Check Point Stars Partner Logo

Check Point Certified Security Administrator R82

CCSA

Check Point Stars Partner Logo

Please note: The September event will still be held in version R81.20. 

This course provides students with the fundamental knowledge, skills, and hands-on experience needed to configure, manage, and monitor an existing Quantum Security Environment. Students will learn how to access and navigate the Gaia Portal and the Gaia Command Line Interface, manage Administrator access, create and configure Network Objects, create new Security Policies, configure Ordered Layers and a Shared Inline Layer, elevate the traffic view and monitor system states, configure Identity Awareness, elevate security with HTTPS Inspection, configure Application Control and URL Filtering, and configure Autonomous Threat Prevention.

Course Contents

  • Introduction to Quantum Security
  • Administrator Account Management
  • Object Management
  • Security Policy Management
  • Policy Layers
  • Security Operations Monitoring
  • Identity Awareness
  • HTTPS Inspection
  • Application Control and URL Filtering
  • Threat Prevention Fundamentals

E-Book Symbol You will receive the original course documentation as a Check Point e-Kit.

Request in-house training now

Target Group

  • Security Administrators
  • Security Engineers
  • Security Analysts
  • Security Consultants
  • Security Architects 

Knowledge Prerequisites

•    Unix-like and/or Windows OS 
•    Internet Fundamentals
•    Networking Fundamentals
•    Networking Security
•    System Administration
•    TCP/IP Networking

The course Check Point Deployment Administrator R82 – CPDA is suggested.

Alternatives

Book this course together with Check Point Certified Troubleshooting Administrator R81.20 – CCTA as PowerPackage Check Point CCSA and CCTA for the discounted price of € 3.195,-.

Complementary and Continuative Courses

Check Point Certified Security Expert R82 – CCSE
CCSA R82/CCSE R82 – Qualification Package
Check Point Cybersecurity BootCamp R81.20 – CCSA & CCSE
Check Point Certified Troubleshooting Administrator R81.20 – CCTA
Module 1: Introduction to Quantum Security
Identify the primary components of the Check
Point Three-Tier Architecture and explain how they
work together in the Check Point environment.
Lab Tasks
Explore Gaia on the Security Management Server
Explore Gaia on the Dedicated Log Server
Explore Gaia on the Security Gateway Cluster Members
Connect to SmartConsole
Navigate GATEWAYS & SERVERS Views
Navigate SECURITY POLICIES Views
Navigate LOGS & EVENTS Views
Navigate MANAGE & SETTINGS Views
 
Module 2: Administrator Account Management
Explain the purpose of SmartConsole administrator accounts.
Identify useful features for administrator collaboration, such as session management, concurrent administration, and concurrent policy installation.
Lab Tasks
Create New Administrators and Assign Profiles
Test Administrator Profile Assignments
Manage Concurrent Administrator Sessions
Take Over Another Session and Verify Session Status
 
Module 3: Object Management
Explain the purpose of SmartConsole Objects.
Give examples of SmartConsole Physical and Logical Objects.
Lab Task3
View and Modify GATEWAYS & SERVERS Objects
View and Modify Network Objects
View and Modify Service Objects
 
Module 4: Security Policy Management
Explain the purpose of Security Policies.
Identify the essential elements of a Security Policy.
Identify features and capabilities that enhance the configuration and management of the Security Policy.
Lab Tasks
Verify the Security Policy
Modify Security Policies
Install the Standard Security Policy
Test the Security Policy
 
Module 5: Policy Layers
Demonstrate an understanding of the Check Point policy layer concept.
Explain how policy layers affect traffic inspection.
Lab Tasks
Add an Ordered Layer
Configure and Deploy the Ordered Layer Rules
Test the Ordered Layer Policy
Create an Inline DMZ Layer
Test the Inline DMZ Layer
 
Module 6: Security Operations Monitoring
Explain the purpose of Security Operations Monitoring.
Tune the Log Server configuration.
Use predefined and custom queries to filter the logging results.
Monitor the state of Check Point systems.
Lab Tasks
Configure Log Management
Enhance Rulebase View, Rules, and Logging
Review Logs and Search for Data
Configure the Monitoring Blade
Monitor the Status of the Systems
 
Module 7: Identity Awareness
Explain the purpose of the Identity Awareness solution.
Identify the essential elements of Identity Awareness.
Lab Tasks
Adjust the Security Policy for Identity Awareness
Configure the Identity Collector
Define the User Access Role
Test Identity Awareness
 
Module 8: HTTPS Inspection
Explain the purpose of the HTTPS Inspection solution.
Identify the essential elements of HTTPS Inspection.
Lab Tasks
Enable HTTPS Inspection
Adjust Access Control Rules
Deploy the Security Gateway Certificate
Test and Analyze Policy with HTTPS Inspection
 
Module 9: Application Control and URL Filtering
Explain the purpose of the Application Control and URL Filtering solutions.
Identify the essential elements of Application Control and URL Filtering.
Lab Tasks
Adjust the Access Control Policy
Create and Adjust Application Control and URL
Test and Adjust the Application Control and URL Filtering Rules
 
Module 10: Threat Prevention Fundamentals
Explain the purpose of the Threat Prevention solution.
Identify the essential elements of Autonomous Threat Prevention.
Lab Tasks
Enable Autonomous Threat Prevention
Test Autonomous Threat Prevention
Zertifizierungen Symbol You are interested in a certification? The course at hand is part of the following certification(s):

Certification as CCSA R82/CCSE R82 Certifications – Check Point Certified Security Administrator/Expert

Qualification Package Symbol The descriptions of the certifications also include the corresponding Qualification Packages, which help you reach your certification target with significant cost savings compared to the single booking of courses and examinations.

