Cattlefield AcademyCattlefield Academy is the learning and the knowledge sharing wing of Cattlefield Technologies. We at cattlefield academy  device training and workshop courses as per industry and market requirement.

We put a lot of emphasis on delivering trainings in best possible way so as to realize the real life scenario and implementations. All our instructors are industry professionals with vast experience in Networking and Network Security.

Our uniqueness include:

  • Hands-on workshops
  • Hands-on approach
  • 24x7 Access to our Lab from home
  • Certified instructors with professional experience


Duration40 Hours Can be divided into weekdays or weekends
Training FeeINR-7500/- Per candidate
Study Material
Soft copy
Hands OnHands on LAB and Real Life Scenarios for Demo

Instructor: Senior Security Consultant and trainer

Course content for CCSA course and certification:

Check Point Security Administrator course covers all the objectives of CCSA (156-215.75) and it will help you to Master the skills to deploy and manage Check Point 3D Security systems. This 40 Hrs course covers everything you need to start-up, configure and manage daily operations of Check Point 3D Security systems. Along with full preparation for the exam.

Learn how to:

  • Secure communications across the internet
  • Defend against network threats
  • Configure security policies
  • Protect email and messaging content
  • Manage user access to corporate LANs


  • Basic knowledge of networking
  • Windows Server and/or UNIX skills
  • Internet and TCP/IP experience

How You Will Benefit:

  • Perform seamless product upgrades
  • Back-up and restore networks
  • Monitor suspicious network activities and analyze attacks
  • Troubleshoot network connections
  • Implement Identity Awareness for more granular access levels
  • Configure permanent tunnels for remote access to corporate resources

Domain 1—Introduction to Check Point Technology

  • Describe Check Point’s unified approach to network management and the key elements of this architecture
  • Design a distributed environment using the network detailed in the course topology'
  • Install the Security Gateway version R75 in a distributed environment using the network detailed in the course topology

Domain 2—Deployment Platforms

  • Given network specifications, perform a backup and restore the current Gateway installation from the command line
  • Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line
  • Deploy Gateways using sysconfig and cpconfig from the Gateway command line

Domain 3—Introduction to the Security Policy

  • Given the network topology, create and configure network, host and gateway objects.
  • Verify SIC establishment between the Security Manage-ment Server and the Gateway using SmartDashboard.
  • Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use.
  • Configure NAT rules on Web and Gateway servers.
  • Evaluate existing policies and optimize the rules based on current corporate requirements.
  • Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime.

Domain 4—Monitoring Traffic and Connections

  • Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data
  • Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality
  • Using SmartView Monitor, configure alerts and traffic counters, view a Gateway’s status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements.

Chapter 5—Using SmartUpdate

  • Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications
  • Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways
  • Upgrade and attach product licenses using SmartUpdate

Chapter 6—User Management and Authentication

  • Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
  • Manage users to access the corporate LAN by using external databases

Chapter 7—Identity Awareness

  • Use Identity Awareness to provide granular level access to network resources
  • Acquire user information used by the Security Gateway to control access
  • Define Access Roles for use in an Identity Awareness rule
  • Implement Identity Awareness in the Firewall Rule Base