CCSE R77 (Check Point Certified Security Expert) Training

Download Course Brochure

Instructor-Led Training Parameters

Course Highlights

  • Instructor-led Online Training
  • Project Based Learning
  • Certified & Experienced Trainers
  • Course Completion Certificate
  • Lifetime e-Learning Access
  • 24x7 After Training Support

Instructor-led Training Live Online Classes

Suitable batches for you

Mar, 2024 Weekdays Mon-Fri Enquire Now
Weekend Sat-Sun Enquire Now
Apr, 2024 Weekdays Mon-Fri Enquire Now
Weekend Sat-Sun Enquire Now

Share details to upskills your team



Build Your Own Customize Schedule



CCSE R77 (Check Point Certified Security Expert) Training Course Overview

CCSE R77 (Check Point Certified Security Expert) training imparts the fundamental knowledge on implementing VPN solutions, configuring and upgrading of gateways, configuring of security policies and monitoring the networks. The training focuses on how to configure and manage Security Gateway on the GAiA operating system, so that the candidates would be able to score well in the CCSA R77 exam.

Moreover, through CCSE  R77 Course Training, the candidates would be able to:

  • Install and manage the security acceleration solutions
  • Manage the external as well as the internal access to business resources
  • Protect the gateway  from network vulnerabilities, including messaging and mail content
  • Assign the permissions and configure the rules on web servers and gateways
Target audience

IT professionals willing to clear the CCSE R77 (Check Point Certified Security Expert) exam to configure and manage the GAiA operating system security gateway.

Prerequisites

The candidates should have following prerequisites:

  • Basic understanding of networking
  • Understanding Windows Server and/or UNIX skills
  • Understanding Internet and TCP/IP experience

CCSE R77 (Check Point Certified Security Expert) Training Course Content

1. Introduction to Check Point Technology

  • Check Point Security Management Architecture(SMART)
    • Smart Console
    • Security Management Server
    • Security Gateway
  • The Check Point Firewall
    • OSI Model
    • Mechanism for controlling
    • Network traffic.
    • Packet Filtering
    • Stateful Inspection
    • Application Intelligence
  • Security Gateway Inspection Architecture
    • INSPECT Engine Packet Flow
  • Deployment Considerations
    • Standalone Deployment
    • Distributed Deployment
    • Standalone Full HA
    • Bridge Mode
  • Check Point SmartConsole Clients
    • Smart Dashboard
    • Smart view Tracker
    • Smart Log
    • Smart Event
    • SmartView Monitor
    • Smart Reporter
    • Smart Update
    • Smart Provisioning
    • SmartEndpoint
  • Security ManagementServer
    • Managing Users in SmartDashboard
    • Users Database
  • Securing Channels of Communication
    • Secure Internal Communication
    • Testing the SIC Status
    • Resetting the Trust State

2. Deployment Platforms

  • Check Point Deployment Platforms
    • Security Appliances
    • Security Software Blades
    • Remote Access Solutions
  • Check Point Gaia
    • History - Power of Two
    • Gaia
    • Benefits of Gaia
    • Gaia Architecture
    • Gaia System Information

3. Introduction to the Security Policy

  • Security Policy Basics
    • The Rule Base
    • Managing Objects in SmartDashboard
    • SmartDashboard and Objects
    • Object-Tree Pane
    • Objects-List Pane
    • Object Types
    • Rule Base Pane
  • Managing Objects
    • Classic View of the Objects Tree
    • Group View of the Objects Tree
  • Creating the Rule Base
    • Basic Rule Base Concepts
    • Delete Rule
    • Basic Rules
    • Implicit/Explicit Rules
    • Control Connections
    • Detecting IP Spoofing
    • Configuring Anti-Spoofing
  • Rule Base Management
    • Understanding Rule Base Order
    • Completing the Rule Base
  • Policy Management and Revision Control
    • Policy Package Management

4. Monitoring Traffic and Connections

  • SmartView Tracker
    • Log Types
    • SmartView Tracker Tabs
    • Action Icons
    • Log-File Management
    • Administrator Auditing
    • Global Logging and Alerting
    • Time Setting
    • Blocking Connections
  • SmartView Monitor
    • Customized Views
    • Gateway Status View
    • Traffic View
    • Tunnels View
    • Remote Users View
    • Cooperative Enforcement View
  • Monitoring Suspicious and Activity Rules
    • Monitoring Alerts
  • Gateway Status
    • Overall Status
    • Software Blade Status
    • Displaying Gateway Information
    • SmartView Tracker vs.SmartView Monitor

5. Network Address Translation.

  • Introduction to NAT
    • IP Addressing
    • Hid NAT
    • Choosing the Hide Address in Hide NAT
    • Static NAT
    • Original Packet
    • Reply Packet
    • NAT Global Properties
    • Object Configuration - Hid NAT
    • Hide NAT Using Another Interface
    • Static NAT
  • Manual NAT
    • Configuring Manual NAT
    • Special Considerations
    • ARP
                                                       

