{"course":{"productid":36263,"modality":6,"active":true,"language":"en","title":"Check Point Certified Security Administrator CCSA R82","productcode":"CCSA-R82","vendorcode":"CP","vendorname":"Check Point","fullproductcode":"CP-CCSA-R82","courseware":{"has_ekit":false,"has_printkit":true,"language":""},"url":"https:\/\/portal.flane.ch\/course\/checkpoint-ccsa-r82","essentials":"<p>Base Knowledge \n<\/p>\n<ul>\n<li>Unix-like and\/or Windows OS<\/li><li>Internet Fundamentals<\/li><li>Networking Fundamentals<\/li><li>Networking Security<\/li><li>System Administration<\/li><li>TCP\/IP Networking<\/li><\/ul>","audience":"<ul>\n<li>Security Administrators<\/li><li>Security Engineers<\/li><li>Security Analysts<\/li><li>Security Consultants<\/li><li>Security Architects<\/li><\/ul>","outline":"<h4>Module 1: Introduction to Quantum Security<\/h4><ul>\n<li>Identify the primary components of the Check Point Three-Tier Architecture and explain how they work together.<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Explore Gaia on Security Management Server<\/li><li>Explore Gaia on Dedicated Log Server<\/li><li>Explore Gaia on Security Gateway Cluster Members<\/li><li>Connect to SmartConsole<\/li><li>Navigate GATEWAYS &amp; SERVERS Vies<\/li><li>Navigate SECURITY POLICIES Views<\/li><li>Navigate LOGS &amp; EVENTS Views<\/li><li>Navigate MANAGE &amp; SETTINGS Views<\/li><\/ul><h4>Module 2: Administrator Account Management<\/h4><ul>\n<li>Explain the purpose of SmartConsole administrator accounts<\/li><li>Identify features for collaboration: session management, concurrent administration, policy installation<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Create new administrators and assign profiles<\/li><li>Test administrator profile assignments<\/li><li>Manage concurrent sessions<\/li><li>Take over another session and verify status<\/li><\/ul><h4>Module 3: Object Management<\/h4><ul>\n<li>Explain the purpose of SmartConsole objects<\/li><li>Provide examples of physical and logical objects<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>View and modify GATEWAYS &amp; SERVERS objects<\/li><li>View and modify network objects<\/li><li>View and modify service objects<\/li><\/ul><h4>Module 4: Security Policy Management<\/h4><ul>\n<li>Explain the purpose of Security Policies<\/li><li>Identify the essential elements of a Security Policy.<\/li><li>Identify features and capabilities that enhance the configuration and management of the Security Policy.<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Verify and modify the Security Policy.<\/li><li>Install the standard Security Policy.<\/li><li>Test the Security Policy.<\/li><\/ul><h4>Module 5: Policy Layers<\/h4><ul>\n<li>Demonstrate an understanding of the Check Point policy layer concept.<\/li><li>Explain how layers affect traffic inspection.<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Add an Ordered Layer<\/li><li>Configure and deploy Ordered Layer rules<\/li><li>Test Ordered Layer policy<\/li><li>Create Inline DMZ Layer<\/li><li>Test Inline DMZ Layer<\/li><\/ul><h4>Module 6: Security Operations Monitoring<\/h4><ul>\n<li>Explain the purpose of security operations monitoring<\/li><li>Tune log server configuration<\/li><li>Use predefined and custom queries to filter the logging results.<\/li><li>Monitor the state of Check Point systems.<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Configure log management<\/li><li>Enhance rulebase view, rules, and logging<\/li><li>Review logs and search for data<\/li><li>Configure Monitoring Blade<\/li><li>Monitor status of the systems<\/li><\/ul>\n<h4>Module 7: Identity Awareness<\/h4><ul>\n<li>Explain the purpose of the Identity Awareness solution<\/li><li>Identify the essential elements of Identity Awareness.<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Adjust security policy for Identity Awareness<\/li><li>Configure Identity Collector<\/li><li>Define the user access role<\/li><li>Test Identity Awareness<\/li><\/ul><h4>Module 8: HTTPS Inspection<\/h4><ul>\n<li>Explain the purpose of HTTPS Inspection solution<\/li><li>Identify the essential elements of HTTPS Inspection<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Enable HTTPS Inspection<\/li><li>Adjust access control rules<\/li><li>Deploy Security Gateway certificate<\/li><li>Test and analyze policy with HTTPS Inspection<\/li><\/ul><h4>Module 9: Application Control and URL Filtering<\/h4><ul>\n<li>Explain the purpose of the Application Control and URL Filtering solutions<\/li><li>Identify the essential elements of Application Control and URL Filtering<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Adjust the Access Control Policy<\/li><li>Create and adjust Application Control and URL<\/li><li>Test and adjust the Application Control and URL Filtering Rules<\/li><\/ul><h4>Module 10: Threat Prevention Fundamentals<\/h4><ul>\n<li>Explain the purpose of the Threat Prevention solution<\/li><li>Identify the essential elements of Autonomous Threat Prevention<\/li><\/ul><p>\n<strong>Lab Tasks:<\/strong>\n<\/p>\n<ul>\n<li>Enable Autonomous Threat Prevention<\/li><li>Test Autonomous Threat Prevention<\/li><\/ul>","summary":"<p>This course provides students with the fundamental knowledge, skills, and hands-on experience needed to configure, manage, and monitor an existing Quantum Security Environment. Students will learn how to access and navigate the Gaia Portal and the Gaia Command Line Interface, manage Administrator access, create and configure Network Objects, create new Security Policies, configure Ordered Layers and a Shared Inline Layer, elevate the traffic view and monitor system states, configure Identity Awareness, elevate security with HTTPS Inspection, configure Application Control and URL Filtering, and configure Autonomous Threat Prevention.