Check Point Certified Security Administrator (CCSA) R80.40 Certification Training Course Overview

Enroll for 3 days Check Point Certified Security Administrator (CCSA) R80.40 training course from Koenig Solutions accredited by Checkpoint. This is the first level of Check Point Certification and is essential for IT administrators who manage daily operations of Check Point Cyber Security solutions. In this course you will learn everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.

This course prepares you for Exam 156-215.80. Test your current knowledge on Qubits42

CCSA Certification Training (Duration : 24 Hours) Download Course Contents

Live Online Training
Group Training 1350 Per Participant
07 - 09 Feb 09:00 AM - 05:00 PM CST
(8 Hours/Day)
07 - 09 Mar 09:00 AM - 05:00 PM CST
(8 Hours/Day)
1-on-1 Training 2700 1550+
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

1-On-1 Training is Guaranteed to Run (GTR)
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Buy Flexi For Only $99 (Video Recording of Live Online)

Request More Information

Course Prerequisites
  • General knowledge of TCP/IP
  • Working knowledge of Windows and/or UNIX, network technology and the Internet

 

Target Audience:

Technical professionals who support, install, develop or administer CheckPoint software blades.

Learning Objectives:

After completing this course, you will be able to:

  • Interpret the concept of a firewall and understand the mechanisms used to control network traffic
  • Describe the key elements of Check Point's unified security management architecture
  • Learn about SmartConsole features, functions, and tools
  • Understand Check Point deployment options
  • Describe the basic functions of Gaia
  • Describe the essential elements of a security policy
  • Understand how traffic monitoring is done in a unified security policy
  • Summarize how administrative roles and permissions help manage policies
  • Recall how to implement backup techniques
  • Understand the check point policy layer concept
  • Understand Check Point security solutions and products and how they work to protect your network
  • Understand the license and contract requirements for Check Point security products
  • Discover tools to monitor data, identify threats, and detect performance improvements
  • Find tools that can quickly and efficiently respond to changes in gateways, tunnels, remote users, traffic flow patterns, and other activity
  • Understand site-to-site and remote access VPN deployments and communities
  • Understand how to analyze and interpret VPN traffic
  • Learn how users and user groups are defined
  • Understand how to manage user access for internal and external users
  • Understand the basic concepts of ClusterXL technology and their benefits