Skip links

Check Point | Learning

Training: CCSA, Check Point Certified Security Administrator R81, preparation for certification

This training will allow you to acquire all the techniques and methodologies necessary to pass the exam for obtaining the CCSA R81 certification. You will learn how to implement a security policy, the translation of addresses (NAT) or the Intrusion Prevention System (IPS) module.

Upon completion of the training, the participant will be able to:
  • Install and configure Check Point R81 product
  • Implement Address Translation (NAT)
  • Deploy a safety policy and monitor traffic
  • Prepare the official examination leading to certification CCSA
  • Implement application control policy, URL filtering and user management

Technicians, administrators and system/network/security engineers.

Good knowledge of TCP/IP. Basic knowledge of computer security.
Check that you have the prerequisites to fully benefit from this training by doing this test.

Presentation of the architecture Check Point R81

  • Check Point products.
  • What's New in R81?
 

Deployment Gaia: Installation of « Applies » Check Point

  • Presentation of the Gaia system.
  • Elements of three-thirds architecture.
  • Modular architecture of the "Software Blades".
  • Check Point Infinity.
  • Architecture in distributed mode and standalone mode.
  • The management server. The CIS protocol.
Practical work
Installation of Check Point R81.
 

Security Management Server Management

  • SmartConsole R81.
  • Security policy. Rules management.
  • Unified policies.
  • Package inspection.
  • « Inline » Policies (under rules).
Practical work
Installation of SmartConsole. Create objects. Achieving a security policy. Enable anti-spoofing.
 

Translation of addresses (NAT)

  • The rules for translating addresses with IPv4 and IPv6.
  • One To One NAT and Many To One NAT/PAT.
  • The NAT Manuel.
  • The ARP problem and routing.
Practical work
Set up of automatic NAT static type, Hide and manual transaction rules.
 

Visibility: log management, monitoring and reporting

  • Log management policy.
  • Track connections with Logs & Monitor (former SmartView Tracker).
  • The SmartView Monitor, features and alert thresholds.
Practical work
Monitoring activation, use of the Suspicious Activity Monitoring Protocol, traffic visualization, monitoring of the state of security policy.
 

Licensing and Multi-Sites Management

  • Licensing structure.
  • License management in SmartUpdate and SmartConsole.
  • Types of licenses.
  • Contract management and services.
  • Monitoring licensing status.
  • Definition of Policy Packages.
  • Policy Package Management.
  • Definition and types of "Layers".
  • Inspection of packages in a « Ordered Layer ».
  • Sharing of « Layers » (Policy Layers Sharing)
 

Management of administrators

  • "Permission Profiles."
  • Limit the scope of action of administrators.
  • Management of competing users.
  • Session management.
Practical work
Creation of a new « Permission Profile » with limited authorizations.
 

HTTPS decryption

  • Creation of rules.
  • Management of certificates.
  • Server Name Indications (SNI).
Practical work
Implementation of HTTPS inspection.
 

Application Control / URL Filtering

  • The limits of a classic firewall per IP and per port.
  • Access control.
  • The AppWiki. URL Filtering.
  • The User Check.
Practical work
Web Filtering and Applications: Creating and Sharing « Web Filtering and Applications » as « Inline Layer » and « Ordered Layer ».
 

User-based policy « Threat Prevention »

  • Need to recover user identity.
  • Authentication methods Identity Awareness R81.
  • Type objects « Access Role ».
  • The policy of Threat Prevention and its « Software Blades ».
  • Rules management.
  • Security profiles.
  • Autonomous Threat Prevention.
Practical work
Authentication: implementation of Identity Awareness, creation of roles and access. Anti-Virus and Anti-Bot.

To pass the certification exam, simply register on the Check Point website. You can then take the exam directly online or in an approved centre.

The trainer evaluates the educational progress of the participant throughout the training through QCM, situations, practical work...
The participant also completes an upstream and downstream positioning test to validate the acquired skills.
This website uses cookies to improve your web experience.
EnglishenEnglishEnglish
0