<\/p>","essentials_plain":"Base Knowledge \n\n\n\n- Unix-like and\/or Windows OS\n- Internet Fundamentals\n- Networking Fundamentals\n- Networking Security\n- System Administration\n- TCP\/IP Networking","audience_plain":"- Security Administrators\n- Security Engineers\n- Security Analysts\n- Security Consultants\n- Security Architects","outline_plain":"Module 1: Introduction to Quantum Security\n\n\n- Identify the primary components of the Check Point Three-Tier Architecture and explain how they work together.\n\nLab Tasks:\n\n\n\n- Explore Gaia on Security Management Server\n- Explore Gaia on Dedicated Log Server\n- Explore Gaia on Security Gateway Cluster Members\n- Connect to SmartConsole\n- Navigate GATEWAYS & SERVERS Vies\n- Navigate SECURITY POLICIES Views\n- Navigate LOGS & EVENTS Views\n- Navigate MANAGE & SETTINGS Views\nModule 2: Administrator Account Management\n\n\n- Explain the purpose of SmartConsole administrator accounts\n- Identify features for collaboration: session management, concurrent administration, policy installation\n\nLab Tasks:\n\n\n\n- Create new administrators and assign profiles\n- Test administrator profile assignments\n- Manage concurrent sessions\n- Take over another session and verify status\nModule 3: Object Management\n\n\n- Explain the purpose of SmartConsole objects\n- Provide examples of physical and logical objects\n\nLab Tasks:\n\n\n\n- View and modify GATEWAYS & SERVERS objects\n- View and modify network objects\n- View and modify service objects\nModule 4: Security Policy Management\n\n\n- Explain the purpose of Security Policies\n- Identify the essential elements of a Security Policy.\n- Identify features and capabilities that enhance the configuration and management of the Security Policy.\n\nLab Tasks:\n\n\n\n- Verify and modify the Security Policy.\n- Install the standard Security Policy.\n- Test the Security Policy.\nModule 5: Policy Layers\n\n\n- Demonstrate an understanding of the Check Point policy layer concept.\n- Explain how layers affect traffic inspection.\n\nLab Tasks:\n\n\n\n- Add an Ordered Layer\n- Configure and deploy Ordered Layer rules\n- Test Ordered Layer policy\n- Create Inline DMZ Layer\n- Test Inline DMZ Layer\nModule 6: Security Operations Monitoring\n\n\n- Explain the purpose of security operations monitoring\n- Tune log server configuration\n- Use predefined and custom queries to filter the logging results.\n- Monitor the state of Check Point systems.\n\nLab Tasks:\n\n\n\n- Configure log management\n- Enhance rulebase view, rules, and logging\n- Review logs and search for data\n- Configure Monitoring Blade\n- Monitor status of the systems\n\nModule 7: Identity Awareness\n\n\n- Explain the purpose of the Identity Awareness solution\n- Identify the essential elements of Identity Awareness.\n\nLab Tasks:\n\n\n\n- Adjust security policy for Identity Awareness\n- Configure Identity Collector\n- Define the user access role\n- Test Identity Awareness\nModule 8: HTTPS Inspection\n\n\n- Explain the purpose of HTTPS Inspection solution\n- Identify the essential elements of HTTPS Inspection\n\nLab Tasks:\n\n\n\n- Enable HTTPS Inspection\n- Adjust access control rules\n- Deploy Security Gateway certificate\n- Test and analyze policy with HTTPS Inspection\nModule 9: Application Control and URL Filtering\n\n\n- Explain the purpose of the Application Control and URL Filtering solutions\n- Identify the essential elements of Application Control and URL Filtering\n\nLab Tasks:\n\n\n\n- Adjust the Access Control Policy\n- Create and adjust Application Control and URL\n- Test and adjust the Application Control and URL Filtering Rules\nModule 10: Threat Prevention Fundamentals\n\n\n- Explain the purpose of the Threat Prevention solution\n- Identify the essential elements of Autonomous Threat Prevention\n\nLab Tasks:\n\n\n\n- Enable Autonomous Threat Prevention\n- Test Autonomous Threat Prevention","summary_plain":"This course provides students with the fundamental knowledge, skills, and hands-on experience needed to configure, manage, and monitor an existing Quantum Security Environment. Students will learn how to access and navigate the Gaia Portal and the Gaia Command Line Interface, manage Administrator access, create and configure Network Objects, create new Security Policies, configure Ordered Layers and a Shared Inline Layer, elevate the traffic view and monitor system states, configure Identity Awareness, elevate security with HTTPS Inspection, configure Application Control and URL Filtering, and configure Autonomous Threat Prevention.","version":"1.0","duration":{"unit":"d","value":3,"formatted":"3 days"},"pricelist":{"List Price":{"DE":{"country":"DE","currency":"EUR","taxrate":19,"price":2190},"GB":{"country":"GB","currency":"GBP","taxrate":20,"price":1875}}},"lastchanged":"2026-01-12T12:05:25+01:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/en\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/en\/json-course-schedule\/36263","source_lang":"en","source":"https:\/\/portal.flane.ch\/swisscom\/en\/json-course\/checkpoint-ccsa-r82"}}