CHECK POINT
CERTIFIED SECURITY EXPERT
(CCSE)
AUDIENCE GOALS PREREQUISITES
Technical Professionals who Learn advanced concepts and develop CCSA Training or Certification,
architect, upgrade, maintain, and skills necessary to design, deploy, and fundamental Unix and Windows
support Check Point products. upgrade Check Point Security knowledge, certificate management
environments. experience, system administration and
networking knowledge.
TOPICS
Advanced Deployments Management High Availability Advanced Gateway Deployment Advanced Policy Configuration
Advanced User Access Management Custom Threat Protection Advanced Site-to-Site VPN Remote Access VPN Mobile Access VPN
Advanced Security Monitoring Performance Tuning Advanced Security Maintenance
OBJECTIVES
• Identify basic interfaces used to manage the Check Point • Describe the Identity Awareness components and configurations.
environment. • Describe different Check Point Threat Prevention solutions.
• Identify the types of technologies that Check Point supports for • Articulate how the Intrusion Prevention System is configured.
automation. • Obtain knowledge about Check Point’s IoT Protect.
• Explain the purpose of the Check Management High Availability • Explain the purpose of Domain-based VPNs.
(HA) deployment. • Describe situations where externally managed certificate
• Identify the workflow followed to deploy a Primary and solution authentication is used.
Secondary servers. • Describe how client security can be provided by Remote Access.
• Explain the basic concepts of Clustering and ClusterXL, including • Discuss the Mobile Access Software Blade.
protocols, synchronization, connection stickyness. • Explain how to determine if the configuration is compliant with the
• Identify how to exclude services from synchronizing or delaying best practices.
synchronization. • Define performance tuning solutions and basic configuration workflow.
• Explain the policy installation flow. • Identify supported upgrade and migration methods and procedures
• Explain the purpose of dynamic objects, updatable objects, and for Security Management Servers and dedicated Log and SmartEvent
network feeds. Servers.
• Understand how to manage user access for internal and external • Identify supported upgrade methods and procedures for Security
users. Gateways.
EXERCISES
• Navigating the Environment and Using the Management API • Deploying Identity Awareness
• Deploying Secondary Security Management Server • Customizing Threat Prevention
• Configuring a Dedicated Log Server • Configuring a Site-to-Site VPN with an Interoperable Device
• Deploying SmartEvent • Deploying Remote Access VPN
• Configuring a High Availability Security Gateway Cluster • Configuring Mobile Access VPN
• Working with ClusterXL • Monitoring Policy Compliance
• Configuring Dynamic and Updateable Objects • Reporting SmartEvent Statistics
• Verifying Accelerated Policy Installation and Monitoring Status • Tuning Security Gateway Performance
• Elevating Security with HTTPS Inspection
CCSE
CERTIFICATION
INFORMATION
Prepare for exam #156-315.81.20 [Link]/checkpoint
©2023 Check Point Software Technologies Ltd. All rights reserved.
[Protected] Non-confidential content - DOC-TDS-CCSE-R81.20-V1.0