See how Insoft Services is responding to COVID-19

Check Point Certified Security Administrator (CCSA) R80 Blades 1

Check Point Certified Security Administrator (CCSA) R80 Blades 1 Training


Ti preghiamo di compilare questo modulo per prenotare in anticipo o richiedere ulteriori informazioni sulle date disponiibili.


Vorrei ricevere e-mail con gli ultimi aggiornamenti e le promozioni di Insoft.

Protezione dei dati e privacy

Con la presente autorizzo Insoft Ltd. a contattarmi su questo argomento. Inoltre, autorizzo Insoft Ltd. al trattamento dei miei dati personali, utilizzando la raccolta e la memorizzazione dei miei dati personali per lo scopo di queste attività. Tutti i vostri dati saranno protetti e protetti come indicato nella nostra politica sulla privacy.

  • 3 Days Course
    Check Point Courses



    Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation – bringing all security protections and functions under one umbrella. With R80 management, security consolidation is fully realized. This three-day course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80.


    • Describe the key elements of Check Points unified, secure management architecture
    • Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic
    • Recognize SmartConsole features and functions
    • Understand Check Point deployment options
    • Describe the basic functions of the Gaia OS
    • Describe the elements of a unified security policy
    • Understand how traffic inspection takes place in a unified security policy
    • Summarize how administration roles and permissions assist in managing policy
    • Implement Check Point backup techniques
    • Recognize Check Point Security Solutions and Products and how they work to protect your network
    • Understand licensing and contract requirements for Check Point security products
    • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
    • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities
    • Understand Site-to-Site and Remote Access VPN deployments and VPN communities
    • Understand how to analyze and interpret VPN tunnel traffic
    • Recognize how to define users and user groups
    • Manage user access for internal and external users
    • Understand the basic concepts of ClusterXL technology and its advantages
    • Understand how to perform periodic administrator tasks as specified in administrator job descriptions


    • Introduction to Check Point Technology
    • Security Policy Management
    • Check Point Security Solutions and Licensing
    • Traffic Visibility
    • Basic Concepts of VPN
    • Managing User Access
    • Working with ClusterXL
    • Administrator Task Implementation Unified Gateway

    Lab Exercises

    • Defining roles and users in Gaia Portal
    • Installing and navigating SmartConsole
    • Configuring objects, rules, and settings to define a Security Policy
    • Publishing database changes
    • Installing and managing a remote Security Gateway
    • Performing Hide and Static Network Address Translation
    • Configuring Application Control and URL filtering Access Control policy layers
    • Working with multiple concurrent Administrators and testing permissions profiles
    • Working with Check Point licenses
    • Viewing and maintaining logs
    • Configuring a Virtual Private Network
    • Providing User Access
    • Working with Check Point clustering
    • Producing Check Point reports

    Pubblico di destinazione

    • This course is recommended for technical professionals, who support, install, deploy or administer Check Point Software Blades.


    • General knowledge of TCP/IP
    • Working knowledge of Windows and/or UNIX, network technology and the Internet