-
This course is aimed at those who want to expand their knowledge of the basic operation of the Check Point Firewall with the R81.20 release and offers a broader and more in-depth look at the technology. You will learn how to create, modify, deploy and troubleshoot the R81.20 Check Point Security Systems on the GAiA operating system. Hands-on lab exercises will teach you how to debug firewall processes, optimize VPN performance and update management servers.
-
Course Contents
-
- Advanced Deployments
- Management High Availability
- Advanced Gateway Deployment
- Advanced Policy Configuration
- Advanced User Access Management
- Custom Threat Protection
- Advanced Site-to-Site VPN
- Remote Access VPN
- Mobile Access VPN
- Advanced Security Monitoring
- Performance Tuning
- Advanced Security Maintenance
You will receive the original course documentation as a Check Point e-Kit.
-
Target Group
-
Technical professionals who support, install, deploy or manage Check Point products. Those seeking CCSE 81.20 certification should also attend this course.
-
Knowledge Prerequisites
-
Participants should have the knowledge from the course Check Point Certified Security Administrator R81.20 - CCSA. Furthermore, basic Unix and Windows knowledge, experience with certificate management, system administration and networking knowledge are helpful to successfully complete this course.
-
Alternatives
-
Book this course together with Check Point Certified Troubleshooting Expert R81.20 – CCTE as PowerPackage Check Point CCSE and CCTE for the discounted price of € 3.195,-.
-
Course Objective
-
- Identify the basic interfaces used to manage the Check Point environment
- Identify the technologies supported by Check Point for automation.
- Explain the purpose of the Check Management High Availability (HA) deployment.
- Describe the workflow for deploying a primary and secondary server solution.
- Explain the basic concepts of clustering and ClusterXL, including protocols, synchronization, and connection stability.
- Explain how to exclude services from synchronization or delay synchronization.
- Explain the policy installation process.
- Explain the purpose of dynamic objects, updatable objects and network feeds.
- Understand how to manage user access for internal and external users.
- Describe the different Check Point Threat Prevention solutions.
- Explain how to configure the Intrusion Prevention System.
- Gain knowledge about Check Point's IoT Protect.
- Explain the purpose of domain-based VPNs.
- Describe situations where externally managed certificate authentication is used.
- Describe how client security can be ensured through remote access.
- Discuss the mobile access software blade.
- Explain how to determine if the configuration complies with best practices.
- Define performance optimization solutions and basic configuration procedures.
- Identify supported upgrade and migration methods and procedures for security management servers and dedicated log and SmartEvent servers.
- Identify the supported upgrade methods and procedures for Security Gateways.
Exercises |
Navigate the Environment and Using the Management API |
Deploy Secondary Security Management Server |
Configure a Dedicated Log Server |
Deploy SmartEvent |
Configure a High Availability Security Gateway Cluster |
Work with ClusterXL |
Configure Dynamic and Updateable Objects |
Verify Accelerated Policy Installation and Monitoring Status |
Elevate Security with HTTPS Inspection |
Deploy Identity Awareness |
Customize Threat Prevention |
Configure a Site-to-Site VPN with an Interoperable Device |
Deploy Remote Access VPN |
Configure Mobile Access VPN |
Monitor Policy Compliance |
Report SmartEvent Statistics |
Tuning Security Gateway Performance |

Certification as CCSA R81/CCSE R81 Certifications – Check Point Certified Security Administrator/Expert

-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
This course is aimed at those who want to expand their knowledge of the basic operation of the Check Point Firewall with the R81.20 release and offers a broader and more in-depth look at the technology. You will learn how to create, modify, deploy and troubleshoot the R81.20 Check Point Security Systems on the GAiA operating system. Hands-on lab exercises will teach you how to debug firewall processes, optimize VPN performance and update management servers.
-
Course Contents
-
- Advanced Deployments
- Management High Availability
- Advanced Gateway Deployment
- Advanced Policy Configuration
- Advanced User Access Management
- Custom Threat Protection
- Advanced Site-to-Site VPN
- Remote Access VPN
- Mobile Access VPN
- Advanced Security Monitoring
- Performance Tuning
- Advanced Security Maintenance
You will receive the original course documentation as a Check Point e-Kit.
-
Target Group
-
Technical professionals who support, install, deploy or manage Check Point products. Those seeking CCSE 81.20 certification should also attend this course.
-
Knowledge Prerequisites
-
Participants should have the knowledge from the course Check Point Certified Security Administrator R81.20 - CCSA. Furthermore, basic Unix and Windows knowledge, experience with certificate management, system administration and networking knowledge are helpful to successfully complete this course.
-
Alternatives
-
Book this course together with Check Point Certified Troubleshooting Expert R81.20 – CCTE as PowerPackage Check Point CCSE and CCTE for the discounted price of € 3.195,-.
-
Course Objective
-
- Identify the basic interfaces used to manage the Check Point environment
- Identify the technologies supported by Check Point for automation.
- Explain the purpose of the Check Management High Availability (HA) deployment.
- Describe the workflow for deploying a primary and secondary server solution.
- Explain the basic concepts of clustering and ClusterXL, including protocols, synchronization, and connection stability.
- Explain how to exclude services from synchronization or delay synchronization.
- Explain the policy installation process.
- Explain the purpose of dynamic objects, updatable objects and network feeds.
- Understand how to manage user access for internal and external users.
- Describe the different Check Point Threat Prevention solutions.
- Explain how to configure the Intrusion Prevention System.
- Gain knowledge about Check Point's IoT Protect.
- Explain the purpose of domain-based VPNs.
- Describe situations where externally managed certificate authentication is used.
- Describe how client security can be ensured through remote access.
- Discuss the mobile access software blade.
- Explain how to determine if the configuration complies with best practices.
- Define performance optimization solutions and basic configuration procedures.
- Identify supported upgrade and migration methods and procedures for security management servers and dedicated log and SmartEvent servers.
- Identify the supported upgrade methods and procedures for Security Gateways.
Exercises |
Navigate the Environment and Using the Management API |
Deploy Secondary Security Management Server |
Configure a Dedicated Log Server |
Deploy SmartEvent |
Configure a High Availability Security Gateway Cluster |
Work with ClusterXL |
Configure Dynamic and Updateable Objects |
Verify Accelerated Policy Installation and Monitoring Status |
Elevate Security with HTTPS Inspection |
Deploy Identity Awareness |
Customize Threat Prevention |
Configure a Site-to-Site VPN with an Interoperable Device |
Deploy Remote Access VPN |
Configure Mobile Access VPN |
Monitor Policy Compliance |
Report SmartEvent Statistics |
Tuning Security Gateway Performance |

Certification as CCSA R81/CCSE R81 Certifications – Check Point Certified Security Administrator/Expert

-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
