Showing results for 
Search instead for 
Did you mean: 
Create a Post
Educational Resources

Resources designed specifically to help you learn Check Point.

marco_dcr inside Training and Certification 10 hours ago
views 71 3

Renewal of ccsa and ccse certifications r77.30

Hi everyone,My certificates CCSA and CCSE R77.30 have expired , If I understand correctly, it is possible to take the test " 156-915.80 – CCSE Update"  to renew both, correct?would this test be the same as the CCSE R80  ( 156-315.80 – CCSE) ? Thank you.    


Hi Team,I have given CCSA exam before last week but till now, I haven't received certificate. Also, In my Checkpoint Account, it shows that "According to our records, no certification information was found for Please, let me know what should I do? I want to give CCSE exam based on this. I have appeared exam through Pearson Vue. I also have passing score and copy of this score.@Jason_Tugwell Thanks & Regards,Manish Bhanushali
Jebadhas inside Training and Certification Tuesday
views 79 1

CCSA R70 completed

I have completed CCSA R77, certificate expiring on 9th Feb 2020. Can someone guide me what is the next level I can do.Advance Thanks for helping me out.
Vengatesh_SR inside Training and Certification Monday
views 1872 9 7

CCSM Study guides

Hello Folks, Can you help me with the CCSM study materials.Regards,SR

Check Point For Beginners Lectures Series. Part 1 - The Architecture

Navigation Part 1 - Architecture                <--- You are here Part 2 - Preparing the Lab  Part 3 - Installing Security Management Server Part 4 - Installing Security Gateway Part 5 - Gaia WebUI and CLI  Part 6 - Working with SmartConsole  Part 7 - Managing Security Policies  Part 8 - Network Address Translation  Part 9 - Application Control, URL Filtering and Content Awareness Part 10 - Identity Awareness Part 11 - Threat Prevention Part 12 - Logs and Reporting       Disclamer This article is a part of Check Point for Beginners materials. It is for CheckMates members exclusively. Check Point for Beginners does not replace official training and product documentation.  Introduction Check Point Software Technologies (Check Point for short) is a company operating exclusively on the field of Information Security and covering four main areas: Network Security on the perimeter and inside Data Centers. Cloud Security: Public, Private and Hybrid. Endpoint Security for both Windows and Macs. Mobile Security for Android and iOS devices.     In this article, we are discussing Network Security solutions with Check Point. Network Defense. Three Tier Architecture components   The main product of Check Point is the network security solution – Next Generation Firewall (NGFW). When working with it, you will encounter three main components: Security Gateway, Security Management Server and SmartConsole.   Security Gateway (SG) is usually deployed on the perimeter to control and secure traffic with Firewall and Threat Prevention capabilities. Security Management Server (SMS) defines and controls security policies on the Gateways. It can also be used to as a log server with built-in system of log indexing (SmartLog) and event correlation (SmartEvent – a SIEM-like solution for Check Point products). Usually, SMS is the main element of central management with multiple Security Gateways in operation. Nevertheless, you need an SMS even if your security system has a single gateway only. SmartConsole is a GUI administration tool to connect to SMS. Through this tool, a security administrator is able to prepare and apply security policies to the Security Gateways. Administration process includes the following steps:     Security Administrator opens SmartConsole and connects to the Security Management Server. Security Administrator changes the existing (or defines a new) security policy and applies the changing by pressing Install Policy button. Security Management Server verifies policy for consistency to avoid logical errors, compiles it and send the result policy package to a Security Gateway. Security Gateway receives the compiled policy and applies it to the network traffic crossing the gateway.   Operating Systems   Historically, Check Point Software Technologies was oriented to different OSs: SUN, AIX, HP-OS, various flavors of Linux and Windows, IPSO, Secure Platform (SPLAT) and others. Today three component of Check Point are using the following Operating Systems: Windows – for SmartConsole only. SG and SMS cannot be deployed on Windows. Gaia – Check Point own OS based on hardened RH Enterprise Linux. Gaia will be the focus of some further materials, as it is the main option when deploying both SMS and SG on open server platform and Check Point appliances. Note: Check Point SMB appliances based on ARM processors are using Gaia Embedded OS, which is a stripped and optimized version of Gaia. Software Versions At this moment Check Point supports three main software versions of its products: R77.30 R80.10 R80.20 R77.30 is planned to go out of support in May 2019. R80.20 was released at the end of September 2018. Deployment option There are different deployment options for a Network Security System based on Check Point products: Check Point Security Appliance. This option includes both hardware and software required to run Check Point Network Security System. Open Server. Gaia OS can be deployed on specific certified servers from a Hardware Compatibility List available on Check Point web site. A Virtual Machine. Gaia supports VMware ESX and the most popular public cloud platforms: AWS, Azure, Google Cloud, Alibaba, and Oracle.   Standalone and Distributed Deployment   Security Gateway and Security Management Server components can be deployed on the same hardware of VM (Standalone):    or as different entities (Distributed Deployment).     