play (2)
atc-partner-platinum-elite

Check Point Core Training Courses

CCSA | CCSE - Core Training

Duration: 3 Days Remote, Classroom
Course: 30 CLC 3000 USD
Exam: 2.5 CLC | 250 USD

Specialist Courses after CCSA

Infinity Specializations

Duration: 2 Days Remote, Classroom
Course: 20 CLC | 2000 USD
Exam: 2 CLC | 200 USD

Specialist Courses after CCSE

Infinity Specializations

Duration: 2 Days Remote, Classroom
Course: 20 CLC | 2000 USD
Exam: 2 CLC | 200 USD

Core Training

Introduction:

Check Point products provide end-to-end security from the enterprise to the cloud, to your mobile workers’ personal devices.

Red Education is a Check Point Authorised Training Centre and has been awarded “Top Regional ATC Partner for APAC 2019 “.

We cover Check Point Software Technologies’ product portfolio and our trainers bring to the classroom decades of extensive experience. All Check Point courses we deliver consist of Lectures, Labs, and Discussions and are available either in a classroom setting or as virtual live courses.

COURSE OVERVIEW

New – Learn how to configure Check Point Security Gateway and Management Software Blades.

In this course, you will learn the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. During this course, you will configure a security policy and learn about managing and monitoring a secure network, upgrading and configuring a security gateway, and implementing a virtual private network (VPN).

Note: Supported versions R80.10 and above

View Course Outline

WHO SHOULD ATTEND?

Technical persons who support, install, deploy, or administer Check Point Software Blades should attend this course. This could include the following:

  • System administrators
  • Support analysts
  • Security managers
  • Network engineers
  • Anyone seeking CCSA certification

WHAT YOU'LL LEARN

Upon completion of this course, students are able to:

  • Introduction to Check Point Technology
  • Security Policy Management
  • Policy Layers
  • Check Point Security Solutions and Licensing
  • Traffic Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation

PREREQUISITES

  • General knowledge of TCP/IP
  • Working knowledge of Windows, UNIX, network technology, and the Internet

RELATED CERTIFICATIONS

This course helps prepare for CCSA exam available at VUE test centers www.vue.com/checkpoint. It contains 90 multiple-choice, scenario-based questions. A passing score is 70% or higher. The exam is based on 80% course materials and 20% hands-on experience with Check Point products. Students should have at least six months experience with Check Point products before taking the exam.

COURSE OVERVIEW

New – Validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.

In this course, you will learn how to effectively build, modify, deploy, and troubleshoot Check Point Security systems on the GAiA OS. We will study firewall processes and examine user and kernel processing and stateful inspection. Labs include configuring security gateways, implementing VPNs, and performing advanced troubleshooting tasks on the firewall.

Note: Supported versions R80.10 and above

WHO SHOULD ATTEND?

Expert users and resellers who need to perform advanced deployment configurations of a security gateway, which includes:

  • System administrators
  • Support analysts
  • Network engineers
  • Anyone seeking CCSE certification

WHAT YOU'LL LEARN

Upon completion of this course, students are able to:

  • System Management
  • Automation and Orchestration
  • Redundancy
  • Acceleration
  • SmartEvent
  • Mobile and Remote Access
  • Threat Prevention

PREREQUISITES

  • Security Administration Course or CCSA certification (R80 Not R77)
  • Windows Server, UNIX and networking skills and TCP/IP experience
  • Certificate management and system adminstration

RELATED CERTIFICATIONS

This course helps prepare for CCSE exam, which is available at VUE test centers www.vue.com/checkpoint. It contains 90 multiple-choice, scenario-based questions. A passing score is 70% or higher in 120 minutes. The exam is based on 80% course materials and 20% hands-on experience with Check Point products. Students must have a valid CCSA certification before taking the CCSE exam

Specialist Courses Recommended after CCSA

COURSE OVERVIEW

2-day Specialist course which provides an understanding of the skills necessary to effectively manage and protect your endpoint security network using the Check Point R81 Harmony Endpoint product.

WHO SHOULD ATTEND?

This course is designed for security engineers, developers, and Check Point resellers who need to deploy and manage Endpoint Security within their security environment and are working towards their Point Certified Endpoint Specialist (CCES) certification.

