0% found this document useful (0 votes)
744 views1 page

Ccse R81.40

The Check Point Certified Security Expert (CCSE) certification program is designed for technical professionals who architect, upgrade, maintain and support Check Point security environments. The CCSE covers advanced concepts for designing, deploying and upgrading Check Point environments through topics like advanced deployments, management, high availability, policies and security monitoring. Candidates must have CCSA training or certification as well as system administration experience. Upon completion, candidates will be prepared to design and support complex Check Point security deployments.

Uploaded by

neoalt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
744 views1 page

Ccse R81.40

The Check Point Certified Security Expert (CCSE) certification program is designed for technical professionals who architect, upgrade, maintain and support Check Point security environments. The CCSE covers advanced concepts for designing, deploying and upgrading Check Point environments through topics like advanced deployments, management, high availability, policies and security monitoring. Candidates must have CCSA training or certification as well as system administration experience. Upon completion, candidates will be prepared to design and support complex Check Point security deployments.

Uploaded by

neoalt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CHECK POINT

CERTIFIED SECURITY EXPERT


(CCSE)

AUDIENCE GOALS PREREQUISITES


Technical Professionals who Learn advanced concepts and develop CCSA Training or Certification,
architect, upgrade, maintain, and skills necessary to design, deploy, and fundamental Unix and Windows
support Check Point products. upgrade Check Point Security knowledge, certificate management
environments. experience, system administration and
networking knowledge.

TOPICS

Advanced Deployments Management High Availability Advanced Gateway Deployment Advanced Policy Configuration

Advanced User Access Management Custom Threat Protection Advanced Site-to-Site VPN Remote Access VPN Mobile Access VPN

Advanced Security Monitoring Performance Tuning Advanced Security Maintenance

OBJECTIVES
• Identify basic interfaces used to manage the Check Point • Describe the Identity Awareness components and configurations.
environment. • Describe different Check Point Threat Prevention solutions.
• Identify the types of technologies that Check Point supports for • Articulate how the Intrusion Prevention System is configured.
automation. • Obtain knowledge about Check Point’s IoT Protect.
• Explain the purpose of the Check Management High Availability • Explain the purpose of Domain-based VPNs.
(HA) deployment. • Describe situations where externally managed certificate
• Identify the workflow followed to deploy a Primary and solution authentication is used.
Secondary servers. • Describe how client security can be provided by Remote Access.
• Explain the basic concepts of Clustering and ClusterXL, including • Discuss the Mobile Access Software Blade.
protocols, synchronization, connection stickyness. • Explain how to determine if the configuration is compliant with the
• Identify how to exclude services from synchronizing or delaying best practices.
synchronization. • Define performance tuning solutions and basic configuration workflow.
• Explain the policy installation flow. • Identify supported upgrade and migration methods and procedures
• Explain the purpose of dynamic objects, updatable objects, and for Security Management Servers and dedicated Log and SmartEvent
network feeds. Servers.
• Understand how to manage user access for internal and external • Identify supported upgrade methods and procedures for Security
users. Gateways.

EXERCISES
• Navigating the Environment and Using the Management API • Deploying Identity Awareness
• Deploying Secondary Security Management Server • Customizing Threat Prevention
• Configuring a Dedicated Log Server • Configuring a Site-to-Site VPN with an Interoperable Device
• Deploying SmartEvent • Deploying Remote Access VPN
• Configuring a High Availability Security Gateway Cluster • Configuring Mobile Access VPN
• Working with ClusterXL • Monitoring Policy Compliance
• Configuring Dynamic and Updateable Objects • Reporting SmartEvent Statistics
• Verifying Accelerated Policy Installation and Monitoring Status • Tuning Security Gateway Performance
• Elevating Security with HTTPS Inspection

CCSE
CERTIFICATION
INFORMATION
Prepare for exam #156-315.81.20 [Link]/checkpoint
©2023 Check Point Software Technologies Ltd. All rights reserved.
[Protected] Non-confidential content - DOC-TDS-CCSE-R81.20-V1.0

You might also like