CCSA+CCSE R77.30: Check Point Security Administration and Security Engineering Bundle

Networking/Server/Operating Systems
  LearnITAnytime Online Subscription (1 Year Subscription - $195.00)
  IT Online Library (1 Year Subscription - $1595.00)
If quantity is more than 1, Please add all Attendees' Names /Voucher #/ Learning Credit below separated with a comma. If not specified, we will contact you prior to the class start date. Special Instructions

This special CCSA and CCSE bundle covering Check Point Security Administration & Engineering (R77.30 GAiA) provides you with an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

During this course, you will configure a Security Policy and learn about managing and monitoring a secure network, upgrading and configuring a Security Gateway, and implementing a virtual private network. This part prepares you for CCSA certification. The advanced part of the course provides you training on how to build, modify, deploy and troubleshoot Check Point Security Systems on the GAiA operating system. Hands-on lab exercises teach how to debug firewall processes, optimize VPN performance and upgrade Management Servers. This advanced part prepares you for CCSE certification.

In this combo bundle program students will cover following administration and Engineering skills

  • Introduction to Check Point technology
  • Deployment platforms
  • Introduction to the security policy
  • Monitoring traffic and connections
  • Using SmartUpdate
  • User management and authentication
  • Identity awareness
  • Introduction to Check Point VPNs
  • Check Point firewall technology
  • Troubleshooting Check Point firewall technology
  • Advanced upgrading concepts and practices
  • Clustering firewall, management concepts, and practices
  • Software acceleration features
  • Advanced VPN concepts and implementations
  • Reporting tools, deployment options, and features

Course Outline
  1. Check Point's unified approach to network management and key components
  2. Design a distributed environment and Install the Security Gateway in it
  3. Perform a backup and restore the current gateway installation from the command line
  4. Identify critical files needed to purge or backup, import and export users and groups, and add or delete administrators from the command line
  5. Deploy gateways using the Gaia web interface
  6. Create; configure network, host, and gateway objects
  7. Using SmartDashboard verify SIC establishment between the Security Management Server and the gateway
  8. Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use
  9. Configure NAT rules on Web and Gateway servers
  10. Evaluate existing policies and optimize the rules based on corporate requirements
  11. Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime
  12. Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data
  13. Use packet data to generate reports, troubleshoot system and security issues, and ensure network functionality
  14. Using SmartView Monitor, configure alerts; traffic counters, view a gateway's status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access
  15. Monitor remote gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications
  16. Use SmartUpdate go apply upgrade packages to single or multiple VPN-1 gateways
  17. Upgrade and attach product licenses using SmartUpdate
  18. Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
  19. Manage users to access the corporate LAN by using external databases
  20. Provide granular-level access to network resources using Identity Awareness
  21. Acquire user information used by the security gateway to control access
  22. Define access roles for use in an Identity Awareness rule
  23. Implement Identity Awareness in the Firewall Rule Base
  24. Configure a pre-shared secret site-to-site VPN with partner sites
  25. Configure permanent tunnels for remote access to corporate resources
  26. Configure VPN tunnel sharing, given the difference between host-based, subunit-based, and gateway- based tunnels
  27. Perform a backup of a security gateway and Management Server using your understanding of the differences between backups, snapshots and update-exports
  28. Upgrade and troubleshoot a Management Server using a database migration
  29. Upgrade and troubleshoot a clustered Security Gateway deployment
  30. Use knowledge of Security Gateway infrastructures, chain modules, packet flow, and kernel tables to perform debugs on firewall processes
  31. Build, test, and troubleshoot a ClusterXL Load Sharing deployment on an enterprise network
  32. Build, test, and troubleshoot a ClusterXL High Availability deployment on an enterprise network
  33. Build, test, and troubleshoot a management HA deployment on an enterprise network
  34. Configure, maintain, and troubleshoot SecureXL and CoreXL acceleration solutions on the corporate network traffic to ensure noted performance enhancement
  35. Using an external user database such as LDAP, configure User Directory to incorporate user information for authentication services on the network
  36. Manage internal and external user access to resources for remote access or across a VPN
  37. Troubleshoot user-access issues found when implementing Identity Awareness
  38. Troubleshoot a site-to-site or certificate-based VPN on a corporate gateway using IKE View, VPN log files, and command-line debug tools
  39. Optimize VPN performance and availability by using Link Selection and Multiple Entry Point solutions
  40. Manage and test corporate VPN tunnels to allow for greater monitoring and scalability with multiple tunnels defined in a community including other VPN providers
  41. Create events or use existing event definitions to generate reports on specific network traffic using SmartReporter and SmartEvent to provide industry compliance information to management
  42. Troubleshoot report generation given command-line tools and debug-file information 

Hands On Labs

Lab 1: Distributed Installations
Lab 2: Stand-Alone Security Gateway Installations Lab 3: Common Tools
Lab 4: Building a Security Policy Lab 5: Configure the DMZ
Lab 6: Configure NAT
Lab 7: Monitor with SmartView Tracker Lab 8: Client Authentication
Lab 9: Identity Awareness
Lab 10: Site-to-Site VPN between Corporate and Branch Office Lab 11: Upgrade to Check Point R77
Lab 12: Core CLI Elements of Firewall Administration Lab 13: Migrate to a Clustering Solution
Lab 14: Configure SmartDashboard to Interface with Active Directory Lab 15: Configure Site-to-Site VPNS with Third-Party Certificates
Lab 16: Remote Access with Endpoint Security VPN Lab 17: SmartEvent and SmartReporter

This special combo or bundle course is recommended for Systems Administrators, Network Engineers, Security Managers, Support Analysts and any other IT professional working with Check Point Software Blades or seeking CCSA and CCSE certifications.

Prior to taking this course, it is recommended that learners possess the following:

  • General knowledge of TCP/IP
  • Working knowledge of Windows, UNIX, network technology, and the Internet

This course prepares learners for both CCSA exam #156-215.77 and CCSE exam #156-315.77. Exams are available at VUE test centers Each exam contains 90 multiple-choice, scenario-based questions. A passing score is 70% or higher in 120 minutes. The exam is based on 80% course materials and 20% hands-on experience with Check Point products. Students should have at least 6 months experience with Check Point products before challenging the exam.