Training Check Point

Training goals

code: CP-CPDA | version: R82.x

This course provides students with the fundamental knowledge, skills, and hands-on experience needed to deploy a new Quantum Security Environment. Students learn how to install and perform basic configuration of SmartConsole, the Gaia Operating System, a Security Management Server, and a Security Gateway. Additionally, students learn how to create a basic policy, deploy a Security Gateway Cluster, configure a Dedicated Log Server, perform maintenance tasks including System Backups and Snapshots and batch import Objects and Rules.

 

Target Audience

  • Deployment Administrators
  • Security Administrators
  • Security Consultants

 

NIST/NICE Work Role Categories

  • Implementation and Operation (IO)

Conspect Show list

  • Module 1: Introduction to Quantum Security
    • Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
  • Module 2: Quantum Security Architecture
    • Identify key considerations when planning a new Quantum Security deployment.
    • Lab Tasks
      • Verify the Check Point Hosts
      • Document the Network Environment
      • Verify the A-GUI Client Host
  • Module 3: Primary Security Management Server Deployment
    • Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.
    • Lab Tasks
      • Install the Gaia Operating System
      • Configure the Primary Security Management Server
      • Deploy SmartConsole
  • Module 4: Security Gateway Deployment
    • Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.
    • Lab Tasks
      • Run the First Time Wizard on the Security Gateway
      • Create a Security Gateway Object
      • Test SIC and Install Licenses
  • Module 5: Policy Fundamentals
    • Describe the essential elements of a Security Policy.
    • Identify features and capabilities that enhance the configuration and management of the Security Policy.
    • Lab Tasks
      • Create an Access Control Policy Package
      • Add and Modify a Rule in the Access Control Policy
  • Module 6: Security Gateway Cluster Deployment
    • Identify the basic workflow, guidelines, and best practices for a Security Gateway Custer deployment.
    • Lab Tasks
      • Reconfigure the Security Environment
      • Configure Cluster Members as Security Gateways
      • Configure Cluster Member Interfaces
      • Add Members to the Clusters
      • Add Licenses to the Cluster Members
  • Module 7: Dedicated Log Server Deployment
    • Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.
    • Lab Tasks
      • Configure a dedicated Log Server
      • Add a dedicated Log Server
  • Module 8: Maintenance Fundamentals
    • Explain the purpose of a regular maintenance strategy.
    • Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.
    • Lab Tasks
      • Collect and Download System Backups
      • Collect and Download Snapshots
  • Module 9: Batch Import of Security Environment Components
    • Describe purpose of a batch import and give import use cases.
    • Identify the basic workflow, guidelines, and best practices for a batch import.
    • Lab Tasks
      • Import and Create Host Objects
      • Import and Create Network Objects
      • Import and Create Group Objects
      • Import and Create Access Control Rules
Download conspect training as PDF

Additional information

Prerequisites

Base Knowledge

  • Unix-like and/or Windows OS
  • Internet Fundamentals
  • Networking Fundamentals
  • Networking Security
  • System Administration
  • TCP/IP Networking
  • Text Editors in Unix-like OS

 

Check Point Courses

  • No prerequisite courses
Difficulty level
Duration 2 days
Certificate

The participants will obtain certificates signed by Check Point Software Technologies Ltd. (course completion).

Trainer

Authorized Check Point Software Technologies Ltd. Trainer

Other training Check Point | Core Training

Training thematically related

Security

Contact form

Please fill form below to obtain more info about this training.







* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

TRAINING PRICE FROM 1100 EUR

  • In order to propose a date for this training, please contact the Sales Department

Upcoming Check Point training

Training schedule Check Point