<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="2044" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/checkpoint-ccse" lastchanged="2026-01-12T12:11:55+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Check Point Certified Security Expert</title><productcode>CCSE</productcode><vendorcode>CP</vendorcode><vendorname>Check Point</vendorname><fullproductcode>CP-CCSE</fullproductcode><version>R82</version><objective>&lt;p&gt;Certificat : CCSE&lt;/p&gt;</objective><essentials>&lt;p&gt;CCSA training/certification
Working knowledge of Windows, UNIX, networking, TCP/IP, and the Internet.&lt;/p&gt;</essentials><audience>&lt;p&gt;Ing&amp;eacute;nieur s&amp;eacute;curit&amp;eacute;, administrateur s&amp;eacute;curit&amp;eacute;, ing&amp;eacute;nieur r&amp;eacute;seaux.&lt;/p&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Identify advanced CLI commands.&lt;/li&gt;&lt;li&gt;Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes.&lt;/li&gt;&lt;li&gt;Describe the Check Point Firewall infrastructure.&lt;/li&gt;&lt;li&gt;Describe advanced methods of gathering important gateway data using CPView and CPInfo.&lt;/li&gt;&lt;li&gt;Recognize how Check Point&amp;rsquo;s flexible API architecture supports automation and orchestration.&lt;/li&gt;&lt;li&gt;Discuss advanced ClusterXL functions.&lt;/li&gt;&lt;li&gt;Describe VRRP network redundancy advantages.&lt;/li&gt;&lt;li&gt;Undersand how SecureXL acceleration technology is used to enhance and improve performance.&lt;/li&gt;&lt;li&gt;Understand how CoreXL acceleration technology is used to enhance and improve performance.&lt;/li&gt;&lt;li&gt;Identify the SmartEvent components that store network activity logs and identify events.&lt;/li&gt;&lt;li&gt;Discuss the SmartEvent process that determines which network activities may lead to security issues.&lt;/li&gt;&lt;li&gt;Understand how SmartEvent can assist in detecting, remediating, and preventing security threats.&lt;/li&gt;&lt;li&gt;Discuss the Mobile Access Software Blace and how it secures communication and data.&lt;/li&gt;&lt;li&gt;Understand Mobile Access deployment options.&lt;/li&gt;&lt;li&gt;Recognize Check Point Remote Access solutions.&lt;/li&gt;&lt;li&gt;Discuss Check Point Capsule components and how they protect mobile devices and business documents.&lt;/li&gt;&lt;li&gt;Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.&lt;/li&gt;&lt;li&gt;Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.&lt;/li&gt;&lt;li&gt;Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
Lab Exercises :
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Upgrading a Security Management Server to R80.10&lt;/li&gt;&lt;li&gt;Applying Check Point Hotfixes&lt;/li&gt;&lt;li&gt;Configuring a New Security Gateway Cluster&lt;/li&gt;&lt;li&gt;Core CLI Elements of Firewall Administration&lt;/li&gt;&lt;li&gt;Configuring Manual Network Address Translation&lt;/li&gt;&lt;li&gt;Managing Objects Using the Check Point API&lt;/li&gt;&lt;li&gt;Enabling Check Point VRRP&lt;/li&gt;&lt;li&gt;Deploying a Secondary Security Management Server&lt;/li&gt;&lt;li&gt;Viewing the Chain Modules&lt;/li&gt;&lt;li&gt;Working with SecureXL&lt;/li&gt;&lt;li&gt;Working with CoreXL&lt;/li&gt;&lt;li&gt;Evaluating Threats with SmartEvent&lt;/li&gt;&lt;li&gt;Managing Mobile Access&lt;/li&gt;&lt;li&gt;Understanding IPS Protections&lt;/li&gt;&lt;li&gt;Deploying IPS Geo Protection&lt;/li&gt;&lt;li&gt;Reviewing Threat Prevention Settings and Protections&lt;/li&gt;&lt;li&gt;Deploying Threat Emulation and Threat Extraction&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>Certificat : CCSE</objective_plain><essentials_plain>CCSA training/certification
Working knowledge of Windows, UNIX, networking, TCP/IP, and the Internet.</essentials_plain><audience_plain>Ingénieur sécurité, administrateur sécurité, ingénieur réseaux.</audience_plain><contents_plain>- Identify advanced CLI commands.
- Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes.
- Describe the Check Point Firewall infrastructure.
- Describe advanced methods of gathering important gateway data using CPView and CPInfo.
- Recognize how Check Point’s flexible API architecture supports automation and orchestration.
- Discuss advanced ClusterXL functions.
- Describe VRRP network redundancy advantages.
- Undersand how SecureXL acceleration technology is used to enhance and improve performance.
- Understand how CoreXL acceleration technology is used to enhance and improve performance.
- Identify the SmartEvent components that store network activity logs and identify events.
- Discuss the SmartEvent process that determines which network activities may lead to security issues.
- Understand how SmartEvent can assist in detecting, remediating, and preventing security threats.
- Discuss the Mobile Access Software Blace and how it secures communication and data.
- Understand Mobile Access deployment options.
- Recognize Check Point Remote Access solutions.
- Discuss Check Point Capsule components and how they protect mobile devices and business documents.
- Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.
- Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.
- Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets.

Lab Exercises :



- Upgrading a Security Management Server to R80.10
- Applying Check Point Hotfixes
- Configuring a New Security Gateway Cluster
- Core CLI Elements of Firewall Administration
- Configuring Manual Network Address Translation
- Managing Objects Using the Check Point API
- Enabling Check Point VRRP
- Deploying a Secondary Security Management Server
- Viewing the Chain Modules
- Working with SecureXL
- Working with CoreXL
- Evaluating Threats with SmartEvent
- Managing Mobile Access
- Understanding IPS Protections
- Deploying IPS Geo Protection
- Reviewing Threat Prevention Settings and Protections
- Deploying Threat Emulation and Threat Extraction</contents_plain><duration unit="d" days="3">3 jours</duration><pricelist/><miles/></course>