0% found this document useful (0 votes)
240 views1 page

Check Point Cyber Security Engineering (Ccse) : Course Topics Course Objectives

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
240 views1 page

Check Point Cyber Security Engineering (Ccse) : Course Topics Course Objectives

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CHECK POINT CYBER SECURITY ENGINEERING (CCSE)

(Supported Versions: R80.10 and above)

WHO SHOULD ATTEND?


Expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades.
COURSE GOAL:
Validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
PREREQUISITES:
 CCSA training/certification
 Working knowledge of Windows, UNIX, networking, TCP/IP, and the Internet.

COURSE TOPICS COURSE OBJECTIVES


 System Management  Identify advanced CLI commands.
 Automation and Orchestration  Understand system management procedures, including
 Redundancy how to perform system upgrades and apply patches
and hotfixes.
 Acceleration
 Describe the Check Point Firewall infrastructure.
 SmartEvent
 Describe advanced methods of gathering important
 Mobile and Remote Access
gateway data using CPView and CPInfo.
 Threat Prevention
 Recognize how Check Point’s flexible API architecture
supports automation and orchestration.
LAB EXERCISES  Discuss advanced ClusterXL functions.
 Upgrading a Security Management Server to R80.10  Describe VRRP network redundancy advantages.
 Applying Check Point Hotfixes  Undersand how SecureXL acceleration technology is
 Configuring a New Security Gateway Cluster used to enhance and improve performance.
 Core CLI Elements of Firewall Administration  Understand how CoreXL acceleration technology is
used to enhance and improve performance.
 Configuring Manual Network Address Translation
 Identify the SmartEvent components that store network
 Managing Objects Using the Check Point API
activity logs and identify events.
 Enabling Check Point VRRP
 Discuss the SmartEvent process that determines which
 Deploying a Secondary Security Management Server network activities may lead to security issues.
 Viewing the Chain Modules  Understand how SmartEvent can assist in detecting,
 Working with SecureXL remediating, and preventing security threats.
 Working with CoreXL  Discuss the Mobile Access Software Blace and how it
 Evaluating Threats with SmartEvent secures communication and data.
 Managing Mobile Access  Understand Mobile Access deployment options.
 Understanding IPS Protections  Recognize Check Point Remote Access solutions.
 Deploying IPS Geo Protection  Discuss Check Point Capsule components and how
they protect mobile devices and business documents.
 Reviewing Threat Prevention Settings and Protections
 Discuss diferent Check Point Solutions for attacks such
 Deploying Threat Emulation and Threat Extraction
as zero-day and Advanced Persistent Threats.
 Understand how SandBlast, Threat Emulation, and

CCSE
Threat Extraction prevent security incidents.
CERTIFICATION
 Identify how Check Point Mobile Threat Prevention can
INFORMATION
help protect data accessed on company-issued
Prepare for exam #156-315.80 at VUE.com/checkpoint smartphones and tablets.

©2019 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
November 15, 2019

You might also like