{"course":{"productid":2043,"modality":6,"active":true,"language":"fr","title":"Check Point Security Administration","productcode":"CCSA","vendorcode":"CP","vendorname":"Check Point","fullproductcode":"CP-CCSA","courseware":{"has_ekit":false,"has_printkit":true,"language":""},"url":"https:\/\/portal.flane.ch\/course\/checkpoint-ccsa","objective":"<ul>\n<li>Introduction to Check Point Technology<\/li><li>Security Policy Management<\/li><li>Policy Layers<\/li><li>Check Point Security Solutions and Licensing<\/li><li>Traffic Visibility<\/li><li>Basic Concepts of VPN<\/li><li>Managing User Access<\/li><li>Working with ClusterXL<\/li><li>Administrator Task Implementation<\/li><\/ul>","essentials":"<ul>\n<li>General knowledge of TCP\/IP<\/li><li>Working knowledge of Windows and\/or UNIX, network technology and the Internet<\/li><\/ul>","audience":"<p>Ing&eacute;nieur s&eacute;curit&eacute;, administrateur s&eacute;curit&eacute;, ing&eacute;nieur r&eacute;seaux<\/p>","contents":"<ul>\n<li>Describe the key elements of Check Point&rsquo;s unified, secure management architecture.<\/li><li>Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic.<\/li><li>Recognize SmartConsole features and functions.<\/li><li>Understand Check Point deployment options.<\/li><li>Describe the basic functions of the Gaia OS.<\/li><li>Describe the elements of a unified security policy.<\/li><li>Understand how traffic inspection takes place in a unified security policy.<\/li><li>Summarize how administration roles and permissions assist in managing policy.<\/li><li>Implement Check Point backup techniques.<\/li><li>Recognize Check Point Security Solutions and Products and how they work to protect your network.<\/li><li>Understand licensing and contract requirements for Check Point security products.<\/li><li>Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.<\/li><li>Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities.<\/li><li>Understand Site-to-Site and Remote Access VPN deployments and VPN communities.<\/li><li>Understand how to analyze and interpret VPN tunnel traffic.<\/li><li>Recognize how to define users and user groups.<\/li><li>Manage user access for internal and external users.<\/li><li>Understand the basic concepts of ClusterXL technology and its advantages.<\/li><li>Understand how to perform periodic administrator tasks as specified in administrator job descriptions.<\/li><\/ul><p>Lab Exercises\n<\/p>\n<ul>\n<li>Defining roles and users in Gaia Portal<\/li><li>Installing and navigating SmartConsole<\/li><li>Configuring objects, rules, and settings to define a Security Policy<\/li><li>Publishing database changes<\/li><li>Installing and managing a remote Security Gateway<\/li><li>Performing Hide and Static Network Address Translation<\/li><li>Configuring Application Control and URL filtering Access Control policy layers.<\/li><li>Working with multiple concurrent Administrators and testing permissions profiles.<\/li><li>Working with Check Point licenses<\/li><li>Viewing and maintaining logs<\/li><li>Configuring a Virtual Private Network<\/li><li>Providing User Access<\/li><li>Working with Check Point clustering<\/li><li>Producing Check Point reports<\/li><\/ul>","summary":"<p>Check Point Security Administration R80 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.<\/p>","objective_plain":"- Introduction to Check Point Technology\n- Security Policy Management\n- Policy Layers\n- Check Point Security Solutions and Licensing\n- Traffic Visibility\n- Basic Concepts of VPN\n- Managing User Access\n- Working with ClusterXL\n- Administrator Task Implementation","essentials_plain":"- General knowledge of TCP\/IP\n- Working knowledge of Windows and\/or UNIX, network technology and the Internet","audience_plain":"Ing\u00e9nieur s\u00e9curit\u00e9, administrateur s\u00e9curit\u00e9, ing\u00e9nieur r\u00e9seaux","contents_plain":"- Describe the key elements of Check Point\u2019s unified, secure management architecture.\n- Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic.\n- Recognize SmartConsole features and functions.\n- Understand Check Point deployment options.\n- Describe the basic functions of the Gaia OS.\n- Describe the elements of a unified security policy.\n- Understand how traffic inspection takes place in a unified security policy.\n- Summarize how administration roles and permissions assist in managing policy.\n- Implement Check Point backup techniques.\n- Recognize Check Point Security Solutions and Products and how they work to protect your network.\n- Understand licensing and contract requirements for Check Point security products.\n- Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.\n- Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities.\n- Understand Site-to-Site and Remote Access VPN deployments and VPN communities.\n- Understand how to analyze and interpret VPN tunnel traffic.\n- Recognize how to define users and user groups.\n- Manage user access for internal and external users.\n- Understand the basic concepts of ClusterXL technology and its advantages.\n- Understand how to perform periodic administrator tasks as specified in administrator job descriptions.\nLab Exercises\n\n\n\n- Defining roles and users in Gaia Portal\n- Installing and navigating SmartConsole\n- Configuring objects, rules, and settings to define a Security Policy\n- Publishing database changes\n- Installing and managing a remote Security Gateway\n- Performing Hide and Static Network Address Translation\n- Configuring Application Control and URL filtering Access Control policy layers.\n- Working with multiple concurrent Administrators and testing permissions profiles.\n- Working with Check Point licenses\n- Viewing and maintaining logs\n- Configuring a Virtual Private Network\n- Providing User Access\n- Working with Check Point clustering\n- Producing Check Point reports","summary_plain":"Check Point Security Administration R80 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.","skill_level":"Intermediate","version":"R81.X","duration":{"unit":"d","value":3,"formatted":"3 jours"},"pricelist":{"List Price":{"IT":{"country":"IT","currency":"EUR","taxrate":20,"price":1950},"GB":{"country":"GB","currency":"GBP","taxrate":20,"price":1875},"DE":{"country":"DE","currency":"EUR","taxrate":19,"price":2190},"AT":{"country":"AT","currency":"EUR","taxrate":20,"price":2190},"SE":{"country":"SE","currency":"EUR","taxrate":25,"price":2190},"CH":{"country":"CH","currency":"CHF","taxrate":8.1,"price":2410},"FR":{"country":"FR","currency":"EUR","taxrate":19.6,"price":2900},"SI":{"country":"SI","currency":"EUR","taxrate":20,"price":2160},"NL":{"country":"NL","currency":"EUR","taxrate":21,"price":2160}}},"lastchanged":"2025-07-29T12:17:34+02:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course-schedule\/2043","source_lang":"fr","source":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course\/checkpoint-ccsa"}}