CHECK POINT CYBER SECURITY ENGINEERING (CCSE)
(Supported Versions: R80.10 and above)
WHO SHOULD ATTEND?
Expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades.
COURSE GOAL:
Validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
PREREQUISITES:
CCSA training/certification
Working knowledge of Windows, UNIX, networking, TCP/IP, and the Internet.
COURSE TOPICS COURSE OBJECTIVES
System Management Identify advanced CLI commands.
Automation and Orchestration Understand system management procedures, including
Redundancy how to perform system upgrades and apply patches
and hotfixes.
Acceleration
Describe the Check Point Firewall infrastructure.
SmartEvent
Describe advanced methods of gathering important
Mobile and Remote Access
gateway data using CPView and CPInfo.
Threat Prevention
Recognize how Check Point’s flexible API architecture
supports automation and orchestration.
LAB EXERCISES Discuss advanced ClusterXL functions.
Upgrading a Security Management Server to R80.10 Describe VRRP network redundancy advantages.
Applying Check Point Hotfixes Undersand how SecureXL acceleration technology is
Configuring a New Security Gateway Cluster used to enhance and improve performance.
Core CLI Elements of Firewall Administration Understand how CoreXL acceleration technology is
used to enhance and improve performance.
Configuring Manual Network Address Translation
Identify the SmartEvent components that store network
Managing Objects Using the Check Point API
activity logs and identify events.
Enabling Check Point VRRP
Discuss the SmartEvent process that determines which
Deploying a Secondary Security Management Server network activities may lead to security issues.
Viewing the Chain Modules Understand how SmartEvent can assist in detecting,
Working with SecureXL remediating, and preventing security threats.
Working with CoreXL Discuss the Mobile Access Software Blace and how it
Evaluating Threats with SmartEvent secures communication and data.
Managing Mobile Access Understand Mobile Access deployment options.
Understanding IPS Protections Recognize Check Point Remote Access solutions.
Deploying IPS Geo Protection Discuss Check Point Capsule components and how
they protect mobile devices and business documents.
Reviewing Threat Prevention Settings and Protections
Discuss diferent Check Point Solutions for attacks such
Deploying Threat Emulation and Threat Extraction
as zero-day and Advanced Persistent Threats.
Understand how SandBlast, Threat Emulation, and
CCSE
Threat Extraction prevent security incidents.
CERTIFICATION
Identify how Check Point Mobile Threat Prevention can
INFORMATION
help protect data accessed on company-issued
Prepare for exam #156-315.80 at VUE.com/checkpoint smartphones and tablets.
©2019 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
November 15, 2019