Check Point Certified Security Administrator R80.20/156-215.80


Check Point Certified Security Administrator R80.20 Certification Training Course Overview

By achieving the CCSA - Check Point Certified Security Administrator certification you will validate your ability to install, configure, and manage Check Point Security Gateway and Management Software Blade systems on the GAiA operating system.

Learn how to:

  • Install R80 management and a security gateway in a distributed environment
  • Configure objects, rules, and settings to define a security policy
  • Work with multiple concurrent administrators and define permission profiles 
  • Configure a Virtual Private Network and work with Check Point clustering
  • Perform periodic administrator tasks as specified in administrator job descriptions

 

This course prepares you for Exam 156-215.80.

Check Point Certified Security Administrator R80.20 (32 Hours) Download Course Contents

Instructor - Led Online Training Fee For Both Group Training & 1-on-1 Training 1800
Group Training

07,08,09,10 Jun
09:00 AM - 05:00 PM CST
(8 Hours/Day)

19,20,21,22 Apr GTR
01:00 AM - 09:00 AM CST

03,04,05,06 May GTR
07:00 AM - 03:00 PM CST

GTR=Guaranteed to Run
1-on-1 Training (GTR)
4 Hours
8 Hours
Week Days
Week End


Available

Not Available

Booked By You

Classroom training is available in select Cities

Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Our Trainers! Click here

Request More Information

Course Prerequisites

  • 6 months to 1 year of experience with Check Point products recommended.
  • General knowledge of networking and TCP/IP.
  • Working knowledge of Windows, UNIX, network technology, and the internet.

 



After Completion this course, you should be able to :

  • Defend against network threats
  • Evaluate existing security policies and optimize the rule base
  • Manage user access to corporate LANs
  • Monitor suspicious network activities and analyze attacks
  • Troubleshoot network connections
  • Implement Check Point backup techniques