Digital Forensics Essentials I eLearning Ethical Hacking Essentials I eLearning Network Defense Essentials I eLearning

Explore advanced concepts in this comprehensive three-day course on Check Point Cyber Security Engineering, designed for professionals seeking expertise in upgrading and configuring Check Point software blades. Gain insights into the installation and management of VPNs across internal and external networks, maximize security with Security Gateways, and effectively resolve Gateway performance issues.

Key Learning Objectives:
  • Efficiently backup your Security Gateway and Management Server.
  • Construct, test, and troubleshoot a clustered Security Gateway.
  • Upgrade and troubleshoot a Management Server.
  • Configure and maintain security acceleration solutions.
  • Effectively manage, test, and optimize corporate VPN tunnels.
Course Details:
  • Duration: 3 Days
  • Level: Expert
  • Technology: Check Point Security
  • Delivery Method: Instructor-Led Training (ILT) / Virtual Instructor-Led Training (VILT)
  • Training Credits: Check Point Learning Credits (CLCs)

Elevate your skills and become a Check Point Certified Security Expert with a focus on R81.20, gaining practical knowledge and hands-on experience in the latest advancements in cyber security engineering.

In the era of interconnected devices, burgeoning technologies like cloud computing, and a relentless influx of sophisticated threats, the landscape of security management is evolving into a multifaceted challenge. Adapting security measures to align with new operational realities is imperative. The linchpin for navigating this complexity lies in security consolidation – the amalgamation of all security protections and functions under a unified framework. The realization of comprehensive security consolidation is exemplified by CCSA R81.20.

This intensive three-day course is designed to equip you with the knowledge and skills necessary to initiate, configure, and oversee the day-to-day operations of Check Point Security Gateway and Management Software Blades systems running on the GAIA operating system. Throughout the program, you will delve into the following key areas:

  • Installation of R81.20 management and a security gateway in a distributed environment
  • Configuration of objects, rules, and settings to articulate a robust security policy
  • Collaboration with multiple concurrent administrators and the definition of permission profiles
  • Setup of a Virtual Private Network and proficiency in handling Check Point clustering
  • Execution of routine administrator tasks as outlined in job descriptions, ensuring the seamless functioning of security protocols.

Audience Profile

This course is designed for individuals with various roles in the IT industry, targeting:

  • System Administrators
  • Support Analysts
  • Security Managers
  • Network Engineers
  • Technical Professionals responsible for supporting, installing, deploying, or administering Check Point Software Products


To derive maximum benefit from this training, participants should possess the following technical background in addition to their professional experience:

  • General knowledge of TCP/IP
  • Working familiarity with Windows and/or UNIX operating systems, as well as network technology and the internet
  • Recommended 6 months to 1 year of hands-on experience with Check Point products
  • System administration and networking knowledge