Certified Security Expert R81.1 (CCSE)

Course Description

Advanced 3-day course teaches how to modify, build, deploy, & troubleshoot the R81.10 Check Point Security Systems on the GAiA operating system. Hands-on lab exercises teach how to debug firewall processes, optimize VPN performance and upgrade Management Servers.

Learn How To

  • Backup your R81.1 Security Gateway and Management Server
  • Build, test & troubleshoot a clustered Security Gateway
  • Upgrade and troubleshoot a Management Server
  • Configure and maintain security acceleration solutions
  • Manage, test, and optimize corporate VPN tunnels.

Prerequisites

Security Administration Course or CCSA certification (R80 or higher)

Windows Server, UNIX and networking skills, and TCP/IP experience

Certificate management and system administration

 

Target Audience

Technical Professionals who architect, upgrade, maintain, and support Check Point products.

Learning Objectives

  • Provide an overview of the upgrade service & options available. 
  • Describe how to perform management upgrades & migration. 
  • Articulate the process utilizing CPUSE features. 
  • Articulate the purpose & function of Management High Availability. 
  • Explain Primary vs. Secondary, Active vs. Standby, & Synchronization. 
  • Describe disaster recovery steps in case the primary management server becomes unavailable. 
  • Provide an overview of Central Deployment in SmartConsole. 
  • Articulate a comprehension of Security Gateway cluster upgrade methods. 
  • Describe Multi Version Cluster (MVC) upgrades. 
  • Discuss Gaia Commands & how they are used. 
  • Describe the main processes on s and s. 
  • Describe how to operate with scripts & SmartTasks to configure automatic actions. 
  • Describe the Management Data Plane Separation (MDPS) 
  • Describe kernel operations & traffic flow 
  • Articulate Dynamic & Updatable Objects in Security Gateways 
  • Explain the policy installation flow & files used. 
  • Describe the utilization of policy installation history. 
  • Describe concurrent & accelerated install policy. 
  • Describe an overview of APIs & ways to use & authenticate. 
  • Describe how to make changes in GAIA and management configuration. 
  • Describe how to install policy using API.
  • Describe how the SecureXL acceleration technology enhances & optimizes Security Gateway performance. 
  • Describe how the CoreXL acceleration technology enhances & enhances Security Gateway performance. 
  • Articulate how using multiple traffic queues can make traffic management more efficient. 
  • Discuss Site-to-Site VPN basics, deployment, & communities. 
  • Explain how to analyze and interpret VPN tunnel traffic. 
  • Describe Link Selection and ISP Redundancy options. 
  • Describe tunnel management components. 
  • Discuss Check Point Remote Access solutions & how they differ from each other. 
  • Explain how client security can be provided by Remote Access. 
  • Describe authentication methods, including machine authentication. 
  • Describe Multiple Entry Points (MEP). 
  • Discuss the Mobile Access Software Blade & how it protects communication & data exchange during remote connections. 
  • Describe Mobile Access deployment options. 
  • Discuss various components in Mobile Access like Portals, Link Translation, Reverse Proxy, running Native Applications, and more. 
  • Describe the basic concepts of Clustering and ClusterXL. 
  • Explain Cluster Control Protocol (CCP) and synchronization. 
  • Describe advanced ClusterXL functions & modes like Load Sharing, VMAC mode, Active-Active, etc. 
  • Discuss Cluster Correction Layer (CCL) to give connection stickiness.
  • Advanced Logs and Monitoring
  • Explain how to determine if the configuration is compliant with the best practices. 
  • Describe how to set action items to meet compliance. 
  • Discuss how SmartEvent functions to identify critical security issues
  • Describe the components of SmartEvent and their deployment options. 
  • Discuss how SmartEvent can assist in reporting security threats. 
  • Explain how to customize event definitions and set an Event Policy.

 

Content Outline

  • Management Upgrade and Migration 
  • Management High Availability 
  • Security Gateway Upgrades 
  • Advanced Check Point Maintenance 
  • Security Gateway Operations 
  • Policy Installation 
  • Gaia and Management APIs 
  • Acceleration 
  • Site-to-Site VPN 
  • Remote Access VPN 
  • Mobile Access VPN 
  • Clustering 
  • Advanced Logs and Monitoring
  • Schedule for a Security Management Server Upgrade 
  • Boost the Security Management Server 
  • Deploy a Secondary Security Management Server 
  • Configure a Distributed Log Server 
  • Boost a Security Gateway from SmartConsole 
  • Operate with the Command Line 
  • Utilize Scripts and SmartTasks 
  • Configure Dynamic Objects 
  • Monitor Traffic 
  • Confirm Policy Installation and Status 
  • Operate with Gaia and Management APIs 
  • Operate with Acceleration Features 
  • Configure a Locally Managed Site-to-Site VPN 
  • Configure a Site-to-Site VPN with an Interoperable Device 
  • Configure Remote Access VPN 
  • Configure Mobile Access VPN 
  • Configure a High Availability Cluster 
  • Operate with ClusterXL 
  • Configure Policy Compliance 
  • Deploy SmartEvent

Learn advanced concepts and develop skills necessary to design, deploy, and upgrade Check Point Security environments.

 

FAQs

If you want to become Security Administrator, then you have to start with Security Administration fundamentals. An individual with a professional experience in a Security-specific job role can easily aim at improving their skills with official certification. However, you could also be included in other scenarios.

To attend the training session, one should have operational Desktops or Laptops with the needed specification, along with a good internet connection to access the labs. 

 

We would always recommend you attend the live session to practice & clarify your doubts instantly and get more value from your investment. However, if, due to some contingency, you are absent from the class, Radiant Techlearning will assist you with the recorded session of that particular day. However, those sessions are not meant only for private consumption and NOT for distribution or any commercial use.

 

Radiant Techlearning has a data center containing the Virtual Training environment for the purpose of participant hand-on-practice. 

Scholars can easily access these labs over Cloud with the assistance of a remote desktop connection. 

Radiant virtual labs provide you the flexibility to learn from anywhere in the world and in any time zone.

 

The learners will be enthralled as we engage them in real-world and industry Oriented projects during the training program. These projects will improve your skills and knowledge, and you will gain a better experience. These real-time projects will help you a lot in your future tasks and assignments.

Send a Message.


  • Enroll