 6. Using SmartUpdate

  • SmartUpdate and Managing Licenses
    • SmartUpdate Architecture
    • SmartUpdate Introduction
    • Overview of Managing Licenses
    • License Terminology
    • Upgrading Licenses
    • Retrieving License Data from Security Gateways
    • Adding New Licenses to the License & Contract Repository
    • Importing License Files
    • Adding License Details Manually
    • Attaching Licenses
    • Detaching Licenses
    • Deleting Licenses From License & Contract Repository
    • Installation Process
  • Viewing License Properties
    • Checking for Expired Licenses To Export a License to a File
  • Service Contracts p.
    • Managing Contracts Updating Contracts

7. User Management and Authentication

  • Creating Users and Groups
    • Types of Legacy Authentication p. 142
    • Authentication Schemes p. 143
    • Remote User Authentication p. 145
    • Authentication Methods p. 146
  • User Authentication
    • User Authentication Rule Base
    • Considerations
  • Session Authentication
    • Configuring Session Authentication
  • Client Authentication
    • Client Authentication and Sign-On Overview
    • Sign-On Methods
    • Wait Mode
    • Configuring Authentication Tracking
  • LDAP User Management with UserDirectory
    • LDAP Features
    • Distinguished Name
    • Multiple LDAP Servers
    • Using an Existing LDAP Server
    • Configuring Entities to Work with the Gateway
    • Defining an Account Unit
    • Managing Users
    • UserDirectory Groups

8. Identity Awareness

  • Introduction to Identity Awareness
    • AD Query
    • Browser-Based Authentication
    • Identity Agents
    • Deployment

9 Introduction to Check Point VPNs

  • The Check Point VPN
  • VPN Deployments
    • Site-to-Site VPNs
    • Remote-Access VPNs
  • VPN Implementation
    • VPN Setup
    • Understanding VPN Deployment
    • VPN Communities
    • Remote Access Community
  • VPN Topologies
    • Meshed VPN Community
    • Star VPN Community
    • Choosing a Topology
    • Combination VPNs
    • Topology and Encryption Issues
  • Special VPN Gateway Conditions
    • Authentication Between Community Members
    • Domain and Route-Based VPNs
    • Domain-Based VPNs
    • Route-Based VPN
  • Access Control and VPN Communities
    • Accepting All Encrypted Traffic
    • Excluded Services
    • Special Considerations for Planning a VPN Topology
  • Integrating VPNs into a Rule Base
    • Simplified vs. Traditional Mode VPNs
    • VPN Tunnel Management
    • Permanent Tunnels
    • Tunnel Testing for Permanent Tunnels
    • VPN Tunnel Sharing
  • Remote Access VPNs
    • Multiple Remote Access VPN Connectivity Modes
    • Establishing a Connection Between a Remote User and a Gateway

video-img

Request for Enquiry

assessment_img

Free CCSE R77 Training Assessment

This assessment tests understanding of course content through MCQ and short answers, analytical thinking, problem-solving abilities, and effective communication of ideas. Some Multisoft Assessment Features :

  • User-friendly interface for easy navigation
  • Secure login and authentication measures to protect data
  • Automated scoring and grading to save time
  • Time limits and countdown timers to manage duration.
Try It Now

CCSE R77 Corporate Training

Employee training and development programs are essential to the success of businesses worldwide. With our best-in-class corporate trainings you can enhance employee productivity and increase efficiency of your organization. Created by global subject matter experts, we offer highest quality content that are tailored to match your company’s learning goals and budget.


500+
Global Clients
4.5 Client Satisfaction
Explore More

Customized Training

Be it schedule, duration or course material, you can entirely customize the trainings depending on the learning requirements

Expert
Mentors

Be it schedule, duration or course material, you can entirely customize the trainings depending on the learning requirements

360º Learning Solution

Be it schedule, duration or course material, you can entirely customize the trainings depending on the learning requirements

Learning Assessment

Be it schedule, duration or course material, you can entirely customize the trainings depending on the learning requirements

Certification Training Achievements: Recognizing Professional Expertise

Multisoft Systems is the “one-top learning platform” for everyone. Get trained with certified industry experts and receive a globally-recognized training certificate. Some Multisoft Training Certificate Features :

  • Globally recognized certificate
  • Course ID & Course Name
  • Certificate with Date of Issuance
  • Name and Digital Signature of the Awardee
Request for Certificate

What Attendees are Saying

Our clients love working with us! They appreciate our expertise, excellent communication, and exceptional results. Trustworthy partners for business success.

Share Feedback
  Chat On WhatsApp

+91-9810-306-956

Available 24x7 for your queries