<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="36263" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/checkpoint-ccsa-r82" lastchanged="2026-01-12T12:05:25+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Check Point Certified Security Administrator CCSA R82</title><productcode>CCSA-R82</productcode><vendorcode>CP</vendorcode><vendorname>Check Point</vendorname><fullproductcode>CP-CCSA-R82</fullproductcode><version>1.0</version><essentials>&lt;p&gt;Base Knowledge 
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Unix-like and/or Windows OS&lt;/li&gt;&lt;li&gt;Internet Fundamentals&lt;/li&gt;&lt;li&gt;Networking Fundamentals&lt;/li&gt;&lt;li&gt;Networking Security&lt;/li&gt;&lt;li&gt;System Administration&lt;/li&gt;&lt;li&gt;TCP/IP Networking&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;ul&gt;
&lt;li&gt;Security Administrators&lt;/li&gt;&lt;li&gt;Security Engineers&lt;/li&gt;&lt;li&gt;Security Analysts&lt;/li&gt;&lt;li&gt;Security Consultants&lt;/li&gt;&lt;li&gt;Security Architects&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;h4&gt;Module 1: Introduction to Quantum Security&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Identify the primary components of the Check Point Three-Tier Architecture and explain how they work together.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explore Gaia on Security Management Server&lt;/li&gt;&lt;li&gt;Explore Gaia on Dedicated Log Server&lt;/li&gt;&lt;li&gt;Explore Gaia on Security Gateway Cluster Members&lt;/li&gt;&lt;li&gt;Connect to SmartConsole&lt;/li&gt;&lt;li&gt;Navigate GATEWAYS &amp;amp; SERVERS Vies&lt;/li&gt;&lt;li&gt;Navigate SECURITY POLICIES Views&lt;/li&gt;&lt;li&gt;Navigate LOGS &amp;amp; EVENTS Views&lt;/li&gt;&lt;li&gt;Navigate MANAGE &amp;amp; SETTINGS Views&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 2: Administrator Account Management&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Explain the purpose of SmartConsole administrator accounts&lt;/li&gt;&lt;li&gt;Identify features for collaboration: session management, concurrent administration, policy installation&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Create new administrators and assign profiles&lt;/li&gt;&lt;li&gt;Test administrator profile assignments&lt;/li&gt;&lt;li&gt;Manage concurrent sessions&lt;/li&gt;&lt;li&gt;Take over another session and verify status&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 3: Object Management&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Explain the purpose of SmartConsole objects&lt;/li&gt;&lt;li&gt;Provide examples of physical and logical objects&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;View and modify GATEWAYS &amp;amp; SERVERS objects&lt;/li&gt;&lt;li&gt;View and modify network objects&lt;/li&gt;&lt;li&gt;View and modify service objects&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 4: Security Policy Management&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Explain the purpose of Security Policies&lt;/li&gt;&lt;li&gt;Identify the essential elements of a Security Policy.&lt;/li&gt;&lt;li&gt;Identify features and capabilities that enhance the configuration and management of the Security Policy.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Verify and modify the Security Policy.&lt;/li&gt;&lt;li&gt;Install the standard Security Policy.&lt;/li&gt;&lt;li&gt;Test the Security Policy.&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 5: Policy Layers&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Demonstrate an understanding of the Check Point policy layer concept.&lt;/li&gt;&lt;li&gt;Explain how layers affect traffic inspection.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Add an Ordered Layer&lt;/li&gt;&lt;li&gt;Configure and deploy Ordered Layer rules&lt;/li&gt;&lt;li&gt;Test Ordered Layer policy&lt;/li&gt;&lt;li&gt;Create Inline DMZ Layer&lt;/li&gt;&lt;li&gt;Test Inline DMZ Layer&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 6: Security Operations Monitoring&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Explain the purpose of security operations monitoring&lt;/li&gt;&lt;li&gt;Tune log server configuration&lt;/li&gt;&lt;li&gt;Use predefined and custom queries to filter the logging results.&lt;/li&gt;&lt;li&gt;Monitor the state of Check Point systems.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Configure log management&lt;/li&gt;&lt;li&gt;Enhance rulebase view, rules, and logging&lt;/li&gt;&lt;li&gt;Review logs and search for data&lt;/li&gt;&lt;li&gt;Configure Monitoring Blade&lt;/li&gt;&lt;li&gt;Monitor status of the systems&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;Module 7: Identity Awareness&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Explain the purpose of the Identity Awareness solution&lt;/li&gt;&lt;li&gt;Identify the essential elements of Identity Awareness.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Adjust security policy for Identity Awareness&lt;/li&gt;&lt;li&gt;Configure Identity Collector&lt;/li&gt;&lt;li&gt;Define the user access role&lt;/li&gt;&lt;li&gt;Test Identity Awareness&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 8: HTTPS Inspection&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Explain the purpose of HTTPS Inspection solution&lt;/li&gt;&lt;li&gt;Identify the essential elements of HTTPS Inspection&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Enable HTTPS Inspection&lt;/li&gt;&lt;li&gt;Adjust access control rules&lt;/li&gt;&lt;li&gt;Deploy Security Gateway certificate&lt;/li&gt;&lt;li&gt;Test and analyze policy with HTTPS Inspection&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 9: Application Control and URL Filtering&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Explain the purpose of the Application Control and URL Filtering solutions&lt;/li&gt;&lt;li&gt;Identify the essential elements of Application Control and URL Filtering&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Adjust the Access Control Policy&lt;/li&gt;&lt;li&gt;Create and adjust Application Control and URL&lt;/li&gt;&lt;li&gt;Test and adjust the Application Control and URL Filtering Rules&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 10: Threat Prevention Fundamentals&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Explain the purpose of the Threat Prevention solution&lt;/li&gt;&lt;li&gt;Identify the essential elements of Autonomous Threat Prevention&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Enable Autonomous Threat Prevention&lt;/li&gt;&lt;li&gt;Test Autonomous Threat Prevention&lt;/li&gt;&lt;/ul&gt;</outline><essentials_plain>Base Knowledge 



