Check Point/CCSA R77.30 (GAiA)/156-215.77


CCSA R77.30 (GAiA) Certification Training Course Overview

New version CCSA R80 is now available.

CCSA or Check Point Security Administration course from Koenig offers expertise to configure and operate Security Gateway and Management Software Blades on the GAiA operating system. Become an expert at configuring security policies, securing and monitoring networks, configuring and upgrading a gateway, and executing a VPN solution.
 
This CCSA training is ideal for system administrators, security managers, support analysts, network engineers, or any other technical professionals who wish to install, deploy, administer or support Check Point Security Blades. So if you have basic knowledge of Windows, UNIX, TCP/IP, internet and networks, come and join this highly rewarding certification training to give your career that long due boost in the right direction.
This course prepares you for Exam 156-215.77. Download Course Contents

CCSA R77.30 (GAiA) Course schedule & Prices

Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 3 Days (6 Days for 4 Hours/Day)
Fee : 1,000 (Includes Taxes) 
9 AM - 5 PM (Flexible Time Slots for 4 hours option)






Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Koenig Trainers Click here

Get Quote

Course Prerequisites

  • Basic knowledge of networking
  • Windows Server and/or UNIX skills
  • Internet and TCP/IP experience


Upon Completion of this Course, you will accomplish following:-

  • Designing and installing a Security Gateway in a distributed environment.
  • Scheduling Backup, restore and upgrades with minimum downtime.
  • Monitoring and troubleshooting network connections.
  • Managing user access privileges for corporate LANs.
  • Generating reports, troubleshooting issues and ensuring network functionality
  • Evaluating security policies and optimizing rule base.
  • Configuring rules on Gateway and Web servers and assigning permissions.
  • Protect against network vulnerabilities including mail and messaging content.
  • Configure a Virtual Private Network with partner sites for secure data transfer.