Check Point Certified Admin (CCSA) R80.10/156-215.80


Check Point Certified Admin (CCSA) R80.10 Certification Training Course Overview

Check Point Certified Security Administration (CCSA) R80.10 course provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. In other words, the key to manage the complexities and threats posed, is through security consolidation. With R80.10, security consolidation is fully realized.
 
Audience: Technical professionals who support, install, deploy or administer Check Point Software Blades
This course prepares you for Exam 156-215.80. Download Course Contents Test your current knowledge Qubits

Check Point Certified Admin (CCSA) R80.10 Course schedule & Prices

Schedule & Prices
Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 3 Days (6 Days for 4 Hours/Day)
Fee : USD 1,000 (Includes Taxes)



June

8 Hours/Day
01-03
07-09
08-10
15-17
01-08
07-13
08-15
15-22
July

8 Hours/Day
06-08
12-14
13-15
20-22
06-13
12-18
13-20
20-27
August

8 Hours/Day
03-05
09-11
10-12
17-19
03-10
09-15
10-17
17-24
Fly-Me-a-Trainer
Duration : 3 Days
Fee : On Request
Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : 3 Days
Fee : On Request
On Request

Enquire Now




Input symbols

Course Prerequisites

  • General knowledge of TCP/IP Working
  • knowledge of Windows and/or UNIX, network technology and the Internet

 



Upon Completion of this Course, you will accomplish following:-

  • Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
  • Describe the key elements of Check Point’s unified Security Management Architecture.
  • Recognize SmartConsole features, functions and tools.
  • Understand Check Point deployment options.
  • Describe the basic functions of Gaia.
  • Describe the essential elements of a Security Policy.
  • Understand how traffic inspection takes place in a unified Security Policy.
  • Summarize how administration roles and permissions assist in managing policy.
  • Recall how to implement backup techniques.
  • Understand the Check Point policy layer concept.
  • Recognize Check Point security solutions and products and how they work to protect your network.
  • Understand licensing and contract requirements for Check Point security products.
  • Identify tools designed to monitor data, determine threats and recognize performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
  • Understand Site-to-Site and Remote Access VPN deployments and communities.
  • Understand how to analyze and interpret VPN traffic.
  • Recognize how to define users and user groups.
  • Understand how to manage user access for internal and external users.
  • Understand the basic concepts of ClusterXL technology and its advantages.
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions.