<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="7723" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/7723" lastchanged="2026-01-12T12:10:51+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Check Point Certified Security Administrator and Expert Boot Camp</title><productcode>CCSA/CCSER</productcode><vendorcode>CP</vendorcode><vendorname>Check Point</vendorname><fullproductcode>CP-CCSA/CCSER</fullproductcode><version>R82</version><objective>&lt;p&gt;This course will benefit technical professionals who support, install deploy or administer Check Point products, and who perform advanced deployment configurations of Check Point products.&lt;/p&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;One-year experience on Check Point products.&lt;/li&gt;&lt;li&gt;Working knowledge of Windows, UNIX, networking technology, the Internet and TCP/IP is recommended&lt;/li&gt;&lt;li&gt;Previous attendance/certification on CCSA&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This course is not for new users to Check Point &amp;ndash; previous experience is required.&lt;/p&gt;</essentials><audience>&lt;p&gt;This course will benefit technical professionals who support, install deploy or administer Check Point products, and who perform advanced deployment configurations of Check Point products.&lt;/p&gt;</audience><contents>&lt;h5&gt;CCSA&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Chapter 1: Introduction to Check Point Deployment&lt;/li&gt;&lt;li&gt;Chapter 3: Check Point Management Operations&lt;/li&gt;&lt;li&gt;Chapter 4: Licensing&lt;/li&gt;&lt;li&gt;Chapter 5: Security Policy Management&lt;/li&gt;&lt;li&gt;Chapter 6: Policy Layers&lt;/li&gt;&lt;li&gt;Chapter 7: Managing User Access&lt;/li&gt;&lt;li&gt;Chapter 8: Working with NAT&lt;/li&gt;&lt;li&gt;Chapter 9: Traffic Visibility&lt;/li&gt;&lt;li&gt;Chapter 10: Monitoring System States&lt;/li&gt;&lt;li&gt;Chapter 11: Security Events&lt;/li&gt;&lt;li&gt;Chapter 12: Basic Concepts of VPN&lt;/li&gt;&lt;li&gt;Chapter 13: Working with ClusterXL&lt;/li&gt;&lt;li&gt;Chapter 14: Compliance Task&lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;CCSE&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Chapter 15: Management Maintenance&lt;/li&gt;&lt;li&gt;Chapter 16: Management Migration&lt;/li&gt;&lt;li&gt;Chapter 17: Management Redundancy&lt;/li&gt;&lt;li&gt;Chapter 18: Automation and Orchestration&lt;/li&gt;&lt;li&gt;Chapter 19: Gateway Maintenance&lt;/li&gt;&lt;li&gt;Chapter 20: Firewall Kernel&lt;/li&gt;&lt;li&gt;Chapter 21: User Mode Processes&lt;/li&gt;&lt;li&gt;Chapter 22: Gateway Redundancy&lt;/li&gt;&lt;li&gt;Chapter 23: Traffic Acceleration&lt;/li&gt;&lt;li&gt;Chapter 24: Core Acceleration&lt;/li&gt;&lt;li&gt;Chapter 25: Interface Acceleration&lt;/li&gt;&lt;li&gt;Chapter 26: Threat Prevention&lt;/li&gt;&lt;li&gt;Chapter 27: Threat Emulation&lt;/li&gt;&lt;li&gt;Chapter 28: Advanced Site-to-Site VPN&lt;/li&gt;&lt;li&gt;Chapter 29: Remote Access&lt;/li&gt;&lt;li&gt;Chapter 30: Mobile Access&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;CCSA&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Chapter 1: Introduction to Check Point Deployment&lt;/li&gt;&lt;li&gt;Chapter 3: Check Point Management Operations&lt;/li&gt;&lt;li&gt;Chapter 4: Licensing&lt;/li&gt;&lt;li&gt;Chapter 5: Security Policy Management&lt;/li&gt;&lt;li&gt;Chapter 6: Policy Layers&lt;/li&gt;&lt;li&gt;Chapter 7: Managing User Access&lt;/li&gt;&lt;li&gt;Chapter 8: Working with NAT&lt;/li&gt;&lt;li&gt;Chapter 9: Traffic Visibility&lt;/li&gt;&lt;li&gt;Chapter 10: Monitoring System States&lt;/li&gt;&lt;li&gt;Chapter 11: Security Events&lt;/li&gt;&lt;li&gt;Chapter 12: Basic Concepts of VPN&lt;/li&gt;&lt;li&gt;Chapter 13: Working with ClusterXL&lt;/li&gt;&lt;li&gt;Chapter 14: Compliance Task&lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;CCSE&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Chapter 15: Management Maintenance&lt;/li&gt;&lt;li&gt;Chapter 16: Management Migration&lt;/li&gt;&lt;li&gt;Chapter 17: Management Redundancy&lt;/li&gt;&lt;li&gt;Chapter 18: Automation and Orchestration&lt;/li&gt;&lt;li&gt;Chapter 19: Gateway Maintenance&lt;/li&gt;&lt;li&gt;Chapter 20: Firewall Kernel&lt;/li&gt;&lt;li&gt;Chapter 21: User Mode Processes&lt;/li&gt;&lt;li&gt;Chapter 22: Gateway Redundancy&lt;/li&gt;&lt;li&gt;Chapter 23: Traffic Acceleration&lt;/li&gt;&lt;li&gt;Chapter 24: Core Acceleration&lt;/li&gt;&lt;li&gt;Chapter 25: Interface Acceleration&lt;/li&gt;&lt;li&gt;Chapter 26: Threat Prevention&lt;/li&gt;&lt;li&gt;Chapter 27: Threat Emulation&lt;/li&gt;&lt;li&gt;Chapter 28: Advanced Site-to-Site VPN&lt;/li&gt;&lt;li&gt;Chapter 29: Remote Access&lt;/li&gt;&lt;li&gt;Chapter 30: Mobile Access&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>This course will benefit technical professionals who support, install deploy or administer Check Point products, and who perform advanced deployment configurations of Check Point products.</objective_plain><essentials_plain>- One-year experience on Check Point products.
- Working knowledge of Windows, UNIX, networking technology, the Internet and TCP/IP is recommended
- Previous attendance/certification on CCSA
This course is not for new users to Check Point – previous experience is required.</essentials_plain><audience_plain>This course will benefit technical professionals who support, install deploy or administer Check Point products, and who perform advanced deployment configurations of Check Point products.</audience_plain><contents_plain>CCSA


