Group Training Request

    Your work email address

    Your employer

    Your mobile phone number

    Tell us what types of roles, how many people or what your team needs to learn.

    Layer 8 Training is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services and other content that may interest you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:

    I agree to receive other communications from Layer 8 Training, Inc.

    You can unsubscribe from these communications whenever you like. Please review our Privacy Policy for more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy.

    By clicking submit below, you would like to allow Layer 8 Training to store and process the personal information submitted above to provide you with the content you asked for.

      Class Info Request

      Your work email address

      Your employer

      Your mobile phone number

      Tell us what types of roles, how many people or what your team needs to learn.

      Layer 8 Training is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services and other content that may interest you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:

      I agree to receive other communications from Layer 8 Training, Inc.

      You can unsubscribe from these communications whenever you like. Please review our Privacy Policy for more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy.

      By clicking submit below, you would like to allow Layer 8 Training to store and process the personal information submitted above to provide you with the content you asked for.

      CCSA+CCSE: Check Point Certified Security Administrator and Expert Bundle (R81.x)

      $5000 Duration: 5 Days

      • 03/31/2025 - 04/04/2025

        10:00 am ET - 6:00 pm ET

        Guaranteed to run Live Online | Almost Full

        Price: $5000

        Request Info

        visit now
      • 04/02/2025 - 04/04/2025

        10:00 am ET - 6:00 pm ET

        Guaranteed to run Live Online | Almost Full

        Price: $3000

        Request Info

        visit now
      • 04/14/2025 - 04/18/2025

        10:00 am ET - 6:00 pm ET

        Live Online | Open

        Price: $5000

        Request Info

        visit now
      • 05/05/2025 - 05/09/2025

        10:00 am ET - 6:00 pm ET

        Live Online | Open

        Price: $5000

        Request Info

        visit now
      • 05/19/2025 - 05/23/2025

        10:00 am ET - 6:00 pm ET

        Live Online | Open

        Price: $5000

        Request Info

        visit now
      • 06/09/2025 - 06/13/2025

        10:00 am ET - 6:00 pm ET

        Live Online | Open

        Price: $5000

        Request Info

        visit now
      Summary

      Learn basic and advanced concepts and develop skills necessary to administer IT security fundamental and intermediate tasks.

      Key Skills
      When you complete this course, you will be able to:
      • Storage: Security Management
      • Networks: SmartConsole.
      • VMs: Deployment
      • Security: Object Management
      • Analyzing Problems:Licenses and Contracts
      • Policy Rules and Rulebase
      • Policy Package
      • Policy Layers
      • Traffic Inspection
      • Network Address Translation
      • Application Control
      • URL Filtering
      • Logging
      • Snapshots
      • Backup and Restore
      • Gaia
      • Permissions
      • Policy Installation
      • Advanced Deployments
      • Management High Availability
      • Advanced Gateway Deployment
      • Advanced Policy Configuration
      • Advanced User Access Management
      • Custom Threat Protection
      • Advanced Site-to-Site VPN
      • Remote Access VPN
      • Mobile Access VPN
      • Advanced Security Monitoring
      • Performance Tuning
      • Advanced Security Maintenance
      Course Outline
      Security Administrator
      • Describe the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
      • Identify the basic workflow to install Security Management Server and Security Gateway for a single-domain solution
      • Create SmartConsole objects that correspond to the organization?s topology for use in policies and rules.
      • Identify the tools available to manage Check Point licenses and contracts, including their purpose and use.
      • Identify features and capabilities that enhance the configuration and management of the Security Policy.
      • Demonstrate an understanding of Application Control & URL Filtering and Autonomous Threat Prevention capabilities and how to configure these solutions to meet an organization?s security requirements.
      • Describe how to analyze and interpret VPN tunnel traffic.
      • Identify how to monitor the health of supported Check Point hardware using the Gaia Portal and the command line.
      • Describe the different methods for backing up Check Point system information and discuss best practices and recommendations for each method.
      Security Expert
      • Identify the types of technologies that Check Point supports for automation.
      • Explain the purpose of the Check Management High Availability (HA) deployment.
      • Explain the basic concepts of Clustering and ClusterXL, including protocols, synchronization, and connection stickiness.
      • Explain the purpose of dynamic objects, updatable objects, and network feeds.
      • Describe the Identity Awareness components and configurations.
      • Describe different Check Point Threat Prevention solutions.
      • Articulate how the Intrusion Prevention System is configured.
      • Explain the purpose of Domain-based VPNs
      • Describe situations where externally managed certificate authentication is used.
      • Describe how client security can be provided by Remote Access.
      • Discuss the Mobile Access Software Blade.
      • Define performance tuning solutions and basic configuration workflow.
      • Identify supported upgrade methods and procedures for Security Gateways.
      Audience
      This course is recommended for technical professionals who support, install, deploy or administer Check Point products.
      Certifications
      This course prepares learners for Check Point Certified Security Administrator (CCSA exam #156-215.81.20) and Check Point Certified Security Expert (CCSE exam #156-315.81.20).