Log On/Register  

855.838.5028

Check Point Certified Security Administrator R80

Duration: 3 Days
Course Price: $3,000

Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation - bringing all security protections and functions under one umbrella. With R80 management, security consolidation is fully realized. This three-day course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80

Students who need to support, install, deploy or administer Check Point Software Blades, will learn the skills necessary to work with Check Point Security Administration featuring R80:
Install R80 management and a security gateway in a distributed environment
Configure objects, rules, and settings to define a security policy
Work with multiple concurrent administrators and define permission profiles
Configure a Virtual Private Network and work with Check Point clustering
Perform periodic administrator tasks as specified in administrator job descriptions

Introduction to Check Point Technology
Security Policy Management
Check Point Security Solutions and Licensing
Traffic Visibility
Basic Concepts of VPN
Managing User Access
Working with ClusterXL
Administrator Task ImplementationUnified Gateway

Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation - bringing all security protections and functions under one umbrella. With R80 management, security consolidation is fully realized. This three-day course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80

Students who need to support, install, deploy or administer Check Point Software Blades, will learn the skills necessary to work with Check Point Security Administration featuring R80:
Install R80 management and a security gateway in a distributed environment
Configure objects, rules, and settings to define a security policy
Work with multiple concurrent administrators and define permission profiles
Configure a Virtual Private Network and work with Check Point clustering
Perform periodic administrator tasks as specified in administrator job descriptions

Introduction to Check Point Technology
Security Policy Management
Check Point Security Solutions and Licensing
Traffic Visibility
Basic Concepts of VPN
Managing User Access
Working with ClusterXL
Administrator Task ImplementationUnified Gateway

Prior to taking this course, it is recommended that learners possess the following:
General knowledge of TCP/IP
Working knowledge of Windows and/or UNIX, network technology and the Internet

Course Objectives

Describe the key elements of Check Point?s unified, secure management architecture.
Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic.
Recognize SmartConsole features and functions.
Understand Check Point deployment options.
Describe the basic functions of the Gaia OS.
Describe the elements of a unified security policy.
Understand how traffic inspection takes place in a unified security policy.
Summarize how administration roles and permissions assist in managing policy.
Implement Check Point backup techniques.
Recognize Check Point Security Solutions and Products and how they work to protect your network.
Understand licensing and contract requirements for Check Point security products.
Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities.
Understand Site-to-Site and Remote Access VPN deployments and VPN communities.
Understand how to analyze and interpret VPN tunnel traffic.
Recognize how to define users and user groups.
Manage user access for internal and external users.
Understand the basic concepts of ClusterXL technology and its advantages.
Understand how to perform periodic administrator tasks as specified in administrator job descriptions.

Lab Exercises

Defining roles and users in Gaia Portal
Installing and navigating SmartConsole
Configuring objects, rules, and settings to define a Security Policy
Publishing database changes
Installing and managing a remote Security Gateway
Performing Hide and Static Network Address Translation
Configuring Application Control and URL filtering Access Control policy layers.
Working with multiple concurrent Administrators and testing permissions profiles.
Working with Check Point licenses
Viewing and maintaining logs
Configuring a Virtual Private Network
Providing User Access
Working with Check Point clustering
Producing Check Point reports

Learn More
Please type the letters below so we know you are not a robot (upper or lower case):