<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="2043" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/checkpoint-ccsa" lastchanged="2025-07-29T12:17:34+02:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Check Point Security Administration</title><productcode>CCSA</productcode><vendorcode>CP</vendorcode><vendorname>Check Point</vendorname><fullproductcode>CP-CCSA</fullproductcode><version>R81.X</version><objective>&lt;ul&gt;
&lt;li&gt;Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.&lt;/li&gt;&lt;li&gt;Describe the key elements of Check Point&amp;rsquo;s unified Security Management Architecture.&lt;/li&gt;&lt;li&gt;Recognize SmartConsole features, functions and tools.&lt;/li&gt;&lt;li&gt;Understand Check Point deployment options.&lt;/li&gt;&lt;li&gt;Describe the basic functions of Gaia.&lt;/li&gt;&lt;li&gt;Describe the essential elements of a Security Policy.&lt;/li&gt;&lt;li&gt;Understand how traffic inspection takes place in a unified Security Policy.&lt;/li&gt;&lt;li&gt;Summarize how administration roles and permissions assist in managing policy.&lt;/li&gt;&lt;li&gt;Recall how to implement backup techniques.&lt;/li&gt;&lt;li&gt;Understand the Check Point policy layer concept.&lt;/li&gt;&lt;li&gt;Recognize Check Point security solutions and products and how they work to protect your network.&lt;/li&gt;&lt;li&gt;Understand licensing and contract requirements for Check Point security products.&lt;/li&gt;&lt;li&gt;Identify tools designed to monitor data, determine threats and recognize performance improvements.&lt;/li&gt;&lt;li&gt;Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.&lt;/li&gt;&lt;li&gt;Understand Site-to-Site and Remote Access VPN deployments and communities.&lt;/li&gt;&lt;li&gt;Understand how to analyze and interpret VPN traffic.&lt;/li&gt;&lt;li&gt;Recognize how to define users and user groups.&lt;/li&gt;&lt;li&gt;Understand how to manage user access for internal and external users.&lt;/li&gt;&lt;li&gt;Understand the basic concepts of ClusterXL technology and its advantages.&lt;/li&gt;&lt;li&gt;Understand how to perform periodic administrator tasks as specified in administrator job descriptions&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;General knowledge of TCP/IP&lt;/li&gt;&lt;li&gt;Working knowledge of Windows and/or UNIX, network technology and the Internet&lt;/li&gt;&lt;/ul&gt;</essentials><contents>&lt;p&gt;Course Topics
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Introduction to Check Point Technology&lt;/li&gt;&lt;li&gt;Security Policy Management&lt;/li&gt;&lt;li&gt;Policy Layers&lt;/li&gt;&lt;li&gt;Check Point Security Solutions and Licensing&lt;/li&gt;&lt;li&gt;Traffic Visibility&lt;/li&gt;&lt;li&gt;Basic Concepts of VPN&lt;/li&gt;&lt;li&gt;Managing User Access&lt;/li&gt;&lt;li&gt;Working with ClusterXL&lt;/li&gt;&lt;li&gt;Administrator Task Implementation&lt;/li&gt;&lt;li&gt;Certification&lt;/li&gt;&lt;li&gt;CCSA&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;p&gt;LAB EXERCISES&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Working with Gaia Portal&lt;/li&gt;&lt;li&gt;Modifying an Existing Security Policy&lt;/li&gt;&lt;li&gt;Configuring Hide and Static NAT&lt;/li&gt;&lt;li&gt;Managing Administrator Access&lt;/li&gt;&lt;li&gt;Installing and Managing a Remote Security Gateway&lt;/li&gt;&lt;li&gt;Managing Backups&lt;/li&gt;&lt;li&gt;Defining Access Control Policy Layers&lt;/li&gt;&lt;li&gt;Defining and Sharing Security Policy Layers&lt;/li&gt;&lt;li&gt;Working with Licenses and Contracts&lt;/li&gt;&lt;li&gt;Working with Check Point Logs&lt;/li&gt;&lt;li&gt;Maintaining Check Point Logs&lt;/li&gt;&lt;li&gt;Configuring a Site-to-Site VPN&lt;/li&gt;&lt;li&gt;Providing User Access&lt;/li&gt;&lt;li&gt;Working with Cluster XL&lt;/li&gt;&lt;li&gt;Verifying Network Compliance&lt;/li&gt;&lt;li&gt;Working with CP View&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
- Describe the key elements of Check Point’s unified Security Management Architecture.
- Recognize SmartConsole features, functions and tools.
- Understand Check Point deployment options.
- Describe the basic functions of Gaia.
- Describe the essential elements of a Security Policy.
- Understand how traffic inspection takes place in a unified Security Policy.
- Summarize how administration roles and permissions assist in managing policy.
- Recall how to implement backup techniques.
- Understand the Check Point policy layer concept.
- Recognize Check Point security solutions and products and how they work to protect your network.
- Understand licensing and contract requirements for Check Point security products.
- Identify tools designed to monitor data, determine threats and recognize performance improvements.
- Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
- Understand Site-to-Site and Remote Access VPN deployments and communities.
- Understand how to analyze and interpret VPN traffic.
- Recognize how to define users and user groups.
- Understand how to manage user access for internal and external users.
- Understand the basic concepts of ClusterXL technology and its advantages.
- Understand how to perform periodic administrator tasks as specified in administrator job descriptions</objective_plain><essentials_plain>- General knowledge of TCP/IP
- Working knowledge of Windows and/or UNIX, network technology and the Internet</essentials_plain><contents_plain>Course Topics



- Introduction to Check Point Technology
- Security Policy Management
- Policy Layers
- Check Point Security Solutions and Licensing
- Traffic Visibility
- Basic Concepts of VPN
- Managing User Access
- Working with ClusterXL
- Administrator Task Implementation
- Certification
- CCSA</contents_plain><outline_plain>LAB EXERCISES


- Working with Gaia Portal
- Modifying an Existing Security Policy
- Configuring Hide and Static NAT
- Managing Administrator Access
- Installing and Managing a Remote Security Gateway
- Managing Backups
- Defining Access Control Policy Layers
- Defining and Sharing Security Policy Layers
- Working with Licenses and Contracts
- Working with Check Point Logs
- Maintaining Check Point Logs
- Configuring a Site-to-Site VPN
- Providing User Access
- Working with Cluster XL
- Verifying Network Compliance
- Working with CP View</outline_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="IT" currency="EUR">1950.00</price><price country="GB" currency="GBP">1875.00</price><price country="DE" currency="EUR">2190.00</price><price country="AT" currency="EUR">2190.00</price><price country="SE" currency="EUR">2190.00</price><price country="CH" currency="CHF">2410.00</price><price country="FR" currency="EUR">2900.00</price><price country="SI" currency="EUR">2160.00</price><price country="NL" currency="EUR">2160.00</price></pricelist><miles/></course>