Check Point Certified Expert (CCSE) R80.10 Course Overview

Check Point Certified Expert (CCSE) R80.10 Course Overview

Retired Course - This course is no longer available. Enquire to find the perfect alternative course with a Free training analysis - Enquire Now >>

Check Point Certified Security Expert training will validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls. Hands-on lab exercises teach how to debug firewall processes, optimize VPN performance and upgrade Management Servers.
 
Audience: Expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades.

CoursePage_session_icon 

Successfully delivered 39 sessions for over 93 professionals

Intermediate

Purchase This Course

Fee On Request

  • Live Training (Duration : 24 Hours)
  • Per Participant
  • Guaranteed-to-Run (GTR)
  • Classroom Training fee on request
  • Select Date
    date-img
  • CST(united states) date-img

Select Time


♱ Excluding VAT/GST

You can request classroom training in any city on any date by Requesting More Information

  • Live Training (Duration : 24 Hours)
  • Per Participant
  • Classroom Training fee on request

♱ Excluding VAT/GST

You can request classroom training in any city on any date by Requesting More Information

Request More Information

Email:  WhatsApp:

Course Prerequisites

  • CCSA training/certification
  • Working knowledge of Windows, UNIX, networking, TCP/IP, and the Internet

 

Upon Completion of this Course, you will accomplish following:-

  • Identify advanced CLI commands.
  • Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes.
  • Describe the Check Point Firewall infrastructure.
  • Describe advanced methods of gathering important gateway data using CPView and CPInfo.
  • Recognize how Check Point’s flexible API architecture supports automation and orchestration.
  • Discuss advanced ClusterXL functions.
  • Describe VRRP network redundancy advantages.
  • Undersand how SecureXL acceleration technology is used to enhance and improve performance.
  • Understand how CoreXL acceleration technology is used to enhance and improve performance.
  • Identify the SmartEvent components that store network activity logs and identify events.
  • Discuss the SmartEvent process that determines which network activities may lead to security issues.
  • Understand how SmartEvent can assist in detecting, remediating, and preventing security threats.
  • Discuss the Mobile Access Software Blace and how it secures communication and data.
  • Understand Mobile Access deployment options.
  • Recognize Check Point Remote Access solutions.
  • Discuss Check Point Capsule components and how they protect mobile devices and business documents.
  • Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.
  • Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.
  • Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets.

Suggested Courses

What other information would you like to see on this page?
USD