Check Point Certified Security Administrator (CCSA) R82

Check Point Certified Security Administrator (CCSA) R82

This course provides students with the fundamental knowledge, skills, and hands-on
experience needed to configure, manage, and monitor an existing Quantum Security
Environment. Students will learn how to access and navigate the Gaia Portal and the Gaia
Command Line Interface, manage Administrator access, create and configure Network
Objects, create new Security Policies, configure Ordered Layers and a Shared Inline Layer,
elevate the traffic view and monitor system states, configure Identity Awareness, elevate
security with HTTPS Inspection, configure Application Control and URL Filtering, and configure
Autonomous Threat Prevention.

  • Base Knowledge
    • Unix-like and/or Windows OS
    • Internet Fundamentals
    • Networking Fundamentals
    • Networking Security
    • System Administration
    • TCP/IP Networking

• Security Administrators
• Security Engineers
• Security Analysts
• Security Consultants
• Security Architects

Module 1: Introduction to Quantum Security
• Identify the primary components of the Check
Point Three-Tier Architecture and explain how they
work together in the Check Point environment.
Lab Tasks
• Explore Gaia on the Security Management Server
• Explore Gaia on the Dedicated Log Server
• Explore Gaia on the Security Gateway Cluster
Members
• Connect to SmartConsole
• Navigate GATEWAYS & SERVERS Views
• Navigate SECURITY POLICIES Views
• Navigate LOGS & EVENTS Views
• Navigate MANAGE & SETTINGS Views
Module 2: Administrator Account Management
• Explain the purpose of SmartConsole
administrator accounts.
• Identify useful features for administrator
collaboration, such as session management,
concurrent administration, and concurrent policy
installation.
Lab Tasks
• Create New Administrators and Assign Profiles
• Test Administrator Profile Assignments
• Manage Concurrent Administrator Sessions
• Take Over Another Session and Verify Session
Status

Module 3: Object Management
• Explain the purpose of SmartConsole Objects.
• Give examples of SmartConsole Physical and Logical
Objects.
Lab Task3
• View and Modify GATEWAYS & SERVERS Objects
• View and Modify Network Objects
• View and Modify Service Objects
Module 4: Security Policy Management
• Explain the purpose of Security Policies.
• Identify the essential elements of a Security Policy.
• Identify features and capabilities that enhance the
configuration and management of the Security Policy.
Lab Tasks
• Verify the Security Policy
• Modify Security Policies
• Install the Standard Security Policy
• Test the Security Policy
Module 5: Policy Layers
• Demonstrate an understanding of the Check Point
policy layer concept.
• Explain how policy layers affect traffic inspection.
Lab Tasks
• Add an Ordered Layer
• Configure and Deploy the Ordered Layer Rules
• Test the Ordered Layer Policy
• Create an Inline DMZ Layer
• Test the Inline DMZ Layer

Module 6: Security Operations Monitoring
• Explain the purpose of Security Operations
Monitoring.
• Tune the Log Server configuration.
• Use predefined and custom queries to filter the
logging results.
• Monitor the state of Check Point systems.
Lab Tasks
• Configure Log Management
• Enhance Rulebase View, Rules, and Logging
• Review Logs and Search for Data
• Configure the Monitoring Blade
• Monitor the Status of the Systems
Module 7: Identity Awareness
• Explain the purpose of the Identity Awareness
solution.
• Identify the essential elements of Identity
Awareness.
Lab Tasks
• Adjust the Security Policy for Identity Awareness
• Configure the Identity Collector
• Define the User Access Role
• Test Identity Awareness

Module 8: HTTPS Inspection
• Explain the purpose of the HTTPS Inspection
solution.
• Identify the essential elements of HTTPS
Inspection.
Lab Tasks
• Enable HTTPS Inspection
• Adjust Access Control Rules
• Deploy the Security Gateway Certificate
• Test and Analyze Policy with HTTPS Inspection
Module 9: Application Control and URL Filtering
• Explain the purpose of the Application Control and
URL Filtering solutions.
• Identify the essential elements of Application
Control and URL Filtering.
Lab Tasks
• Adjust the Access Control Policy
• Create and Adjust Application Control and URL
• Test and Adjust the Application Control and URL
Filtering Rules
Module 10: Threat Prevention Fundamentals
• Explain the purpose of the Threat Prevention
solution.
• Identify the essential elements of Autonomous
Threat Prevention.
Lab Tasks
• Enable Autonomous Threat Prevention
• Test Autonomous Threat Prevention

 

Kontakt

You can contact our support team :

trening-serbia@ingrammicro.com

Checkpoint-Serbia@ingrammicro.com

Date: Dostupan je u VILT formatu

Duration: 3 dana

Location: Hibrid On site / On Line

Literatura: Autorizovani materijal u .pdf formatu

Attachments:

CCSA-R82-V1-0-Course-Overview.pdf

Language: srpski

Price:

 Register here