WHAT YOU'LL LEARN

Objectives

  •  Understand the emergence of increasingly more sophisticated cyberattacks and the need to protect endpoints.
  •  Explain the advantages of Harmony Endpoint as a security solution.
  •  Become familiar with the growing Endpoint Security Market.
  •  Describe the key elements of the Harmony Endpoint Architecture.
  •  Describe the Harmony Endpoint Management Environment.
  •  Understand Check Point’s Infinity Portal.
  •  Explain the new Harmony Endpoint Web Management Service.
  •  Identify main features of the Harmony Endpoint Management console.
  •  Explain how to create and assign security policies for Endpoint clients using endpoint security.
  •  Understand deployment methods and server considerations for Endpoint Security Management installation.
  •  Identify the different ways to install and configure Endpoint clients.
  •  Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
  •  Describe additional server configurations that are available to help manage Endpoint clients.
  •  Recognize the different types of data security available to deploy on end user machines.
  •  Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
  •  Understand how to secure removable media devices.
  •  Understand how Harmony Endpoint is defending company networks against sophisticated attacks.
  •  Describe Check Point Harmony Endpoint Agent.
  •  Explain how Harmony Endpoint Agent’s advanced technologies are preventing attacks from infiltrating Endpoint machines and corporate resources.
  •  Become familiar with Harmony Endpoint troubleshooting methods.
  •  Understand how to troubleshoot and debug issues that may occur in the Endpoint Security environment

PREREQUISITES

  • UNIX and Windows operating systems
  • System Administration
  • Networking (TCP/IP)

COURSE OVERVIEW

The Check Point Certified Troubleshooting Administrator (CCTA) provides an understanding of the concepts and skills necessary to troubleshoot issues that may occur when managing the Check Point Security Management architecture and Security Gateways.

WHO SHOULD ATTEND?

This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment.

WHAT YOU'LL LEARN

COURSE TOPICS

  • An Introduction to Troubleshooting
  • SmartConsole and Policy Management Troubleshooting
  • Monitoring Logging Activity
  • Troubleshooting Issues with NAT
  • Understanding the Unified Access Control Policy
  • Basic VPN Troubleshooting
  • Monitoring ClusterXL Connections
  • Understanding Identity Awareness

PREREQUISITES

  • Working knowledge of UNIX and/or Windows operating systems
  • Working knowledge of Networking TCP/IP
  • CCSA training/certification
  • Advanced knowledge of Check Point Security products

COURSE OVERVIEW

A 2-day Specialist course which provides a comprehensive understanding of automation and the Check Points Management API architecture. It presents advanced concepts such as how to create and execute automated scripts to perform R80 Security Management tasks.

WHO SHOULD ATTEND?

This course is designed for security engineers, developers, and Check Point resellers who need to create and execute automated scripts to perform routine tasks within their security environment and are working towards their Check Point Certified Automation

WHAT YOU'LL LEARN

Provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies.

COURSE TOPICS:

  • Introduction to automation and orchestration
  • Check Point APIs
  • API development
  • API troubleshooting
  • Self-service Web portals

PREREQUISITES

  • UNIX and Windows operating systems
  • System Administration
  • Networking (TCP/IP)

COURSE OVERVIEW

2-day Specialist course which provides an understanding of the basic concepts and skills necessary to deploy and manage CloudGuard Network and Cloud Security Posture Management security solution within the security environment.

WHO SHOULD ATTEND?

This course is designed for technical professionals who support, install, deploy, or manage Check Point CloudGuard IaaS solutions within their security environment.

WHAT YOU'LL LEARN

Objectives

  •  Explain the nature of the cloud environment.
  •  Describe the five pillars of cloud architecture.
  •  Explain the fundamentals of cloud infrastructure.
  •  Explain the fundamentals of cloud automation.
  •  Explain Check Point Security Management and how it applies to   CloudGuard.
  •  Describe CloudGuard Security Gateway offerings.
  •  Describe cloud load balancers.
  •  Explain CloudGuard licensing.
  •  Explain the different deployment options and architectures for   CloudGuard.
  •  Explain how and why CloudGuard is automated.
  •  Describe the functions of CloudGuard that can be automated.
  •  Describe the tools used to automate CloudGuard.
  •  Explain CloudGuard automation requirements.
  •  Explain basic troubleshooting techniques specific to Check Point   Security Management Servers and Security Gateways.
  •  Describe the steps for troubleshooting CloudGuard Network   Installation.
  •  Explain the tools and techniques used to troubleshoot CloudGuard   Network Automation.
  •  Explain the need for Cloud Security Posture Management.
  •  Describe the posture management tools available in CloudGuard.
  •  Explain methods for correcting Cloud Security Posture Management   issues.

PREREQUISITES

  • Working knowledge of Cloud Native Deployment using Microsoft Azure and Amazon Web Services public clouds
  • Working knowledge of TCP/IP Networking
  • Working knowledge of Check Point Security products

Specialist Courses Recommended after CCSE

COURSE OVERVIEW

A 2-day Specialist course which provides a comprehensive understanding of the Check Point Virtual Security Extension (VSX) solution and describes how to deploy it within the corporate network environment.

WHO SHOULD ATTEND?

This course is designed for security engineers, users, and Check Point resellers who need to deploy and manage VSX solutions within their security environment, and are working towards their Check Point Certified VSX Specialist (CCVS) certification.

