Why EIIT? | About Us | Contact Us


  • Introduction to Check Point Technology
  • Deployment Platforms
  • Introduction to the Security Policy
  • Monitoring Traffic and Connections
  • Network Address Translation
  • Using Smart Update
  • User Management and Authentication
  • Identity Awareness
  • Introduction to Check Point VPNs

    Describe Check Point’s unified approach to network management, and the key elements of it

  • Design a distributed environment & Install the Security Gateway in a distributed environment
  • Perform a backup and restore the current Gateway installation from the command line
  • Identify critical files needed to purge or backup, import and export users and
  • groups and add or delete administrators from the command line
  • Deploy Gateways using the Gaia web Interface Create and configure network, host and gateway objects
  • Verify SIC establishment between the Security Management Server and the Gateway using Smart Dashboard
  • Create a basic Rule Base in Smart Dashboard that includes permissions for administrative users,
  • external services, and LAN outbound use
  • Configure NAT rules on Web and Gateway servers
  • Evaluate existing policies and optimize the rules based on current corporate requirements
  • Maintain the Security Management Server with scheduled backups and policy
  • versions to ensure seamless upgrades with minimal downtime
  • Using Smart View Monitor, configure alerts and traffic counters, view a Gateway’s status,
  • monitor suspicious activity rules, analyze tunnel activity and monitor remote user access
  • Monitor remote Gateways using Smart Update to evaluate the need for upgrades, new
  • installations, and license modifications
  • Use Smart Update to apply upgrade packages to single or multiple VPN-1 Gateways
  • Upgrade and attach product licenses using Smart Update
  • Centrally manage users to ensure only authenticated users securely access the
  • corporate network either locally or remotely
  • Manage users to access the corporate LAN by using external databases
  • Use Identity Awareness to provide granular level access to network resources
  • Acquire user information used by the Security Gateway to control access
  • Define Access Roles for use in an Identity Awareness rule
  • Implement Identity Awareness in the Firewall Rule Base
  • Configure a pre-shared secret site-to-site VPN with partner sites
  • Configure permanent tunnels for remote access to corporate resources

  • Distributed Installations and SIC
  • Stand-alone Security Gateway Installations
  • Common Tools
  • Building a Security Policy
  • Configure the DMZ
  • Configure NAT
  • Monitor with Smart View Tracker
  • Client Authentication
  • Identity Awareness
  • Site-to-Site VPN between corporate and branch office
  • Exam# 156-215.80
    Checkpoint Certified Security Expert (CCSE) Designed for more experienced security professionals, CCSE NGX certification is one of the most highly recognized and respected vendor-specific security certifications available.

    CCSE NGX is an advanced Core security certification built on CCSA NGX, confirming in-depth skills and expertise in managing and supporting Check Point products. Proficiencies include configuring and managing VPN-1/FireWall-1 as an Internet security solution and virtual private network (VPN), using encryption technologies to implement site-to-site and remote access VPNs, and configuring content security by enabling Java blocking and anti-virus checking.

    CCSE Certification Includes
    • Advanced Firewall
    • Advanced Upgrading
    • Advanced User Management
    • Advanced Clustering
    • Advanced Acceleration
    • Advanced IPsec VPN
    • Remote Access
    • Auditing and Reporting