Advocate | Educate | Innovate
X
Training
A10
Advanced Technology Courses
Alibaba Cloud
AMA
APMG
AWS
Blockchain
Business IT
Cisco
CompTIA
Cyber Security
DELL EMC
DevOps Institute
EC-Council
EXIN
Fortinet
Google Cloud
Huawei
IBM
ISACA
ISC2
ITIL
Microsoft
NetApp
Nutanix
Oracle
Palo Alto Networks
PMI
Pulse Secure
Red Hat
Rocheston
Ruckus
Scrum Inc
Scrum org
Splunk
Trend Micro
UiPath
VMware
Highlights
Blog
Services
Facilities Rental
Modalities
Remote Labs
Schedule
Vendors
Testing Center
About Us
Our Story
Leadership
Awards
News & Announcements
Career
Contact Us
Refund Policy
Settings
Sign Out
Home
>
Vendors
>
cybersecurity
>
ccsa
Enquire Now
x
Enquiry Form
Required
Please provide a valid Name
Required
Please provide a valid Name
Required
Please provide a valid Email
Required
Please provide a valid phone
Required
VlnD1N
Required
By clicking "Submit", I agree to the Terms Of Use and
Privacy Policy
CCSA - Security Administration R81.1 (CCSA)
Overview
Duration:
3.0 days
Three-day course covers everything you need to start-up, configure and manage daily operations of R81.10 Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.
What You Will Learn
Know how to perform periodic administrator tasks.
Describe the basic functions of the Gaia operating system.
Recognize SmartConsole features, functions, and tools.
Understand how SmartConsole is used by administrators to give user access.
Learn how Check Point security solutions and products work and how they protect networks.
Understand licensing and contract requirements for Check Point security products.
Describe the essential elements of a Security Policy.
Understand the Check Point policy layer concept.
Understand how to enable the Application Control and URL Filtering software.
Blades to block access to various applications.
Describe how to configure manual and automatic NAT.
Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
Describe different Check Point Threat Prevention solutions for network attacks.
Articulate how the Intrusion Prevention System is configured, maintained and tuned.
Understand the Infinity Threat Prevention system.
Knowledge about Check Point’s IoT Protect.
Syllabus
Security Architecture
Application Control
Deployment
Licensing
Gaia Portal
Hide/Static NAT
URL Filtering
Monitoring States
IoT
Traffic Visibility
Security Events
Threat Extraction
Threat Emulation
Policy Layers
Browser SmartConsole
Infinity Threat Prevention
User Access
This Course Is For
Technical professionals who support, install deploy or administer Check Point products.
Prerequisites
Working knowledge of Windows, UNIX, networking technology, the Internet and TCP/IP
Certification
Schedule
Enquire Now
First Name
*
*
Please provide a valid Name
Last Name
*
*
Please provide a valid Name
E-mail address
*
*
Please provide a valid Email
Phone No
*
*
Please provide a valid phone
Company
Enter your message
*
*
By clicking "Submit", I agree to the Terms Of Use and
Privacy Policy
Enquire Now
Your Cart
Is Empty!
Subtotal
Enquire Now
*
Please provide a valid Name
*
Please provide a valid Name
*
Please provide a valid phone
*
Please provide a valid Email
*
VlnD1N
*
By clicking "Submit", I agree to the Terms Of Use and
Privacy Policy
Submit
Close