logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Check Point Certified Security Expert (CCSE)

SS Course: GK3441

Course Overview

TOP

In this course, you will learn the advanced concepts and skills necessary to configure Check Point Next Generation Firewalls. During this course, you will configure a security policy and learn about managing and monitoring a secure network, upgrading and configuring a security gateway, and implementing a virtual private network (VPN).

Note: Supported versions R81.10 and previous versions

                                                                  

Scheduled Classes

TOP
11/19/25 - GVT - Virtual Classroom - Virtual Instructor-Led
12/10/25 - GVT - Virtual Classroom - Virtual Instructor-Led
01/07/26 - GVT - Virtual Classroom - Virtual Instructor-Led
01/14/26 - GVT - Virtual Classroom - Virtual Instructor-Led
01/28/26 - GVT - Virtual Classroom - Virtual Instructor-Led
02/04/26 - GVT - Virtual Classroom - Virtual Instructor-Led
02/11/26 - GVT - Virtual Classroom - Virtual Instructor-Led
02/25/26 - GVT - Virtual Classroom - Virtual Instructor-Led
03/04/26 - GVT - Virtual Classroom - Virtual Instructor-Led
03/25/26 - GVT - Virtual Classroom - Virtual Instructor-Led

Outline

TOP
  • Provide an overview of the upgrade service and options available.
  • Explain how to perform management upgrade and migration.
  • Articulate the process using CPUSE features.
  • Articulate the purpose and function of Management High Availability.
  • Explain Primary vs Secondary, Active vs Standby and Synchronization.
  • Explain disaster recovery steps in case the primary management server becomes unavailable.
  • Provide overview of Central Deployment in SmartConsole.
  • Articulate an understanding of Security Gateway cluster upgrade methods.
  • Explain about Multi Version Cluster (MVC) upgrades.
  • Discuss Gaia Commands and how they are used.
  • Explain the main processes on s and s.
  • Describe how to work with scripts and SmartTasks to configure automatic actions.
  • Explain the Management Data Plane Separation (MDPS)
  • Explain kernel operations and traffic flow
  • Articulate Dynamic and Updatable Objects in Security Gateways
  • Explain the policy installation flow and files used.
  • Describe the use of policy installation history.
  • Explain concurrent and accelerated install policy.
  • Describe an overview of APIs and ways to use and authenticate.
  • Explain how to make changes in GAIA and management configuration.
  • Explain how to install policy using API.
  • Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
  • Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
  • Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
  • Discuss Site-to-Site VPN basics, deployment and communities.
  • Describe how to analyze and interpret VPN tunnel traffic.
  • Explain Link Selection and ISP Redundancy options.
  • Explain tunnel management features.
  • Discuss Check Point Remote Access solutions and how they differ from each other.
  • Describe how client security can be provided by Remote Access .
  • Explain authentication methods including machine authentication.
  • Explain Multiple Entry Point (MEP)
  • Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections.
  • Describe Mobile Access deployment options.
  • Discuss various features in Mobile Access like Portals, Link Translation, running Native Applications, Reverse Proxy and more.
  • Explain basic concepts of Clustering and ClusterXL.
  • Explain about Cluster Control Protocol (CCP) and synchronization.
  • Describe advanced ClusterXL functions and modes like Load Sharing, Active-Active, VMAC mode etc.
  • Discuss Cluster Correction Layer (CCL) to provide connection stickyness.
  • Advanced Logs and Monitoring
  • Explain how to determine if the configuration is compliant with the best practices.
  • Explain how to set action items to meet the compliance.
  • Discuss how SmartEvent functions to identify critical security issues.
  • Describe the components of SmartEvent and their deployment options.
  • Discuss how SmartEvent can assist in reporting security threats.
  • Explain how to customize event definitions and set an Event Policy.

    Prerequisites

    TOP

      Who Should Attend

      TOP

      Expert users and resellers who need to perform advanced deployment configurations of a security gateway, which includes:

      • System administrators
      • Support analysts
      • Network engineers
      • Anyone seeking CCSE certification