-
This course provides participants with the knowledge required to commission, configure and manage day-to-day work with the Check Point Security Gateway and the software blade architecture. It introduces the operation of the various software elements and explains the individual steps required to set up a customized firewall. In addition to the GAiA operating system, the course also uses the R81.20 release.
-
Course Contents
-
- Security Architecture
- SmartConsole
- Deployment
- Object Management
- Licenses and Contracts
- Policy Rule and Rulebase
- Policy Packages
- Policy Layers
- Traffic Inspection
- Network Address Translation
- Application Control
- URL Filtering
- Logging
- Snapshots
- Backup and Restore
- Gaia
- Permissions
- Policy Installation
You will receive the original course documentation as a Check Point e-Kit.
-
Target Group
-
Technical professionals who support, install, deploy or manage Check Point products. Those seeking CCSA 81.20 certification should also attend this course.
-
Knowledge Prerequisites
-
The participants should have a good knowledge of Unix-like and Windows operating systems as well as TCP/IP networks.
-
Alternatives
-
Book this course together with Check Point Certified Troubleshooting Administrator R81.20 – CCTA as PowerPackage Check Point CCSA and CCTA for the discounted price of € 3.195,-.
-
Course Objective
-
- Describe the main components of a three-tier check point architecture and explain how they work together in the check point environment.
- Explain how communication is secured and how traffic is routed in the Check Point environment.
- Describe the basic functions of the Gaia operating system.
- Identify the basic workflow for installing the Security Management Server and Security Gateway for a single domain solution.
- Create SmartConsole objects that match the organization's topology for use in policies and rules.
- Identify the tools available to manage Check Point licenses and contracts, including their purpose and use.
- Identify features and capabilities that enhance security policy configuration and management.
- Explain how policy levels affect traffic inspection.
- Explain how Network Address Translation affects traffic.
- Describe how manual and automatic Network Address Translation (NAT) is configured.
- Demonstrate your understanding of Application Control & URL Filtering and Autonomous Threat Prevention features and how to configure these solutions to meet an organization's security requirements.
- Explain how to configure pre-shared keys and certificates for authentication to third-party VPN gateways and externally managed VPN gateways.
- Describe how VPN tunnel traffic can be analyzed and interpreted.
- Configure logging parameters.
- Use predefined and user-defined queries to filter logging results.
- Monitor the health of supported Check Point hardware using the Gaia Portal and the command line.
- Describe the various methods for securing Check Point system information and discuss best practices and recommendations for each method.
Exercises |
Deploying SmartConsole |
Installing a Security Management Server |
Installing a Security Gateway |
Configuring Objects in SmartConsole |
Establishing Secure Internal Communication |
Managing Administrator Access |
Managing Licenses |
Creating a Security Policy |
Configuring Order Layers |
Configuring a Shared Inline Layer |
Configuring NAT |
Integrating Security with a Unified Policy |
Elevating Security with Autonomous Threat Prevention |
Configuring a Locally Managed Site-to-Site VPN |
Elevating Traffic View |
Monitoring System States |
Maintaining the Security Environment |

Certification as CCSA R81/CCSE R81 Certifications – Check Point Certified Security Administrator/Expert

-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
This course provides participants with the knowledge required to commission, configure and manage day-to-day work with the Check Point Security Gateway and the software blade architecture. It introduces the operation of the various software elements and explains the individual steps required to set up a customized firewall. In addition to the GAiA operating system, the course also uses the R81.20 release.
-
Course Contents
-
- Security Architecture
- SmartConsole
- Deployment
- Object Management
- Licenses and Contracts
- Policy Rule and Rulebase
- Policy Packages
- Policy Layers
- Traffic Inspection
- Network Address Translation
- Application Control
- URL Filtering
- Logging
- Snapshots
- Backup and Restore
- Gaia
- Permissions
- Policy Installation
You will receive the original course documentation as a Check Point e-Kit.
-
Target Group
-
Technical professionals who support, install, deploy or manage Check Point products. Those seeking CCSA 81.20 certification should also attend this course.
-
Knowledge Prerequisites
-
The participants should have a good knowledge of Unix-like and Windows operating systems as well as TCP/IP networks.
-
Alternatives
-
Book this course together with Check Point Certified Troubleshooting Administrator R81.20 – CCTA as PowerPackage Check Point CCSA and CCTA for the discounted price of € 3.195,-.
-
Course Objective
-
- Describe the main components of a three-tier check point architecture and explain how they work together in the check point environment.
- Explain how communication is secured and how traffic is routed in the Check Point environment.
- Describe the basic functions of the Gaia operating system.
- Identify the basic workflow for installing the Security Management Server and Security Gateway for a single domain solution.
- Create SmartConsole objects that match the organization's topology for use in policies and rules.
- Identify the tools available to manage Check Point licenses and contracts, including their purpose and use.
- Identify features and capabilities that enhance security policy configuration and management.
- Explain how policy levels affect traffic inspection.
- Explain how Network Address Translation affects traffic.
- Describe how manual and automatic Network Address Translation (NAT) is configured.
- Demonstrate your understanding of Application Control & URL Filtering and Autonomous Threat Prevention features and how to configure these solutions to meet an organization's security requirements.
- Explain how to configure pre-shared keys and certificates for authentication to third-party VPN gateways and externally managed VPN gateways.
- Describe how VPN tunnel traffic can be analyzed and interpreted.
- Configure logging parameters.
- Use predefined and user-defined queries to filter logging results.
- Monitor the health of supported Check Point hardware using the Gaia Portal and the command line.
- Describe the various methods for securing Check Point system information and discuss best practices and recommendations for each method.
Exercises |
Deploying SmartConsole |
Installing a Security Management Server |
Installing a Security Gateway |
Configuring Objects in SmartConsole |
Establishing Secure Internal Communication |
Managing Administrator Access |
Managing Licenses |
Creating a Security Policy |
Configuring Order Layers |
Configuring a Shared Inline Layer |
Configuring NAT |
Integrating Security with a Unified Policy |
Elevating Security with Autonomous Threat Prevention |
Configuring a Locally Managed Site-to-Site VPN |
Elevating Traffic View |
Monitoring System States |
Maintaining the Security Environment |

Certification as CCSA R81/CCSE R81 Certifications – Check Point Certified Security Administrator/Expert

-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
