Check Point/Checkpoint Certified Security Engineer R80.20/156-315.80


Checkpoint Certified Security Engineer R80.20 Certification Training Course Overview

By achieving the CCSE - Check Point Certified Expert certification you will validate your ability to build, modify, deploy and troubleshoot Check Point Security Systems on the GAiA operating system.

Be able to:

  • Be prepared to defend against network threats
  • Evaluate existing security policies and optimize the rule base
  • Manage user access to corporate LANs
  • Monitor suspicious network activities and analyze attacks
  • Troubleshoot network connections
  • Implement Check Point backup techniques

Target Audience :

This course is designed for expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades.

This could include the following:

  • System Administrators
  • Support Analysts
This course prepares you for Exam 156-315.80. Download Course Contents

Checkpoint Certified Security Engineer R80.20 Course schedule & Prices

Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 3 Days (6 Days for 4 Hours/Day)
Fee : 900 (Includes Taxes) 
9 AM - 5 PM (Flexible Time Slots for 4 hours option)






Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Koenig Trainers Click here

Get Quote

Course Prerequisites

  • Check Point Security Administration (R80.20 GAiA)
  • CCSA - Check Point Certified Administrator


What you will learn :

COURSE TOPICS

  • System Management
  • Automation and Orchestration
  • Redundancy
  • Acceleration
  • SmartEvent
  • Mobile and Remote Access
  • Threat Prevention

LAB EXERCISES

  • Upgrading a Security Management Server to R80.20
  • Applying Check Point Hotfixes
  • Configuring a New Security Gateway Cluster
  • Core CLI Elements of Firewall Administration
  • Configuring Manual Network Address Translation
  • Managing Objects Using the Check Point API
  • Enabling Check Point VRRP
  • Deploying a Secondary Security Management Server
  • Viewing the Chain Modules
  • Working with SecureXL
  • Working with CoreXL
  • Evaluating Threats with SmartEvent
  • Managing Mobile Access
  • Understanding IPS Protections
  • Deploying IPS Geo Protection
  • Reviewing Threat Prevention Settings and Protections
  • Deploying Threat Emulation and Threat Extraction