- Unix-like and/or Windows OS
- Internet Fundamentals
- Networking Fundamentals
- Networking Security
- System Administration
- TCP/IP Networking</essentials_plain><audience_plain>- Security Administrators
- Security Engineers
- Security Analysts
- Security Consultants
- Security Architects</audience_plain><outline_plain>Module 1: Introduction to Quantum Security


- Identify the primary components of the Check Point Three-Tier Architecture and explain how they work together.

Lab Tasks:



- Explore Gaia on Security Management Server
- Explore Gaia on Dedicated Log Server
- Explore Gaia on Security Gateway Cluster Members
- Connect to SmartConsole
- Navigate GATEWAYS &amp; SERVERS Vies
- Navigate SECURITY POLICIES Views
- Navigate LOGS &amp; EVENTS Views
- Navigate MANAGE &amp; SETTINGS Views
Module 2: Administrator Account Management


- Explain the purpose of SmartConsole administrator accounts
- Identify features for collaboration: session management, concurrent administration, policy installation

Lab Tasks:



- Create new administrators and assign profiles
- Test administrator profile assignments
- Manage concurrent sessions
- Take over another session and verify status
Module 3: Object Management


- Explain the purpose of SmartConsole objects
- Provide examples of physical and logical objects

Lab Tasks:



- View and modify GATEWAYS &amp; SERVERS objects
- View and modify network objects
- View and modify service objects
Module 4: Security Policy Management


- Explain the purpose of Security Policies
- Identify the essential elements of a Security Policy.
- Identify features and capabilities that enhance the configuration and management of the Security Policy.

Lab Tasks:



- Verify and modify the Security Policy.
- Install the standard Security Policy.
- Test the Security Policy.
Module 5: Policy Layers


- Demonstrate an understanding of the Check Point policy layer concept.
- Explain how layers affect traffic inspection.

Lab Tasks:



- Add an Ordered Layer
- Configure and deploy Ordered Layer rules
- Test Ordered Layer policy
- Create Inline DMZ Layer
- Test Inline DMZ Layer
Module 6: Security Operations Monitoring


- Explain the purpose of security operations monitoring
- Tune log server configuration
- Use predefined and custom queries to filter the logging results.
- Monitor the state of Check Point systems.

Lab Tasks:



- Configure log management
- Enhance rulebase view, rules, and logging
- Review logs and search for data
- Configure Monitoring Blade
- Monitor status of the systems

Module 7: Identity Awareness


- Explain the purpose of the Identity Awareness solution
- Identify the essential elements of Identity Awareness.

Lab Tasks:



- Adjust security policy for Identity Awareness
- Configure Identity Collector
- Define the user access role
- Test Identity Awareness
Module 8: HTTPS Inspection


- Explain the purpose of HTTPS Inspection solution
- Identify the essential elements of HTTPS Inspection

Lab Tasks:



- Enable HTTPS Inspection
- Adjust access control rules
- Deploy Security Gateway certificate
- Test and analyze policy with HTTPS Inspection
Module 9: Application Control and URL Filtering


- Explain the purpose of the Application Control and URL Filtering solutions
- Identify the essential elements of Application Control and URL Filtering

Lab Tasks:



- Adjust the Access Control Policy
- Create and adjust Application Control and URL
- Test and adjust the Application Control and URL Filtering Rules
Module 10: Threat Prevention Fundamentals


- Explain the purpose of the Threat Prevention solution
- Identify the essential elements of Autonomous Threat Prevention

Lab Tasks:



- Enable Autonomous Threat Prevention
- Test Autonomous Threat Prevention</outline_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="DE" currency="EUR">2190.00</price><price country="GB" currency="GBP">1875.00</price></pricelist><miles/></course>