Check Point Certified Security Administrator CCSA R82 (CCSA-R82) – Outline

Detailed Course Outline

Module 1: Introduction to Quantum Security

  • Identify the primary components of the Check Point Three-Tier Architecture and explain how they work together.

Lab Tasks:

  • Explore Gaia on Security Management Server
  • Explore Gaia on Dedicated Log Server
  • Explore Gaia on Security Gateway Cluster Members
  • Connect to SmartConsole
  • Navigate GATEWAYS & SERVERS Vies
  • Navigate SECURITY POLICIES Views
  • Navigate LOGS & EVENTS Views
  • Navigate MANAGE & SETTINGS Views

Module 2: Administrator Account Management

  • Explain the purpose of SmartConsole administrator accounts
  • Identify features for collaboration: session management, concurrent administration, policy installation

Lab Tasks:

  • Create new administrators and assign profiles
  • Test administrator profile assignments
  • Manage concurrent sessions
  • Take over another session and verify status

Module 3: Object Management

  • Explain the purpose of SmartConsole objects
  • Provide examples of physical and logical objects

Lab Tasks:

  • View and modify GATEWAYS & SERVERS objects
  • View and modify network objects
  • View and modify service objects

Module 4: Security Policy Management

  • Explain the purpose of Security Policies
  • Identify the essential elements of a Security Policy.
  • Identify features and capabilities that enhance the configuration and management of the Security Policy.

Lab Tasks:

  • Verify and modify the Security Policy.
  • Install the standard Security Policy.
  • Test the Security Policy.

Module 5: Policy Layers

  • Demonstrate an understanding of the Check Point policy layer concept.
  • Explain how layers affect traffic inspection.

Lab Tasks:

  • Add an Ordered Layer
  • Configure and deploy Ordered Layer rules
  • Test Ordered Layer policy
  • Create Inline DMZ Layer
  • Test Inline DMZ Layer

Module 6: Security Operations Monitoring

  • Explain the purpose of security operations monitoring
  • Tune log server configuration
  • Use predefined and custom queries to filter the logging results.
  • Monitor the state of Check Point systems.

Lab Tasks:

  • Configure log management
  • Enhance rulebase view, rules, and logging
  • Review logs and search for data
  • Configure Monitoring Blade
  • Monitor status of the systems

Module 7: Identity Awareness

  • Explain the purpose of the Identity Awareness solution
  • Identify the essential elements of Identity Awareness.

Lab Tasks:

  • Adjust security policy for Identity Awareness
  • Configure Identity Collector
  • Define the user access role
  • Test Identity Awareness

Module 8: HTTPS Inspection

  • Explain the purpose of HTTPS Inspection solution
  • Identify the essential elements of HTTPS Inspection

Lab Tasks:

  • Enable HTTPS Inspection
  • Adjust access control rules
  • Deploy Security Gateway certificate
  • Test and analyze policy with HTTPS Inspection

Module 9: Application Control and URL Filtering

  • Explain the purpose of the Application Control and URL Filtering solutions
  • Identify the essential elements of Application Control and URL Filtering

Lab Tasks:

  • Adjust the Access Control Policy
  • Create and adjust Application Control and URL
  • Test and adjust the Application Control and URL Filtering Rules

Module 10: Threat Prevention Fundamentals

  • Explain the purpose of the Threat Prevention solution
  • Identify the essential elements of Autonomous Threat Prevention

Lab Tasks:

  • Enable Autonomous Threat Prevention
  • Test Autonomous Threat Prevention