{"course":{"productid":7723,"modality":6,"active":true,"language":"en","title":"Check Point Certified Security Administrator and Expert Boot Camp","productcode":"CCSA\/CCSER","vendorcode":"CP","vendorname":"Check Point","fullproductcode":"CP-CCSA\/CCSER","courseware":{"has_ekit":false,"has_printkit":true,"language":""},"url":"https:\/\/portal.flane.ch\/course\/7723","audience":"<p>This course is recommended for technical professionals and experts who support, install, and deploy Check Point products.<\/p>","outline":"<h4>Module 1: Introduction to Quantum Security<\/h4><ul>\n<li>Identify the primary components of the Check Point Three-Tier Architecture and explain how they work together.<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Explore Gaia on Security Management Server<\/li><li>Explore Gaia on Dedicated Log Server<\/li><li>Explore Gaia on Security Gateway Cluster Members<\/li><li>Connect to SmartConsole<\/li><li>Navigate GATEWAYS &amp; SERVERS Vies<\/li><li>Navigate SECURITY POLICIES Views<\/li><li>Navigate LOGS &amp; EVENTS Views<\/li><li>Navigate MANAGE &amp; SETTINGS Views<\/li><\/ul><h4>Module 2: Administrator Account Management<\/h4><ul>\n<li>Explain the purpose of SmartConsole administrator accounts<\/li><li>Identify features for collaboration: session management, concurrent administration, policy installation<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Create new administrators and assign profiles<\/li><li>Test administrator profile assignments<\/li><li>Manage concurrent sessions<\/li><li>Take over another session and verify status<\/li><\/ul><h4>Module 3: Object Management<\/h4><ul>\n<li>Explain the purpose of SmartConsole objects<\/li><li>Provide examples of physical and logical objects<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>View and modify GATEWAYS &amp; SERVERS objects<\/li><li>View and modify network objects<\/li><li>View and modify service objects<\/li><\/ul><h4>Module 4: Security Policy Management<\/h4><ul>\n<li>Explain the purpose of Security Policies<\/li><li>Identify the essential elements of a Security Policy.<\/li><li>Identify features and capabilities that enhance the configuration and management of the Security Policy.<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Verify and modify the Security Policy.<\/li><li>Install the standard Security Policy.<\/li><li>Test the Security Policy.<\/li><\/ul><h4>Module 5: Policy Layers<\/h4><ul>\n<li>Demonstrate an understanding of the Check Point policy layer concept.<\/li><li>Explain how layers affect traffic inspection.<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Add an Ordered Layer<\/li><li>Configure and deploy Ordered Layer rules<\/li><li>Test Ordered Layer policy<\/li><li>Create Inline DMZ Layer<\/li><li>Test Inline DMZ Layer<\/li><\/ul><h4>Module 6: Security Operations Monitoring<\/h4><ul>\n<li>Explain the purpose of security operations monitoring<\/li><li>Tune log server configuration<\/li><li>Use predefined and custom queries to filter the logging results.<\/li><li>Monitor the state of Check Point systems.<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Configure log management<\/li><li>Enhance rulebase view, rules, and logging<\/li><li>Review logs and search for data<\/li><li>Configure Monitoring Blade<\/li><li>Monitor status of the systems<\/li><\/ul><h4>Module 7: Identity Awareness<\/h4><ul>\n<li>Explain the purpose of the Identity Awareness solution<\/li><li>Identify the essential elements of Identity Awareness.<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Adjust security policy for Identity Awareness<\/li><li>Configure Identity Collector<\/li><li>Define the user access role<\/li><li>Test Identity Awareness<\/li><\/ul><h4>Module 8: HTTPS Inspection<\/h4><ul>\n<li>Explain the purpose of HTTPS Inspection solution<\/li><li>Identify the essential elements of HTTPS Inspection<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Enable HTTPS Inspection<\/li><li>Adjust access control rules<\/li><li>Deploy Security Gateway certificate<\/li><li>Test and analyze policy with HTTPS Inspection<\/li><\/ul><h4>Module 9: Application Control and URL Filtering<\/h4><ul>\n<li>Explain the purpose of the Application Control and URL Filtering solutions<\/li><li>Identify the essential elements of Application Control and URL Filtering<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Adjust the Access Control Policy<\/li><li>Create and adjust Application Control and URL<\/li><li>Test and adjust the Application Control and URL Filtering Rules<\/li><\/ul><h4>Module 10: Threat Prevention Fundamentals<\/h4><ul>\n<li>Explain the purpose of the Threat Prevention solution<\/li><li>Identify the essential elements of Autonomous Threat Prevention<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Enable Autonomous Threat Prevention<\/li><li>Test Autonomous Threat Prevention<\/li><\/ul><h4>Module 11: Management High Availability<\/h4><ul>\n<li>Explain the purpose of Management High Availability<\/li><li>Identify the essential elements of Management High Availability<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Deploy