Standalone option is economical but also limited, especially when talking about performance. Distributed is the most popular and deployment option for Check Point customers. For some specific functions, such as SmartEvent, distributed deployment is a requirement.   Gateway Deployment   Security Gateway is deployed in a Routed Mode or a Bridge Mode. Routed Mode is the most common. In this case, Security Gateway performs L3 routing when forwarding traffic allowed by Security Policy. Bridge Mode can be deployed without changing network topology, to control traffic on Layer 2. Some functionality is limited in this mode. Check Point Software Blades One of the most frequent questions beginners have is about the term “Software Blades”. In plain words, Check Point is using this term for specific features of its products. Security Gateways and Management Servers have collections of related Software Blades that one can enable or disable when required, depending on licensing. Combination of those defines specific flavor of Check Point products. We will be addressing most of the Software Blades and their functions in the further CP4B materials. However, it worth listing all Software Blades available for Management and Gateways here.     Security Gateway Software Blades   Firewall – Basic security filtering functionality IPSec VPN – functionality for creating IPSec-based Site to Site Virtual Private Networks Mobile Access – SSL and IPSec Endpoint VPN solution Application Control & URL Filtering – Advanced Security solution to control Web URL and Application traffic through the gateway Data Loss Prevention – Pre-emptively prevent sensitive information from leaving the organization, educate users on proper data handling procedures, and allow remediation in real-time IPS – Intrusion Prevention System Anti-Bot – blade to detect and prevent Advanced Persistent Threats (APT) activity within the protected network Anti-Virus – AVI scanning on the fly for downloads and uploads crossing Security Gateways Threat Emulation – Sandboxing solution for downloads and email attachments Threat Extraction – Unique technique to remove active content from downloads and attachments to prevent incidental malware infections and APT AntiSpam & Email Security – email protection blade Identity Awareness – Provides visibility to the identities of end users and the specific Active Directory host they are connecting from. This allows security policies to be enforced based on any combination of user, specific machine, or network. Content Awareness – Control over specific types of content data files crossing Security Gateways QoS – Quality of Service, traffic shaping and prioritization functionality Monitoring – Real Time Monitoring of performance and traffic indicators for Security Gateways     Security Management Server Software Blades   Network Policy Management — to create and manage SG security policies Endpoint Policy Management — to create and manage Endpoint Security Policies Logging & Status – central logging and log consolidation functionality Workflow — Change Management Cycle functionality with ability to audit and approve certain policy management operations User Directory — User management and integration with external authentication solutions Provisioning — Centralized maintenance tool Compliance — Automated compliance tool for security and best practices audits SmartEvent — Log correlation and Security Events management tool     Conclusion In this article we have introduce you to the main terms and concepts of Check Point Network Security product family. In the next articles, we will address installation and initial configuration flow for both Security Gateway and Security Management Server.     ---------------------------- Authors and Contributors Author - Evgeniy Olkov‌, CTO at TS Solution. Founded in 2010, the TS Solution is a fast growing Russian company, focused on integrating high-tech networking, security and server virtualization systems and technologies, along with maintenance and professional services. Translation and editing - Valeri Loukine‌ Review and editing - Dameon Welch-Abernathy‌     Navigation Part 1 - Architecture                <--- You are here Part 2 - Preparing the Lab  Part 3 - Installing Security Management Server Part 4 - Installing Security Gateway Part 5 - Gaia WebUI and CLI  Part 6 - Working with SmartConsole  Part 7 - Managing Security Policies  Part 8 - Network Address Translation  Part 9 - Application Control, URL Filtering and Content Awareness Part 10 - Identity Awareness Part 11 - Threat Prevention Part 12 - Logs and Reporting    
inside SecureKnowledge Sunday
views 73

Tip of the week - Application Control ATRG

Check Point Provides Application Control Software Blade since version R75. To understand this technological solution, its inspection and process flows, dependencies and troubleshooting techniques, refer to this Advanced Technology Reference Guide article.   
inside How-To Videos a week ago
views 466 1 3

Compliance blade overview and how to get some more out of SmartEvent

In this recording from a lecture I and Kai had with several customers you will get a quick compliance blade overview and learn how to get some more out of SmartEvent Content Compliance Blade overview Why do I need SmartEvent? How do I use SmartEvent (view in My Videos)  
inside SecureKnowledge a week ago
views 153

Tip of the Week - Unified Policy ATRG

Concept of Unified Policy was fully introduced with R80.10 release. Unified policy simplifies Security Management by consolidation of multiple security features into a single policy rulebase. Using multiple software blades within a single policy rule enables unprecedented granularity and control. This Advanced Technical Reference Guide provides a comprehensive explanation of Unified Policy Process Flow, troubleshooting and debugging.  
Danny inside Training and Certification a week ago
views 1079 11 3

Prerequisite for CCSE R80?

