Type
Virtual
Classroom ILT
Skill Level

Available dates
Learning Path
Virtual
Duration
1 Day

TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL

DURATION
AVAILABLE DATES
Choose date
From: R13 900,00
Price excluding VAT
Introduction:
With the barrage of connected devices, new technologies like cloud computing, and a continuous wave of sophisticated threats, managing security is becoming increasingly complex – security needs to adjust to new operational realities. The key to managing this complexity is through security consolidation – bringing all security protections and functions under one umbrella. With R80.10, security consolidation is fully realized. This 3 day course provides an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades
Audience profile:
This course is intended primarily for:
- System Administrators
- Support Analysts
- Security Managers
- Network Engineers
- Anyone seeking CCSA certification
- Technical persons who support, install, deploy or administer Check Point Software Blades
Pre-requisites:
In addition to their professional experience, students who attend this training should already have the following technical knowledge:
- General Knowledge of TCP/IP
- Working knowledge of Windows and/or UNIX, Network technology and the internet
- 6 months to 1 year experience with Check Point products recommended
- Check Point User Center Account email address must be confirmed
After completing this course, students will be able to:
- Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic
- Describe the key elements of Check Point’s unified Security Management Architecture
- Recognize SmartConsole features, functions and tools
- Understand Check Point deployment options
- Describe the basic functions of Gaia
- Describe the essential elements of a Security Policy
- Understand how traffic inspection takes place in a unified Security Policy
- Summarize how administration roles and permissions assist in managing policy
- Recall how to implement backup techniques
- Understand the Check Point policy layer concept
- Recognize Check Point security solutions and products and how they work to protect your network
- Understand licensing and contract requirements for Check Point security products
- Identify tools designed to monitor data, determine threats and recognize performance improvements
- Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities
- Understand Site-to-Site and Remote Access VPN deployments and communities
- Understand how to analyze and interpret VPN traffic
- Recognize how to define users and user groups
- Understand how to manage user access for internal and external users
- Understand the basic concepts of ClusterXL technology and its advantages
- Understand how to perform periodic administrator tasks as specified in administrator job descriptions
Module 1: Introduction to Check Point Technology | |
Module 2: Security Policy Management | |
Module 3: Policy Layers | |
Module 4: Check Point Security Solutions and Licensing | |
Module 5: Traffic Visibility | |
Module 6: Basic Concepts of VPN | |
Module 7: Managing User Access | |
Module 8: Working with ClusterXL | |
Module 9: Administrator Task Implementation | |
LABs: | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Torque IT specializes in providing our Clients with Vendor authorized instructor-led training, enablement IT courses, and certification solutions.
Associated Certifications & Exam
This course helps prepare for CCSA R80 exam #156-215.80. The exam contains 90 multiple-choice questions to be completed in 90 minutes. Students should have at least 6 months to 1 year experience with Check Point products is recommended before challenging the exam. A Check Point User Center or PartnerMAP account is required to receive benefits for Check Point certifications. The Check Point Account Services team will be able to verify student information
For student’s results to post to their User Center account for the e-certificate, their Pearson VUE account MUST use the same email address as their User Center account.
On successful completion of this course students will receive a Torque IT attendance certificate.

Check Point Overview
Torque IT and Check Point are dedicated to providing customers with training, certification and technology solutions that offer uncompromised protection against security threats whilst reducing complexity and lowering total cost of ownership.
Check Point works only with the best partners in the security industry and Torque IT has stepped up to the challenge of becoming Africa’s Check Point Authorised Training Centre (ATC) of choice for best-in-class Check Point enablement and certification solutions.
We offer off-the-shelf Check Point Training and Certification Solutions as well as customized deliveries that are tailored to your unique requirements.
Torque IT has specialized in providing vendor authorized technology training, enablement and certification solutions for 21 years and our vast experience positions us uniquely to offer you world class service at any of our national training facilities, in South Africa, or onsite across Africa.