and configure Management High Availability<\/li><li>Ensure the failover process functions as expected<\/li><\/ul><h4>Module 12: Advanced Policy Management<\/h4><ul>\n<li>Identify ways to enhance the Security Policy with more object types<\/li><li>Create dynamic objects to make policy updatable from the Gateway<\/li><li>Manually define NAT rules<\/li><li>Configure Security Management behind NAT<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Use Updatable Objects<\/li><li>Configure Network Address Translation for server and network objects<\/li><li>Configure Management behind NAT for Branch Office connections<\/li><\/ul><h4>Module 13: Site-to-Site VPN<\/h4><ul>\n<li>Discuss site-to-site VPN basics, deployment, and communities<\/li><li>Describe how to analyze and interpret VPN tunnel traffic<\/li><li>Articulate how pre-shared keys and certificates can be configured to authenticate with third-party and externally managed VPN Gateways<\/li><li>Explain Link Selection and ISP Redundancy options<\/li><li>Explain tunnel management features<\/li><\/ul><p>\n<strong>Lab Task:<\/strong>\n<\/p>\n<ul>\n<li>Configure Site-to-Site VPN with internally managed Security Gateways<\/li><\/ul><h4>Module 14: Advanced Security Monitoring<\/h4><ul>\n<li>Describe the SmartEvent and Compliance Blade solutions, including their purpose and use<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Configure a SmartEvent Server to monitor relevant patterns and events<\/li><li>Demonstrate how to configure Events and Alerts in SmartEvent<\/li><li>Demonstrate how to run specific SmartEvent reports<\/li><li>Activate the Compliance Blade<\/li><li>Demonstrate Security Best Practice settings and alerts<\/li><li>Demonstrate Regulatory Requirements Compliance Scores<\/li><\/ul><h4>Module 15: Upgrades<\/h4><ul>\n<li>Identify supported upgrade options<\/li><\/ul><p>\n<strong>Lab Task:<\/strong>\n<\/p>\n<ul>\n<li>Upgrade a Security Gateway<\/li><li>Use Central Deployment tool to install Hotfixes<\/li><\/ul><h4>Module 16: Advanced Upgrades and Migrations<\/h4><ul>\n<li>Export\/import a Management Database<\/li><li>Upgrade a Security Management Server by freshly deploying the new release or using a new appliance<\/li><\/ul><p>\n<strong>Lab Task:<\/strong>\n<\/p>\n<ul>\n<li>Prepare to perform an Advanced Upgrade with Database Migration on the Primary Security Management Server in a distributed environment<\/li><li>Perform an import of a Primary Security Management Server in a distributed Check Point environment<\/li><\/ul><h4>Module 17: ElasticXL Cluster<\/h4><ul>\n<li>Describe the ElasticXL Cluster solution, including its purpose and use<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Deploy an ElasticXL Security Gateway Cluster<\/li><\/ul>","summary":"<p>Accelerate your learning for both Admin and Expert levels. Learn basic and advanced concepts and develop skills necessary to administer, deploy, and architect Check Point security solutions.<\/p>","audience_plain":"This course is recommended for technical professionals and experts who support, install, and deploy Check Point products.","outline_plain":"Module 1: Introduction to Quantum Security\n\n\n- Identify the primary components of the Check Point Three-Tier Architecture and explain how they work together.\n\nLab Tasks:\n\n\n\n- Explore Gaia on Security Management Server\n- Explore Gaia on Dedicated Log Server\n- Explore Gaia on Security Gateway Cluster Members\n- Connect to SmartConsole\n- Navigate GATEWAYS & SERVERS Vies\n- Navigate SECURITY POLICIES Views\n- Navigate LOGS & EVENTS Views\n- Navigate MANAGE & SETTINGS Views\nModule 2: Administrator Account Management\n\n\n- Explain the purpose of SmartConsole administrator accounts\n- Identify features for collaboration: session management, concurrent administration, policy installation\n\nLab Tasks:\n\n\n\n- Create new administrators and assign profiles\n- Test administrator profile assignments\n- Manage concurrent sessions\n- Take over another session and verify status\nModule 3: Object Management\n\n\n- Explain the purpose of SmartConsole objects\n- Provide examples of physical and logical objects\n\nLab Tasks:\n\n\n\n- View and modify GATEWAYS & SERVERS objects\n- View and modify network objects\n- View and modify service objects\nModule 4: Security Policy Management\n\n\n- Explain the purpose of Security Policies\n- Identify the essential elements of a Security Policy.\n- Identify features and capabilities that enhance the configuration and management of the Security Policy.\n\nLab Tasks:\n\n\n\n- Verify and modify the Security Policy.\n- Install the standard Security Policy.\n- Test the Security Policy.\nModule 5: Policy Layers\n\n\n- Demonstrate an understanding of the Check Point policy layer concept.\n- Explain how layers affect traffic inspection.\n\nLab Tasks:\n\n\n\n- Add an Ordered Layer\n- Configure and deploy Ordered Layer rules\n- Test Ordered Layer policy\n- Create Inline DMZ Layer\n- Test Inline DMZ Layer\nModule 6: Security Operations Monitoring\n\n\n- Explain the purpose of security operations monitoring\n- Tune log server configuration\n- Use predefined and custom queries to filter the logging results.