- Chapter 1: Introduction to Check Point Deployment
- Chapter 3: Check Point Management Operations
- Chapter 4: Licensing
- Chapter 5: Security Policy Management
- Chapter 6: Policy Layers
- Chapter 7: Managing User Access
- Chapter 8: Working with NAT
- Chapter 9: Traffic Visibility
- Chapter 10: Monitoring System States
- Chapter 11: Security Events
- Chapter 12: Basic Concepts of VPN
- Chapter 13: Working with ClusterXL
- Chapter 14: Compliance Task

CCSE


- Chapter 15: Management Maintenance
- Chapter 16: Management Migration
- Chapter 17: Management Redundancy
- Chapter 18: Automation and Orchestration
- Chapter 19: Gateway Maintenance
- Chapter 20: Firewall Kernel
- Chapter 21: User Mode Processes
- Chapter 22: Gateway Redundancy
- Chapter 23: Traffic Acceleration
- Chapter 24: Core Acceleration
- Chapter 25: Interface Acceleration
- Chapter 26: Threat Prevention
- Chapter 27: Threat Emulation
- Chapter 28: Advanced Site-to-Site VPN
- Chapter 29: Remote Access
- Chapter 30: Mobile Access</contents_plain><outline_plain>CCSA


- Chapter 1: Introduction to Check Point Deployment
- Chapter 3: Check Point Management Operations
- Chapter 4: Licensing
- Chapter 5: Security Policy Management
- Chapter 6: Policy Layers
- Chapter 7: Managing User Access
- Chapter 8: Working with NAT
- Chapter 9: Traffic Visibility
- Chapter 10: Monitoring System States
- Chapter 11: Security Events
- Chapter 12: Basic Concepts of VPN
- Chapter 13: Working with ClusterXL
- Chapter 14: Compliance Task

CCSE


- Chapter 15: Management Maintenance
- Chapter 16: Management Migration
- Chapter 17: Management Redundancy
- Chapter 18: Automation and Orchestration
- Chapter 19: Gateway Maintenance
- Chapter 20: Firewall Kernel
- Chapter 21: User Mode Processes
- Chapter 22: Gateway Redundancy
- Chapter 23: Traffic Acceleration
- Chapter 24: Core Acceleration
- Chapter 25: Interface Acceleration
- Chapter 26: Threat Prevention
- Chapter 27: Threat Emulation
- Chapter 28: Advanced Site-to-Site VPN
- Chapter 29: Remote Access
- Chapter 30: Mobile Access</outline_plain><duration unit="d" days="5">5 jours</duration><pricelist><price country="SI" currency="EUR">2500.00</price><price country="DE" currency="EUR">3950.00</price><price country="AT" currency="EUR">3950.00</price><price country="FR" currency="EUR">3950.00</price><price country="IL" currency="ILS">13700.00</price><price country="CH" currency="EUR">4937.50</price></pricelist><miles/></course>