Course Description

Check Point technology is designed to address network exploitation, administrative flexibility, and critical accessibility. This section introduces the basic concepts of network security and management based on Check Point’s three-tier structure and provides the foundation for technologies involved in the Check Point Architecture. These objectives and study questions provide a review of important concepts but are not all-inclusive.

Program Benefits Description

Check Point has been in leaders quadrant for more than 17 years which no other vendor can even come close with. Check Point is the largest pure-play Security vendor in the world. The CCSA certification will give an edge to any newbie who wants to excel in Security domain where there is so much dearth of technical skills on Check Point products.

What'll you Learn?
  • Identify the basic functions of the Web UI.
  • Create and confirm admin users for the network.
  • Configure network messages.
  • Confirm existing network configuration settings.
  • Install and tour the GUI.
  • Describe the key elements of Check Point’s unified, 3-tiered architecture.
  • Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic.
  • Recognize SmartConsole features, functions, and tools.
  • Understand Check Point deployment options
Course Pricing Description

To know more about the Program Pricing, just fill the form. One of our representatives will get back to you with the requested information.


6 Modules Available

Module 1

Traffic Visibility: 

  • Generate network traffic and use traffic visibility tools to monitor the data.
  • Compare and contrast various tools available for viewing traffic.
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities.

Module 2

Basic Concepts of VPN: 

  • Configure and deploy a site-to-site VPN.
  • Test the VPN connection and analyze the tunnel traffic.
  • Understand VPN deployments and Check Point Communities.
  • Understand how to analyze and interpret VPN tunnel traffic.

Module 3

Managing User’s Access :   

  • Create and define user access for a guest wireless user.
  • Test Identity Awareness connection.
  • Recognize how to define users and user groups for your environment.
  • Understand how to manage user access for internal users and guests.

Module 4

Working with Cluster XL:     

  • Install and configure ClusterXL with a High Availability configuration.
  • Describe the basic concept of ClusterXL technology and its advantages.

Module 5

Administrator Task Implementation:     

  • Review rule-base performance for policy control.
  • Understand how to perform periodic administrator tasks as specified in Administrator job descriptions.

Module 6

SmartEvent Reports:

  • Generate reports that effectively summarize network activity.

Need Help

Get in touch, We’ll be glad to provide assistance in choosing the right course.




01 Will I be able to practice labs once I finish my course?

Yes, you will be provided with all necessary software and documents which will help you explore more about Check Point firewalls at your own comfort and time.

02 How many hands-on labs will be there in this course?

Purple Synapz is all about understanding the concepts at very low level and therefore each topic will have their own hands-on labs exercises. Refer Course details for more information.

03 Can I attend this course as an individual module?

Yes, this course is offered as an independent course. For additional information, talk to our Support Team.

04 What prior skills are required to attend this module?

Basic understanding of TCP/IP and OSI layers along with 6 months of working experience on Check Point products. If you are very good at basic networking skills you can also qualify for this course.