Upgrade Your Career with Exciting Offers on our Career-defining Courses Upto 50% OFF | Offer ending in:
D H M S Grab Now
X

Check Point R81 (CCSA ) Online Training & Certification Course
Read Reviews

Check Point R81 Training at Infosec Train is a perfect opportunity to learn installation, configuration, and managing Check Point Security Gateway and Management Software Blade systems on the Gaia operating system. Participants of our CCSA training will also get an exposure to work with multiple concurrent administrators and define permission profiles.

Course Highlights

  • 40 hrs of instructor-led training
  • Dedicated session for Interview Prep
  • Hands-on Labs Practice
  • Certified & Experienced Trainers
  • Training Certificate
  • Access to the recorded sessions

Accredited By

Choose your Preferred Learning Mode

1-TO-1 TRAINING

Customized schedule
Learn at your dedicated hour
Instant clarification of doubt
Guaranteed to run

Get Started

ONLINE TRAINING

Flexibility, Convenience & Time Saving
More Effective
Learning Cost Savings

Classes starting from

5th Sep: Weekend

15th Sep: Weekday

ENROLL NOW Preferred

CORPORATE TRAINING

Anytime, Anywhere – Across The Globe
Hire A Trainer
At Your Own Pace
Customized Corporate Training

Contact US For Business

Looking for a customized training?

REQUEST A BATCH

Course Description

Overview

The Check Point R81 training (Check Point Certified Security Administrator) at InfosecTrain has been designed to provide a detailed knowledge of the basic concepts and the skills, that are required to configure Check Point Security Gateway and to Managing Software Blades. Our trainers are the experts of the Industry and they assure to enhance the knowledge of the candidates on managing the complexities and threats posed on the network of an organisation. Our Check Point CCSA certification course focuses on:

  • Preparing the participants to defend against network threats
  • Teaching evaluation of existing security policies and optimizing the rule base
  • Training to manage user access to corporate LANs
Why Check Point Certified Security Administrator?

Check Point is popular in the industry around the globe for its  IT security, data security, end point security, mobile security and security management through its software products. Being a Check Point certified professional means having expertise in technology that secures internet from any kind of security threats. Thus, professionals with CCSA Certification are much in demand. Some of the objectives of this Check Point CCSA training are to help the participants in learning to :

  • Install R80 management and a security gateway in a distributed environment
  • Configure objects, rules, and settings to define a security policy
  • Work with multiple concurrent administrators and define permission profiles
  • Configure a Virtual Private Network and work with Check Point clustering
  • Perform periodic administrator tasks as specified in administrator job descriptions
Why Check Point R81 (CCSA) Training Course with InfoSecTrain?

InfosecTrain is one of the finest security and technology training and consulting organizations, focusing on a range of IT security training and Information Security services. InfosecTrain offers complete training and consulting solutions to its customers globally. Whether the requirements are technical services, certification, or customized training, InfosecTrain is consistently delivering the highest quality and best success rate in the industry.

  • Training by the experts of the domain.
  • In-depth knowledge sharing on each domain of the course.
  • Custom-made training available.
  • We have certified and highly experienced trainers who have an in-depth knowledge of the subject.
  • Our training schedule is flexible and we also provide recordings of the lectures.
  • We deliver post-training support.
  • We also bring forth an interactive Q & A session.

Target Audience

CheckPoint R81 Training is most beneficial for

  • System administrators
  • Security managers
  • Network engineers
  • Analysts

Pre-requisites

  • Basic knowledge of networking
  • Recommended to have 6 months to 1 year of experience with Check Point products

GET A FREE DEMO CLASS

For
Captcha*
8 + 19 =
loader-infosectrain

Course Objectives

  • Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic
  • Describe the key elements of Check Point’s unified Security Management Architecture
  • Recognize SmartConsole features, functions and tools
  • Understand Check Point deployment options
  • Describe the basic functions of Gaia
  • Describe the essential elements of a Security Policy
  • Understand how traffic inspection takes place in a unified Security Policy
  • Summarize how administration roles and permissions assist in managing policy
  • Recall how to implement backup techniques
  • Understand the Check Point policy layer concept
  • Recognize Check Point security solutions and products and how they work to protect your network
  • Understand licensing and contract requirements for Check Point security products
  • Identify tools designed to monitor data, determine threats and recognize performance improvements
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities
  • Understand Site-to-Site and Remote Access VPN deployments and communities
  • Understand how to analyze and interpret VPN traffic
  • Recognize how to define users and user groups
  • Understand how to manage user access for internal and external users
  • Understand the basic concepts of ClusterXL technology and its advantages
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions

Course Content

  1. NGFW overview & CheckPoint Features
  • Why do we need Firewall in spite of ACL in Router
  • Stateful Inspection
  • CheckPoint UTM Features
  1. CheckPoint Components Overview
  • Firewall / Gateway/ Enforcement Module (NG Appliances)
  • Management Server (Smart-1 Appliances)
  • Smart Console or GUI client
  • Log Server
  1. CheckPoint Installation Scenarios
  • Standalone Installation (2 Tier)
  • Distributed Installation (3 Tier)
  • Standalone vs Distributed
  1. CheckPoint Standalone (2-Tier) Installation
  • Installation of CheckPoint ISO (FW + Management) at 9HQ site) in PNET environment
  • Installation of Smart Console on Windows PC
  • Enabling Blades on CheckPoint Objects
  • Configure Network Interfaces & Topology (Anti-Spoofing concept)
  • Configure Routing (static & Default Routes)
  • Login to the Console and install Default Policy
  1. CheckPoint Distributed (3-Tier) Installation
  • Installation of CheckPoint ISO (FW) on PNET environment at (HQ site)
  •  Installation of CheckPoint ISO (Management) on PNET environment (HQ Site)
  • Adding a Gateway to the Security Management Server (SIC Integration)
  • SIC Troubleshooting
  • Expert Mode & CLISH
  1. Managing Administrators & GUI Clients
  • Manage GUI Client via Web &CLI
  • Add Permission Profile
  • Add Administrator and Add Permission Profile
  • Database Lock concepts
  1. Policies
  • Add a WAN Firewall to Management Server at (WAN site)
  • Add a Policy for WAN Firewall on Management Server (HQ site)
  • Add a Policy for Core to WAN Firewall connectivity
  • Policy Objects ( Nodes, Host, Network, Groups, Address Ranges, Services etc.)
  • Add Internet Access Rule
  • Add FW Management Rules
  • Add DMZ Access Rules
  • Policy Layers (Introduction)
  • Ordered Layers and Inline Layers
  • Shared Layers
  • Policy Optimization for performance
  • Implied rules & Global Properties
  • Stealth Rule, Clean-up Rule
  • Database Revision Control
  1. Logs Management and Administration
  • Log Files & Troubleshooting (Filters, etc)
  • Log files Management
  1. Network Address Translation
  • NAT Theory & Concepts
  • Auto NAT (Hide & Static) Lab
  • Manual NAT (Hide & Static) Lab
  • PAT Concepts
  • No-NAT Concept
  1. CheckPoint Clustering
  • Add Cluster object
  • Add Cluster Members
  • Configure Clustering
  • Test Clustering
  • High-Availability and Load Sharing scenarios
  1. HTTPS Inspection
  • SSL Concept & HTTPS Inspection
  • Configure HTTPS Inspection
  • Generate HTTPS Certificate and install the Certificate on Nodes
  • Enable HTTPS Inspection Blade & Deploy Policy for SSL Decryption
  • Test SSL Decryption
  1. UTM Features
  • Application Control
  • URL filtering
  • Content Awareness
  • DLP
  • Threat Prevention Policy (Concept and Overview)
  • IPS (Concept and overview)
  • Infinity Protection
  1. Identity Awareness
  • User-based Access rule with authenticated Access
  • Client Authentication
  • External Authentication for Users (RADIUS /TACACS)
  • Install AD server at Site-b
  • Enable Identity Awareness Blade
  • Configure Identity Awareness rules based on Access objects
  1. VPN
  • VPN Theory
  • VPN Site-A to Site-B configuration (Lab)
  • Remote Access VPN
  • Mobile Access / SSL VPN
  • VPN tunnel Utility
  1. Backup & Restore
  • Backup, Restore & Snapshot through Web GUI
  • Backup, Restore & Snapshot through CLI
  1. Command Line Interface (Introduction & Basic Commands)
  • cpconfig
  • cpstop and cpstart commands, cprestart
  • configure interfaces
  • configure routes
  • Some More commands
  1. Licensing (overview)
  • Central License
  • Local License
  • Smart update for Licenses& Contracts
  1. Patch Installation & Upgrade
  • Download and Install the Patch file
  • Upgrade a Firewall or Management Server using the CPUSE image
  1. MDS Server Install
  • MDS Server Install
  1. Interview Questions
  • Interview Questions And Discussions

Need customized curriculum? Talk to Advisor

Our Course Advisor

Course Benefits

Here is What people are saying about InfosecTrain

Benefits You Will Access Why Infosec Train

Student-infosectrain Certified & Experienced Instructors
24x71-infosectrain Post Training Support
tailor-infosectrain Tailor Made Training
flexible-infosectrain Flexible Schedule
video1-infosectrain Access to the Recorded Sessions

FAQs

1. Define Check Point R81
SmartConsole R81. 10 is a comprehensive security management solution that combines policy, logging, monitoring, event correlation, and reporting into a single system, allowing managers to quickly discover security problems throughout the enterprise.
2. What is a SmartConsole Check Point, and how does it work?
SmartConsole is a graphical user interface (GUI) client for managing the Check Point environment. It is Check Point’s Customer Service Center. It’s your Security Management Server or Multi-Domain Server’s Gaia Portal.
3. What is Check Point’s purpose?
The most typical application of checkpoints is to make backups before doing updates. In the event that an update fails or causes issues, the administrator can restore the virtual machine to its previous condition. The recovery operation is used to restore the checkpoint state of the system.
4. What is the Check Point firewall’s three-tier architecture?
Components of a three-tier architecture Check Point’s main product is a network security system called Next-Generation Firewall (NGFW). You’ll come across three key components when working with it: Security Gateway, Security Management Server, and SmartConsole.
5. In SmartConsole, how can I use a Check Point?

To access the Security Management Server through SmartConsole, follow these steps:

  • Launch the SmartConsole application
  • Enter your administrator authentication credentials
  • Enter the name or the IP address of the Security Management Server
  • Click Login
  • Confirm the fingerprint
6. What is MDS Check Point, and how does it work?
Multi-Domain Security Management is a centralized management solution for large-scale, dispersed networks with several network Domains. Security policies should be tailored to the needs of various departments, business units, branches, and partners while still meeting enterprise-wide standards.
7. What are the Check Point solution’s components?

Check Point Firewall Security Solution

  • VPN and mobile device connectivity
  • Identity and computer awareness
  • Internet access and filtering
  • Application control
  • Intrusion and threat prevention
  • Data Loss Prevention

Latest Blog Posts

TOP