Check Point/CCSA R77.30 (GAiA)/156-215.77

CCSA R77.30 (GAiA) Certification Training Course Overview

New version CCSA R80 is now available.

CCSA or Check Point Security Administration course from Koenig offers expertise to configure and operate Security Gateway and Management Software Blades on the GAiA operating system. Become an expert at configuring security policies, securing and monitoring networks, configuring and upgrading a gateway, and executing a VPN solution.
This CCSA training is ideal for system administrators, security managers, support analysts, network engineers, or any other technical professionals who wish to install, deploy, administer or support Check Point Security Blades. So if you have basic knowledge of Windows, UNIX, TCP/IP, internet and networks, come and join this highly rewarding certification training to give your career that long due boost in the right direction.
This course prepares you for Exam 156-215.77.

CCSA R77.30 (GAiA) (24 Hours) Download Course Contents

Instructor - Led Online Training Fee For Both Group Training & 1-on-1 Training 1450
Group Training

19,20,21 Apr
09:00 AM - 05:00 PM CST
(8 Hours/Day)

03,04,05 May
09:00 AM - 05:00 PM CST
(8 Hours/Day)

07,08,09 Jun
09:00 AM - 05:00 PM CST
(8 Hours/Day)

GTR=Guaranteed to Run
1-on-1 Training (GTR)
4 Hours
8 Hours
Week Days
Week End

Start Time : At any time

12 AM
12 PM

Classroom training is available in select Cities

Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Our Trainers! Click here

Request More Information

Course Prerequisites

  • Basic knowledge of networking
  • Windows Server and/or UNIX skills
  • Internet and TCP/IP experience

Upon Completion of this Course, you will accomplish following:-

  • Designing and installing a Security Gateway in a distributed environment.
  • Scheduling Backup, restore and upgrades with minimum downtime.
  • Monitoring and troubleshooting network connections.
  • Managing user access privileges for corporate LANs.
  • Generating reports, troubleshooting issues and ensuring network functionality
  • Evaluating security policies and optimizing rule base.
  • Configuring rules on Gateway and Web servers and assigning permissions.
  • Protect against network vulnerabilities including mail and messaging content.
  • Configure a Virtual Private Network with partner sites for secure data transfer.