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities.

5. Basic Concepts of VPN

  • Configure and deploy a site-to-site VPN.
  • Test the VPN connection and analyze the tunnel traffic.
  • Understand VPN deployments and Check Point Communities.
  • Understand how to analyze and interpret VPN tunnel traffic.

6. Managing User’s Access

  • Create and define user access for a guest wireless user.
  • Test Identity Awareness connection
  • Recognize how to define users and user groups for your environment.
  • Understand how to manage user access for internal users and guests.

7. Working with Cluster XL

  • Install and configure ClusterXL with a High Availability configuration.
  • Describe the basic concept of ClusterXL technology and its advantages.

8. Administrator Task Implementation

  • Review rule-base performance for policy control.
  • Understand how to perform periodic administrator tasks as specified in Administrator job descriptions.

9. SmartEvent Reports

  • Generate reports that effectively summarize network activity.
  • Recognize how to effectively create, customize and generate network

Drop Us a Query

+91 95550 06479

Available 24x7 for your queries

Check Point Certified Security Administrator R80 Corporate Training & Certification Program and

Employee training and development programs are essential to the success of businesses worldwide. With our best-in-class corporate trainings you can enhance employee productivity and increase efficiency of your organization. Created by global subject matter experts, we offer highest quality content that are tailored to match your company’s learning goals and budget.

Learn from the experts

Customized Training

Be it schedule, duration or course material, you can entirely customize the trainings depending on the learning requirements of your workforce. You can even choose a trainer from our team of certified industry experts.

Learn from the experts

Expert Mentors

Get trained from our team of highly skilled and certified trainers, who are officially accredited professionals with relevant industry experience and adept in providing the knowledge and skills required to be successful.

Learn from the experts

360º Learning Solution

Engage your employees with our all-inclusive learning platform. Avail benefits of 24/7 access to the learning management system, industry-certified mentors, assessments & mock tests, real-time learning and more.

Learn from the experts

Learning Assessment

Check test score and performance with our skills analysis tools. Our detail scoreboard displays scores, areas of strength, detailed answer of questions and more for each employee.

Download Corporate Brochure

+91 9555006479

Available 24x7