One of my colleagues passed the CCSA R80 exam two years ago. It'll expire tomorrow and he plans to do the CCSE R80 next week. He asked me if his then-expired CCSA R80 would be an issue.So I checked with the Check Point Certification FAQ - Updated December 2018However, I couldn't find any note about the expected status of required prerequisite (CCSA R80).
Danny inside Training and Certification a week ago
views 1016 7 6

Check Point Certification Pyramid

With the new R80 exams it's time for an updated Check Point Certification Pyramid CCSMSecurity MasterExams: Any prior CCSM or 156-315.80, 156-115.80 CCASAutomation SpecialistExam: 156-520 CCESEndpoint SpecialistExam: 156-530 CCCSCloud SpecialistExam: tbd CCMSMulti-DomainSpecialistExam: tbd CCVSVSXSpecialistExam: tbd CCSESecurity ExpertExams: 156-215.80, 156-315.80Practice: 156-604 CCSE UpdateSecurity ExpertExams: Any prior CCSE, 156-915.80Practice: 156-604 CCSASecurity AdministratorExam: 156-215.80Practice: 156-603   I only considered real Pearson VUE exams and did neither include sales exams, accreditations, CCSP, HackingPoint, Cyber Range trainings nor the online SkyPrep courses. It seems that Check Point Education is creating a completely new series of Specialist exams. Interesting times!   Check Point Education is: @shay_solomon , @Jason_Tugwell , @Toni_Ponder , @tramsey , Matthew Frey , Vanessa Johnson and others.   Certified Professional Logos Check Point Certification FAQ
Danny inside Training and Certification a week ago
views 378 3 1

Black Friday / Cyber Monday Sale 2019?

Will Check Point offer a Black Friday / Cyber Monday Sale in 2019? - Cyber Monday Sale 2017 - - Black Friday Sale 2018 - @shay_solomon @Jason_Tugwell 

It's our Black Friday/Cyber Monday 2019 Sale!

Check Point Exam Promotions It’s our Black Friday/Cyber Monday sale!  We are offering a 25% discount on any exam using the promo code: Cyber2019 Exams may be taken anytime but must be scheduled by December 31, 2019. Additionally, for a limited time, the following practice exams will be offered at a 50% discount using the promo code: Practice50 156-603 – Check Point Certified Security Administrator R80 - Practice•156-604 – Check Point Certified Security Expert R80 - Practice Both of these promotions are available until December 31, 2019. Take advantage of these deals before they are gone! 
adventurer inside Training and Certification 2 weeks ago
views 225 2

Check Point certification expiry question

I haven't been keeping up to date with Check Point certification matters ever since I got CCSA R65 many years ago.What I remember from back then is Check Point certification doesn't expire, but of course as the versions go up I'll remain certified for a older version. So now fast forward to 2019, I look this up again and found that this document says 2 years expiry. Was the expiry policy changed ?Did I miss a memo ? Regards.
DrEvil inside Training and Certification 2 weeks ago
views 189 1

CCSE/CCSM Cerfified people number classified by country

Hi AllI was wondering if you guys are aware if a kind of a map or something similar showing how CCSE/CCSM a dislocated over the world exists.I'm basically looking for the number of CCSE/CCSM on a country basis (especially in Switzerland).Thanks in advance for your reply.
inside SecureKnowledge 3 weeks ago
views 235 1

Tip of the Week - ICA Management Tool

The ICA Management Tool is a user-friendly tool that allows an administrator to perform multiple operations on and for the Internal Certificate Authority (ICA), such as: Certificate management and searches CRL recreation and download ICA configuration ICA cleanup resulting in the removal of expired certificates The ICA Management Tool runs on Security Management Server / Multi-Domain Security Management Server. For more details, please read this SecureKnowledge article.
In This Category
Check Point for Beginners (CP4B)

<p>Check Point for Beginners (CP4B) is here to help you get started mastering Check Point Security Gateway and Management.</p>

Category Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.