Checkpoint Certified Security
Administration Certification Course in Pune

Course Description

Checkpoints Security Certification Course in Pune is a Firm Which Introduced Stateful Packet Inspection (SPI) Technology and it's a Pioneer Firm in the Field of Network Security

CCSA Will provide Network Administrator Comprehensive Knowledge of Deploying , Configuring and Troubleshooting Checkpoint R.80 product in the Real World

Intensive Training Approach is used by Creating a Complex Dual ISPRedundant Topology. 30 Lab Developed by our Expert Trainer will be co

nducted to ensure that You Receive highest Quality of TrainingCheckpoints Security Certification Course in Pune is Expert in Advance Network Security Modules CCSA Training is Provided in Vashi, Vile-Parle and Pune Centers

Course Audience:

  • Security engineers
  • Security administrators
  • Security operations specialists
  • Security analysts
  • Network engineers
  • Support staff

"Difficulty Level - Intermediate to Advance"

Course Pre-requisite:

  • OSI and TCP/IP Reference model
  • Data Encapsulation, Packet Format
  • IPv4/IPv6 Addressing Basics
  • L3 routing, Static, Dynamic
  • L2 Switching, Vlans, Trunk, SVI
  • Use of Packet Capture tools
  • Access Control List
  • NAT Basics

Lab Description:

Lab Scenerio will be Close to Real Deployment with Redundant DualISP topology, Multiple Security Segments and Servers with Various applications


Check Point technology is designed to address network exploitation, administrative flexibility and critical accessibility. This Section introduces the basic concepts of network security and management based on Check Point’s three-tier structure, and provides the foundation for technologies involved in the Check Point Architecture.

CCSA R.80 is available in Horizon Computers Vashi, Vile Parle, Pune
Sr.No. TopicSub-Topic Contents
1 Introduction to Check Point ArchitecturePerformance-based
  • Identify the basic functions of the Web UI.
  • Create and confirm admin users for the network.
  • Configure network messages.
  • Confirm existing network configuration settings.
  • Install and tour the GUI.
  • Describe the key elements of Check Point’s unified,3-tiered architecture.
  • Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic.
  • Understand Check Point deployment options.
  • Recognize Smart Console features, functions and tools.
2 Security Policy ManagementPerformance-based
  • Create multiple administrators and apply different roles/permissions for concurrent administration.
  • Create and configure network, host and gateway objects
  • Evaluate and manipulate rules in a unified AccessControl security policy.
  • Apply policy layers and analyze how they affect traffic-inspection.
  • Prepare and schedule backups for the gateway.
  • Describe the essential elements of a unified security policy.
  • Summarize how administration roles and permissions assist in managing policy.
  • Recall how to implement Check Point backup techniques.
3 Check Point Security SolutionsPerformance-based
  • Evaluate and manage different Check Point security solutions deployed for network access control.
  • Evaluate and manage Check Point security solutions for threat protection.
  • Examine how the Compliance blade monitors your Check Point security infrastructure
  • Validate existing licenses for products installed on your network
  • Recognize Check Point security solutions & products and the way they protect your network.
  • Understand licensing and contract requirements for Check Point security solutions.
4 Traffic VisibilityPerformance-based
  • Generate network traffic and use traffic visibility tools to monitor the data.
  • Compare and contrast various tools available for viewing traffic.
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities.
5 Basic Concepts of VPNPerformance-based
  • Configure and deploy a site-to-site VPN.Test the VPN connection and analyze the tunnel traffic.
  • Understand VPN deployments and Check Point Communities.
  • Understand how to analyze and interpret VPN tunnel traffic.
6 Managing User’s AccessPerformance-based
  • Create and define user access for a guest wireless user. Test Identity Awareness connection.
  • Recognize how to define users and user groups for your environment.
  • Understand how to manage user access for internal users and guests.
7 Working with Cluster XLPerformance-based
  • Install and configure ClusterXL with a High Availability configuration.
  • Describe the basic concept of ClusterXL technology and its advantages.
8 Administrator Task ImplementationPerformance-based
  • Review rule-base performance for policy control.
  • Understand how to perform periodic administrator tasks as specified in Administrator job descriptions.
9 Smart Event ReportsPerformance-based
  • Generate reports that effectively summarize network activity.
  • Recognize how to effectively create, customize and generate network activity reports.