\n- Monitor the state of Check Point systems.\n\nLab Tasks:\n\n\n\n- Configure log management\n- Enhance rulebase view, rules, and logging\n- Review logs and search for data\n- Configure Monitoring Blade\n- Monitor status of the systems\nModule 7: Identity Awareness\n\n\n- Explain the purpose of the Identity Awareness solution\n- Identify the essential elements of Identity Awareness.\n\nLab Tasks:\n\n\n\n- Adjust security policy for Identity Awareness\n- Configure Identity Collector\n- Define the user access role\n- Test Identity Awareness\nModule 8: HTTPS Inspection\n\n\n- Explain the purpose of HTTPS Inspection solution\n- Identify the essential elements of HTTPS Inspection\n\nLab Tasks:\n\n\n\n- Enable HTTPS Inspection\n- Adjust access control rules\n- Deploy Security Gateway certificate\n- Test and analyze policy with HTTPS Inspection\nModule 9: Application Control and URL Filtering\n\n\n- Explain the purpose of the Application Control and URL Filtering solutions\n- Identify the essential elements of Application Control and URL Filtering\n\nLab Tasks:\n\n\n\n- Adjust the Access Control Policy\n- Create and adjust Application Control and URL\n- Test and adjust the Application Control and URL Filtering Rules\nModule 10: Threat Prevention Fundamentals\n\n\n- Explain the purpose of the Threat Prevention solution\n- Identify the essential elements of Autonomous Threat Prevention\n\nLab Tasks:\n\n\n\n- Enable Autonomous Threat Prevention\n- Test Autonomous Threat Prevention\nModule 11: Management High Availability\n\n\n- Explain the purpose of Management High Availability\n- Identify the essential elements of Management High Availability\n\nLab Tasks:\n\n\n\n- Deploy and configure Management High Availability\n- Ensure the failover process functions as expected\nModule 12: Advanced Policy Management\n\n\n- Identify ways to enhance the Security Policy with more object types\n- Create dynamic objects to make policy updatable from the Gateway\n- Manually define NAT rules\n- Configure Security Management behind NAT\n\nLab Tasks:\n\n\n\n- Use Updatable Objects\n- Configure Network Address Translation for server and network objects\n- Configure Management behind NAT for Branch Office connections\nModule 13: Site-to-Site VPN\n\n\n- Discuss site-to-site VPN basics, deployment, and communities\n- Describe how to analyze and interpret VPN tunnel traffic\n- Articulate how pre-shared keys and certificates can be configured to authenticate with third-party and externally managed VPN Gateways\n- Explain Link Selection and ISP Redundancy options\n- Explain tunnel management features\n\nLab Task:\n\n\n\n- Configure Site-to-Site VPN with internally managed Security Gateways\nModule 14: Advanced Security Monitoring\n\n\n- Describe the SmartEvent and Compliance Blade solutions, including their purpose and use\n\nLab Tasks:\n\n\n\n- Configure a SmartEvent Server to monitor relevant patterns and events\n- Demonstrate how to configure Events and Alerts in SmartEvent\n- Demonstrate how to run specific SmartEvent reports\n- Activate the Compliance Blade\n- Demonstrate Security Best Practice settings and alerts\n- Demonstrate Regulatory Requirements Compliance Scores\nModule 15: Upgrades\n\n\n- Identify supported upgrade options\n\nLab Task:\n\n\n\n- Upgrade a Security Gateway\n- Use Central Deployment tool to install Hotfixes\nModule 16: Advanced Upgrades and Migrations\n\n\n- Export\/import a Management Database\n- Upgrade a Security Management Server by freshly deploying the new release or using a new appliance\n\nLab Task:\n\n\n\n- Prepare to perform an Advanced Upgrade with Database Migration on the Primary Security Management Server in a distributed environment\n- Perform an import of a Primary Security Management Server in a distributed Check Point environment\nModule 17: ElasticXL Cluster\n\n\n- Describe the ElasticXL Cluster solution, including its purpose and use\n\nLab Tasks:\n\n\n\n- Deploy an ElasticXL Security Gateway Cluster","summary_plain":"Accelerate your learning for both Admin and Expert levels. Learn basic and advanced concepts and develop skills necessary to administer, deploy, and architect Check Point security solutions.","skill_level":"Intermediate","version":"R82","duration":{"unit":"d","value":5,"formatted":"5 days"},"pricelist":{"List Price":{"SI":{"country":"SI","currency":"EUR","taxrate":20,"price":2500},"DE":{"country":"DE","currency":"EUR","taxrate":19,"price":3950},"AT":{"country":"AT","currency":"EUR","taxrate":20,"price":3950},"FR":{"country":"FR","currency":"EUR","taxrate":19.6,"price":3950},"IL":{"country":"IL","currency":"ILS","taxrate":17,"price":13700},"CH":{"country":"CH","currency":"EUR","taxrate":8.1,"price":4937.5}}},"lastchanged":"2026-01-12T12:10:51+01:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/en\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/en\/json-course-schedule\/7723","source_lang":"en","source":"https:\/\/portal.flane.ch\/swisscom\/en\/json-course\/7723"}}