Build your expertise in the technology that secures the internet for the world's largest companies. Equip your organisation to sell and support Check Point products and reap the rewards in the short and long term.

With several knowledge routes to take, click on the courses to understand more and select the one that is right for you and your company.

Check Point divides its partner community into 4 levels, each with their own requirements that encompass growth, technical and sales based certifications:

  • 2 Star Partner
  • 3 Star Partner
  • 4 Star Partner
  • 4 Star Elite Partner

 

Tier Requirements:

  2s 3s 4s
Annual Products Growth - Yes Yes
Technical Certifications CCSE* - 2 (3) ** 3 (5) **
Sales Certifications* 1 3 6
Attendees (Reps/SEs) at yearly Joint SKO 1 3 5

*at least 80% of workforce
**for CCSP Partners

 

Sales Certification (Valid 1 years)

Check Point Sales Certification (CPSC. Sales Certification courses & Test are available online through the Check Point Partner Map.

 

Technical Certifications (Valid 2 years)

  • Check Point Certified Security Administrator (CCSA) 
  • Check Point Certified Security Expert (CCSE) 
  • Check Point Certified Security Master (CCSM) 

 

What's the difference between Partner Certification and Individual/Professional Certification?

Partner Certifications are linked to the Partner as a whole and can help attract better commercial terms.

Individual/Professional Certifications are held by one person.

Courses

Expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades.Validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
This class continues the Art of Web Hacking series The class covers a wide range of offensive hacking techniques. The curriculum was written by real penetration testers with a world-wide reputation (BlackHat, AppSec, OWASP, Defcon). The Advanced Infrastructure Hacking class is designed for those who want to enrich their knowledge. The fast-paced class teaches: Hacking techniques to compromise operating systems and networking devices Advanced penetration techniques to achieve exploitation Hacking domain controllers to local root, VLAN hopping and VoIP hacking
This fastpaced class gives attendees an insight into advanced AppSec topics. The class curriculum is split into two: 3 days of Server Side Flaws. 2 days of Client Side Flaws
The ideal introductory/intermediate training class designed to teach the fundamentals of what pen testing is all about. This hands-on training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focuses on what is really needed when conducting a penetration test. Whilst a variety of tools are used, they are the key tools that should be in any penetration tester’s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career.
This curriculum introduces you to Web Application Hacking.Practical focusLearn how web application security flaws are foundDiscover leading industry standards and approachesUse this foundation to enhance your knowledgePrepare for more advanced web application topics
Check Point Security Administration R80 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades
Our most advanced technical 3-day course teaches how to use advanced commands to configure and troubleshoot Check Point Security Systems. Multiple hands-on lab exercises teach how to bring optimization techniques back to your workplace.