Training Check Point

Training goals

code: CP-CPDA | version: R82.x

This course provides students with the fundamental knowledge, skills, and hands-on experience needed to deploy a new Quantum Security Environment. Students learn how to install and perform basic configuration of SmartConsole, the Gaia Operating System, a Security Management Server, and a Security Gateway. Additionally, students learn how to create a basic policy, deploy a Security Gateway Cluster, configure a Dedicated Log Server, perform maintenance tasks including System Backups and Snapshots and batch import Objects and Rules.

 

Target Audience

  • Deployment Administrators
  • Security Administrators
  • Security Consultants

 

NIST/NICE Work Role Categories

  • Implementation and Operation (IO)

Conspect Show list

  • Module 1: Introduction to Quantum Security
    • Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
  • Module 2: Quantum Security Architecture
    • Identify key considerations when planning a new Quantum Security deployment.
    • Lab Tasks
      • Verify the Check Point Hosts
      • Document the Network Environment
      • Verify the A-GUI Client Host
  • Module 3: Primary Security Management Server Deployment
    • Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.
    • Lab Tasks
      • Install the Gaia Operating System
      • Configure the Primary Security Management Server
      • Deploy SmartConsole
  • Module 4: Security Gateway Deployment
    • Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.
    • Lab Tasks
      • Run the First Time Wizard on the Security Gateway
      • Create a Security Gateway Object
      • Test SIC and Install Licenses
  • Module 5: Policy Fundamentals
    • Describe the essential elements of a Security Policy.
    • Identify features and capabilities that enhance the configuration and management of the Security Policy.
    • Lab Tasks
      • Create an Access Control Policy Package
      • Add and Modify a Rule in the Access Control Policy
  • Module 6: Security Gateway Cluster Deployment
    • Identify the basic workflow, guidelines, and best practices for a Security Gateway Custer deployment.
    • Lab Tasks
      • Reconfigure the Security Environment
      • Configure Cluster Members as Security Gateways
      • Configure Cluster Member Interfaces
      • Add Members to the Clusters
      • Add Licenses to the Cluster Members
  • Module 7: Dedicated Log Server Deployment
    • Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.
    • Lab Tasks
      • Configure a dedicated Log Server
      • Add a dedicated Log Server
  • Module 8: Maintenance Fundamentals
    • Explain the purpose of a regular maintenance strategy.
    • Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.
    • Lab Tasks
      • Collect and Download System Backups
      • Collect and Download Snapshots
  • Module 9: Batch Import of Security Environment Components
    • Describe purpose of a batch import and give import use cases.
    • Identify the basic workflow, guidelines, and best practices for a batch import.
    • Lab Tasks
      • Import and Create Host Objects
      • Import and Create Network Objects
      • Import and Create Group Objects
      • Import and Create Access Control Rules
Download conspect training as PDF

Additional information

Prerequisites

Base Knowledge

  • Unix-like and/or Windows OS
  • Internet Fundamentals
  • Networking Fundamentals
  • Networking Security
  • System Administration
  • TCP/IP Networking
  • Text Editors in Unix-like OS

 

Check Point Courses

  • No prerequisite courses
Difficulty level
Duration 2 days
Certificate

The participants will obtain certificates signed by Check Point Software Technologies Ltd. (course completion).

Trainer

Authorized Check Point Software Technologies Ltd. Trainer

Other training Check Point | Core Training

Training thematically related

Security

Contact form

Please fill form below to obtain more info about this training.







* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

PRICE 1100 EUR We also accept payment using IGS (Infinity Global Services) credits issued by Check Point. In such cases, please contact us at szkolenia@compendium.pl

Promotions available

enter the promotion code:
(green color = code correct)
the discount will be applied after entering the correct code
 

FORM OF TRAINING ?

 

TRAINING MATERIALS ?

 

SELECT TRAINING DATE

  • hybrid training: HYBRID
    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
Book a training appointment
close

Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

Dlearning training

You may participate from at any place in the world. It is sufficient to have a computer (or, actually a tablet, or smartphone) connected to the Internet. Compendium CE provides each Distance Learning training participant with adequate software enabling connection to the Data Center. For more information, please visit dlearning.eu site

close

Paper materials

Traditional materials: The price includes standard materials issued in the form of paper books, printed or other, depending on the arrangements with the manufacturer.

Electronic materials

Electronic materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.

Upcoming Check Point training

Training schedule Check Point