CCSA R82/CCSE R82 – Qualification Package

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

Please note: The September event will still be held in version R81.20. 

This course provides students with the fundamental knowledge, skills, and hands-on experience needed to configure, manage, and monitor an existing Quantum Security Environment. Students will learn how to access and navigate the Gaia Portal and the Gaia Command Line Interface, manage Administrator access, create and configure Network Objects, create new Security Policies, configure Ordered Layers and a Shared Inline Layer, elevate the traffic view and monitor system states, configure Identity Awareness, elevate security with HTTPS Inspection, configure Application Control and URL Filtering, and configure Autonomous Threat Prevention.

Course Contents

  • Introduction to Quantum Security
  • Administrator Account Management
  • Object Management
  • Security Policy Management
  • Policy Layers
  • Security Operations Monitoring
  • Identity Awareness
  • HTTPS Inspection
  • Application Control and URL Filtering
  • Threat Prevention Fundamentals

E-Book Symbol You will receive the original course documentation as a Check Point e-Kit.

Request in-house training now

Target Group

  • Security Administrators
  • Security Engineers
  • Security Analysts
  • Security Consultants
  • Security Architects 

Knowledge Prerequisites

•    Unix-like and/or Windows OS 
•    Internet Fundamentals
•    Networking Fundamentals
•    Networking Security
•    System Administration
•    TCP/IP Networking

The course Check Point Deployment Administrator R82 – CPDA is suggested.

Alternatives

Book this course together with Check Point Certified Troubleshooting Administrator R81.20 – CCTA as PowerPackage Check Point CCSA and CCTA for the discounted price of € 3.195,-.

Complementary and Continuative Courses

Check Point Certified Security Expert R82 – CCSE
CCSA R82/CCSE R82 – Qualification Package
Check Point Cybersecurity BootCamp R81.20 – CCSA & CCSE
Check Point Certified Troubleshooting Administrator R81.20 – CCTA

Module 1: Introduction to Quantum Security
Identify the primary components of the Check
Point Three-Tier Architecture and explain how they
work together in the Check Point environment.
Lab Tasks
Explore Gaia on the Security Management Server
Explore Gaia on the Dedicated Log Server
Explore Gaia on the Security Gateway Cluster Members
Connect to SmartConsole
Navigate GATEWAYS & SERVERS Views
Navigate SECURITY POLICIES Views
Navigate LOGS & EVENTS Views
Navigate MANAGE & SETTINGS Views
 
Module 2: Administrator Account Management
Explain the purpose of SmartConsole administrator accounts.
Identify useful features for administrator collaboration, such as session management, concurrent administration, and concurrent policy installation.
Lab Tasks
Create New Administrators and Assign Profiles
Test Administrator Profile Assignments
Manage Concurrent Administrator Sessions
Take Over Another Session and Verify Session Status
 
Module 3: Object Management
Explain the purpose of SmartConsole Objects.
Give examples of SmartConsole Physical and Logical Objects.
Lab Task3
View and Modify GATEWAYS & SERVERS Objects
View and Modify Network Objects
View and Modify Service Objects
 
Module 4: Security Policy Management
Explain the purpose of Security Policies.
Identify the essential elements of a Security Policy.
Identify features and capabilities that enhance the configuration and management of the Security Policy.
Lab Tasks
Verify the Security Policy
Modify Security Policies
Install the Standard Security Policy
Test the Security Policy
 
Module 5: Policy Layers
Demonstrate an understanding of the Check Point policy layer concept.
Explain how policy layers affect traffic inspection.
Lab Tasks
Add an Ordered Layer
Configure and Deploy the Ordered Layer Rules
Test the Ordered Layer Policy
Create an Inline DMZ Layer
Test the Inline DMZ Layer
 
Module 6: Security Operations Monitoring
Explain the purpose of Security Operations Monitoring.
Tune the Log Server configuration.
Use predefined and custom queries to filter the logging results.
Monitor the state of Check Point systems.
Lab Tasks
Configure Log Management
Enhance Rulebase View, Rules, and Logging
Review Logs and Search for Data
Configure the Monitoring Blade
Monitor the Status of the Systems
 
Module 7: Identity Awareness
Explain the purpose of the Identity Awareness solution.
Identify the essential elements of Identity Awareness.
Lab Tasks
Adjust the Security Policy for Identity Awareness
Configure the Identity Collector
Define the User Access Role
Test Identity Awareness
 
Module 8: HTTPS Inspection
Explain the purpose of the HTTPS Inspection solution.
Identify the essential elements of HTTPS Inspection.
Lab Tasks
Enable HTTPS Inspection
Adjust Access Control Rules
Deploy the Security Gateway Certificate
Test and Analyze Policy with HTTPS Inspection
 
Module 9: Application Control and URL Filtering
Explain the purpose of the Application Control and URL Filtering solutions.
Identify the essential elements of Application Control and URL Filtering.
Lab Tasks
Adjust the Access Control Policy
Create and Adjust Application Control and URL
Test and Adjust the Application Control and URL Filtering Rules
 
Module 10: Threat Prevention Fundamentals
Explain the purpose of the Threat Prevention solution.
Identify the essential elements of Autonomous Threat Prevention.
Lab Tasks
Enable Autonomous Threat Prevention
Test Autonomous Threat Prevention

Zertifizierungen Symbol You are interested in a certification? The course at hand is part of the following certification(s):

Certification as CCSA R82/CCSE R82 Certifications – Check Point Certified Security Administrator/Expert

Qualification Package Symbol The descriptions of the certifications also include the corresponding Qualification Packages, which help you reach your certification target with significant cost savings compared to the single booking of courses and examinations.

CCSA R82/CCSE R82 – Qualification Package

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.