Type
Virtual
Classroom ILT
Skill Level

Available dates
Learning Path
Virtual
Duration
1 Day

TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL

DURATION
AVAILABLE DATES
Choose date
From: R24 900,00
Price excluding VAT
Introduction:
The Check Point Security Bootcamp is an intensive, extended-hours training course created for delegates and partners wanting to achieve Check Point CCSA and CCSE enablement in the shortest possible time frame whist being least disruptive to business. Our bootcamp course is also a great refresher course for those individuals preparing to take the CCSA and CCSE certification exams. The 5 day Bootcamp will cover content from both the standard CCSA and CCSE curriculum. Overlapping content between CCSA and CCSE is eliminated and the content is rearranged for the purpose of course flow.
Audience profile:
This course is intended primarily for:
- System Administrators
- Support Analysts
- Security Managers
- Network Engineers
- Anyone seeking CCSA and CCSE certification
- Technical individuals who require enablement in the shortest possible time frame to support, install, deploy or administer Check Point Software Blades and to perform advanced deployment configurations of a security gateway
Pre-requisites:
In addition to their professional experience, students who attend this training should already have the following technical knowledge:
- General Knowledge of TCP/IP
- Working knowledge of Windows and/or UNIX, Network technology and the internet
- 6 months to 1 year experience with Check Point products recommended
- Check Point User Center Account email address must be confirmed
After completing this course, students will be able to:
- Be prepared to defend against network threats
- Evaluate existing security policies and optimize the rule base
- Manage user access to corporate LANs
- Monitor suspicious network activities and analyse attacks
- Troubleshoot network connections
- Implement Check Point backup techniques
- Identify advanced CLI commands
- Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes
- Describe the Check Point Firewall infrastructure
- Describe advanced methods of gathering important gateway data using CPView and CPInfo
- Recognize how Check Point’s flexible API architecture supports automation and orchestration
- Discuss advanced ClusterXL functions
- Describe VRRP network redundancy advantages
- Understand how SecureXL acceleration technology is used to enhance and improve performance
- Understand how CoreXL acceleration technology is used to enhance and improve performance
- Identify the SmartEvent components that store network activity logs and identify events
- Discuss the SmartEvent process that determines which network activities may lead to security issues
- Understand how SmartEvent can assist in detecting, remediating, and preventing security threats
- Discuss the Mobile Access Software Blade and how it secures communication and data
- Understand Mobile Access deployment options
- Recognize Check Point Remote Access solutions
- Discuss Check Point Capsule components and how they protect mobile devices and business documents
- Discuss different Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats
- Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents
- Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets
Module 1: Introduction to Check Point Technology | |
Module 2: Security Policy Management | |
Module 3: Policy Layers | |
Module 4: Check Point Security Solutions and Licensing | |
Module 5: Traffic Visibility | |
Module 6: Basic Concepts of VPN | |
Module 7: Managing User Access | |
Module 8: Working with ClusterXL | |
Module 9: Administrator Task Implementation | |
Module 10: System Management | |
Module 11: Automation and Orchestration | |
Module 12: Redundancy | |
Module 13: Acceleration | |
Module 14: SmartEvent | |
Module 15: Mobile and Remote Access | |
Module 16: Threat Prevention | |
LABs: | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Associated Certifications & Exam
This course helps prepare you for the CCSA #156-215.80 and CSE #156-315.80 certification exams.
For student’s results to post to their User Center account for the e-certificate, their Pearson VUE account MUST use the same email address as their User Center account.
On successful completion of this course students will receive a Torque IT attendance certificate.

Check Point Overview
Torque IT and Check Point are dedicated to providing customers with training, certification and technology solutions that offer uncompromised protection against security threats whilst reducing complexity and lowering total cost of ownership.
Check Point works only with the best partners in the security industry and Torque IT has stepped up to the challenge of becoming Africa’s Check Point Authorised Training Centre (ATC) of choice for best-in-class Check Point enablement and certification solutions.
We offer off-the-shelf Check Point Training and Certification Solutions as well as customized deliveries that are tailored to your unique requirements.
Torque IT has specialized in providing vendor authorized technology training, enablement and certification solutions for 21 years and our vast experience positions us uniquely to offer you world class service at any of our national training facilities, in South Africa, or onsite across Africa.