Technical professionals who need to install, configure, and manage Virtual Security Extension (VSX) solutions within their network security environment.

WHAT YOU'LL LEARN

COURSE TOPICS

  • VSX Overview
  • Virtual System Installation and Configuration
  • VSX Clustering
  • Advanced VSX Features
  • Troubleshooting VSX

PREREQUISITES

Check Point CCSA and CCSE Certification

COURSE OVERVIEW

The Check Point Certified Troubleshooting Expert (CCTE) provides advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point security environment.

WHO SHOULD ATTEND?

This course is designed for security experts and Check Point resellers who desire to obtain the necessary knowledge required to perform more advanced troubleshooting skills while managing their security environments.

WHAT YOU'LL LEARN

COURSE TOPICS

  • Advanced Troubleshooting
  • Management Database and Processes
  • Advanced Kernel Debugging
  • User Mode Troubleshooting
  • Advanced Access Control
  • Understanding Threat Prevention
  • Advanced VPN Troubleshooting
  • Acceleration and Performance Tuning

PREREQUISITES

  • Working knowledge of UNIX and/or Windows operating systems
  • Working knowledge of Networking TCP/IP
  • CCSE training/certification
  • Advanced knowledge of Check Point Security products

COURSE OVERVIEW

A 2-day Specialist course which provides a comprehensive understanding of the Check Point Multi-Domain Security Management solution and how to deploy it within the corporate network environment.

WHO SHOULD ATTEND?

Technical professionals who need to install, configure, and manage multiple security domains within their network security environment.

WHAT YOU'LL LEARN

COURSE TOPICS

  • Multi-Domain Security Management
  • MDSM Installation and Configuration
  • MDSM Log Management
  • Global Policy Management
  • MDSM Troubleshooting
  • Incorporating VSX

COURSE OBJECTIVES

  • Discuss challenges associated with securing large-scale business organizations with distributed network environments.
  • Describe the Check Point Multi-Domain Security Management solution and its benefits.
  • Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework.
  • Understand how to install and configure the Multi-Domain Security Management environment.
  • Describe how to implement Management High Availability within the MDSM environment.
  • Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ.
  • Understand how to manage and view Multi-Domain activity logs in SmartConsole.
  • Understand how to configure and implement Global Policy to manage rules for multiple domains.
  • Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server.
  • Describe troubleshooting tools to use for addressing MDSM Server issues.
  • Understand how VSX works and how to integrate the technology within the MDSM environment.

 

PREREQUISITES

Check Point CCSA and CCSE Certification

COURSE OVERVIEW

The industry’s first truly Hyper-Scale network security solution. Its revolutionary new architecture enables businesses of any size to enjoy the power of flexible, cloud-level security platforms, and to seamlessly expand their existing security gateways to Hyper-Scale capacity.

PROGRAM DETAILS

During this two-day training, you will get practical skills of a Scalable Platform Expert, and develop a deep understanding of Maestro’s architecture and infrastructure. Students will get access to hands-on labs with physical equipment enabling them to use the materials to build setups in order to be able to deploy it in production environments.

PREREQUISITES

Recommended pre-requisites CCSE

Certification

Check Point Certification mean expertise with the technology that secures the internet for all Fortune and Global 100 companies. The benefits of becoming Check Point certified include the skills to support Check Point products, expert access to our Secure Knowledge database and advanced product documentation.

HOW TO OBTAIN YOUR CHECK POINT CERTIFICATION

Attending Check Point Training Courses, helps you reach your certification goals and ensures that you know every detail about Check Point Technologies. Here at Red Education, we cover all Check Point’s training courses. To Learn more, head to our course outline page.

CHECK POINT CERTIFICATION EXAMS

A Check Point UserCenter or PartnerMap account is required to receive benefits for Check Point certifications. You can create a new account at the User Center. If you are not sure about your account, please contact Account Services for verification.

This core 3-day technical certification course provides an understanding of basic concepts and skills necessary to configure and manage Check Point Security Gateways and Management Software Blades.
This advanced 3-day security engineering course provides an in-depth explanation of Check Point technology and an understanding of skills necessary to effectively design, maintain, optimize, and protect your enterprise network from aggressive cyber threats.

The CCSM certification recognizes and validates technical mastery of the Check Point Infinity architecture. It is awarded to Cyber Security professionals with advanced knowledge and expertise in configuring, deploying, managing, and troubleshooting various Check Point products and services. Security professionals with an active CCSE certification that achieve two subsequent Infinity Specialist accreditations will automatically be awarded the CCSM certification.

The CCSM Elite level of certification validates the highest achievement of technical mastery and consists of an elite club of Check Point Certified Security Masters. Security professionals with an active CCSM certification that achieve two subsequent Infinity Specialist accreditations will automatically be awarded the CCSM Elite certification.

RED REVIEWS

WHAT OUR CUSTOMERS SAY

Translate »