Check Point Stars Partner Logo

Check Point Cybersecurity BootCamp R81.20

CCSA & CCSE

Check Point Stars Partner Logo

Certification to CCSA R81.20 and CCSE R81.20 normally requires attendance at two three-day courses. This BootCamp is ideal for participants who already have extensive experience with the Check Point Firewall and may have already completed a previous CCSA/CCSE certification.

In order to reach the certification goal faster, this five-day BootCamp covers all exam-relevant content and lab exercises of the two courses Check Point Certified Security Administrator R81.20 - CCSA and Check Point Certified Security Expert R81.20 - CCSE in a concentrated form. The extended course times (daily from 8 a.m. to 6 p.m.) form the time frame for the course. The lab is also available to participants around the clock during the course week for follow-up work and self-study of the content. At the end of the course, participants will have the knowledge to take the CCSA and CCSE R81.20 exams. Taking the exams is not part of this BootCamp.

Course Contents

CCSA - Security Administrator

  • Security Management
  • SmartConsole
  • Deployment
  • Object Management
  • Licenses and Contracts
  • Policy Rules and Rulebase
  • Policy Packages
  • Policy Layers
  • Traffic Inspection
  • Network Address Translation
  • Application Control
  • URL Filtering
  • Logging
  • Snapshots
  • Backup and Restore
  • Gaia
  • Permissions
  • Policy Installation

CCSE - Security Expert

  • Advanced Deployments
  • Management High Availability
  • Advanced Gateway Deployment
  • Advanced Policy Configuration
  • Advanced User Access Management
  • Custom Threat Protection
  • Advanced Site-to-Site VPN
  • Remote Access VPN
  • Mobile Access VPN
  • Advanced Security Monitoring
  • Performance Tuning
  • Advanced Security Maintenance

E-Book Symbol You will receive the original course documentation as a Check Point e-Kit.

Request in-house training now

Target Group

This course is aimed at participants who have experience in working with Check Point Firewalls and would like to learn the knowledge from the CCSA R81.20 and CCSE R81.20 courses in a compact form

Knowledge Prerequisites

One year of experience with Check Point products. Working knowledge of Windows, UNIX, network technology, Internet and TCP/IP is recommended.

Course Objective

CCSA - Security Administrator

  • Describe the major components of a three-tier Check Point architecture and explain how they work together in the Check Point environment.
  • Identify the basic workflow for installing the Security Management Server and Security Gateway for a single-domain solution.
  • Create SmartConsole objects that match the organization's topology for use in policies and rules.
  • Identify the tools available to manage Check Point licenses and contracts, including their purpose and use.
  • Identify features and functionality that enhance security policy configuration and management.
  • Demonstrate your understanding of Application Control & URL Filtering and Autonomous Threat Prevention and how to configure these solutions to meet an organization's security needs.
  • Describe how to analyze and interpret VPN tunnel traffic.
  • Describe how to monitor the health of supported Check Point hardware using Gaia Portal and the command line.
  • Describe the various methods for securing Check Point system information and discuss best practices and recommendations for each method.

CCSE - Security Expert

  • Identify the types of technologies Check Point supports for automation
  • Explain the purpose of the Check Management High Availability (HA) deployment
  • Explain the basic concepts of clustering and ClusterXL, including protocols, synchronization, and connection stability.
  • Explain the purpose of dynamic objects, updatable objects, and network feeds.
  • Describe the components and configurations of Identity Awareness.
  • Describe the different Check Point Threat Prevention solutions.
  • Explain how to configure the Intrusion Prevention System.
  • Explain the purpose of domain-based VPNs.
  • Describe situations where externally managed certificate authentication is used.
  • Describe how client security can be ensured through remote access.
  • Explain the Mobile Access Software Blade.
  • Define performance optimization solutions and basic configuration procedures.
  • Identify supported upgrade methods and procedures for security gateways.

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

Certification to CCSA R81.20 and CCSE R81.20 normally requires attendance at two three-day courses. This BootCamp is ideal for participants who already have extensive experience with the Check Point Firewall and may have already completed a previous CCSA/CCSE certification.

In order to reach the certification goal faster, this five-day BootCamp covers all exam-relevant content and lab exercises of the two courses Check Point Certified Security Administrator R81.20 - CCSA and Check Point Certified Security Expert R81.20 - CCSE in a concentrated form. The extended course times (daily from 8 a.m. to 6 p.m.) form the time frame for the course. The lab is also available to participants around the clock during the course week for follow-up work and self-study of the content. At the end of the course, participants will have the knowledge to take the CCSA and CCSE R81.20 exams. Taking the exams is not part of this BootCamp.

Course Contents

CCSA - Security Administrator

  • Security Management
  • SmartConsole
  • Deployment
  • Object Management
  • Licenses and Contracts
  • Policy Rules and Rulebase
  • Policy Packages
  • Policy Layers
  • Traffic Inspection
  • Network Address Translation
  • Application Control
  • URL Filtering
  • Logging
  • Snapshots
  • Backup and Restore
  • Gaia
  • Permissions
  • Policy Installation

CCSE - Security Expert

  • Advanced Deployments
  • Management High Availability
  • Advanced Gateway Deployment
  • Advanced Policy Configuration
  • Advanced User Access Management
  • Custom Threat Protection
  • Advanced Site-to-Site VPN
  • Remote Access VPN
  • Mobile Access VPN
  • Advanced Security Monitoring
  • Performance Tuning
  • Advanced Security Maintenance

E-Book Symbol You will receive the original course documentation as a Check Point e-Kit.

Request in-house training now

Target Group

This course is aimed at participants who have experience in working with Check Point Firewalls and would like to learn the knowledge from the CCSA R81.20 and CCSE R81.20 courses in a compact form

Knowledge Prerequisites

One year of experience with Check Point products. Working knowledge of Windows, UNIX, network technology, Internet and TCP/IP is recommended.

Course Objective

CCSA - Security Administrator

  • Describe the major components of a three-tier Check Point architecture and explain how they work together in the Check Point environment.
  • Identify the basic workflow for installing the Security Management Server and Security Gateway for a single-domain solution.
  • Create SmartConsole objects that match the organization's topology for use in policies and rules.
  • Identify the tools available to manage Check Point licenses and contracts, including their purpose and use.
  • Identify features and functionality that enhance security policy configuration and management.
  • Demonstrate your understanding of Application Control & URL Filtering and Autonomous Threat Prevention and how to configure these solutions to meet an organization's security needs.
  • Describe how to analyze and interpret VPN tunnel traffic.
  • Describe how to monitor the health of supported Check Point hardware using Gaia Portal and the command line.
  • Describe the various methods for securing Check Point system information and discuss best practices and recommendations for each method.

CCSE - Security Expert

  • Identify the types of technologies Check Point supports for automation
  • Explain the purpose of the Check Management High Availability (HA) deployment
  • Explain the basic concepts of clustering and ClusterXL, including protocols, synchronization, and connection stability.
  • Explain the purpose of dynamic objects, updatable objects, and network feeds.
  • Describe the components and configurations of Identity Awareness.
  • Describe the different Check Point Threat Prevention solutions.
  • Explain how to configure the Intrusion Prevention System.
  • Explain the purpose of domain-based VPNs.
  • Describe situations where externally managed certificate authentication is used.
  • Describe how client security can be ensured through remote access.
  • Explain the Mobile Access Software Blade.
  • Define performance optimization solutions and basic configuration procedures.
  • Identify supported upgrade methods and procedures for security gateways.

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.