Checkpoint CCSA R81

Checkpoint Certified Security Administrator

Ratings 3.70 / 5.00
Checkpoint CCSA R81

What You Will Learn!

  • Participants would learn how to deploy, configure and administer Checkpoint Security Gateways (Firewalls) and Security Management Servers
  • Participants would also learn how to configure security policies i.e., Access Control, Application and URL Filtering, Content Awareness, Data Loss Prevention
  • Participants would also learn how to configure Threat Prevention i.e., Anti-Virus, Anti-Bot, IPS, Threat Emulation and Threat Extraction as well as IoT Security
  • Participants would learn about Compliance, Network Address Translation (NAT), ClusterXL, Virtual Private Network (VPN), Backup, Snapshot and Database Migration

Description

In this Check Point Certified Security Administrator (CCSA) course, you will learn how to deploy, configure and administer Checkpoint Security Gateways and Security Management Servers.

You will learn how to configure Threat Prevention (Antivirus, AntiBot, IPS, Threat Emulation, Threat Prevention, IoT Security etc) as well as other policies like Access Control, Application and URL Filtering, Data Loss Prevention, Content Awareness, Identity Awareness.

You would also learn how to configure Network Address Translation (Manual NAT), ClusterXL, Backup, Snapshot and Advanced Database Migration.

This course is known as the CCSA R81. The images used in the course include the Gaia R81.10 (for the Security Management Server) and the Gaia R81 (for the Security Gateway).

The course contents are:

  • Course Overview

  • Introduction to CheckPoint

  • CheckPoint Installation (Security Gateway)

  • CheckPoint Installation (Security Gateway)

  • User Administration

  • Licensing

  • Policy Management

  • HTTPS Inspection

  • Content Awareness

  • Data Loss Prevention

  • Identity Awareness

  • Traffic Visibility

  • Network Address Translation

  • Virtual Private Network

  • ClusterXL

  • Threat Prevention (Anti-Virus) 

  • Threat Prevention (Anti-Bot)

  • Threat Prevention (Intrusion Prevention System)

  • Threat Emulation

  • Threat Extraction

  • Infinity Threat Prevention

  • IoT Security

  • Back and Snapshot

  • Advanced Database Migration


  • A video on Security Compliance has been included in the course as a bonus. The compliance blade helps us know our strengths and weaknesses especially as regards configuring policies in accordance with global best practices.

Who Should Attend!

  • This course is intended for Network Administrators, System Engineers, Network Security Engineers, IT Support, and others who are interested in learning about Checkpoint.

TAKE THIS COURSE

Tags

  • Network Security

Subscribers

1423

Lectures

37

TAKE THIS COURSE



Related Courses