Check Point Deployment Administrator (CPDA)

 

Course Overview

This course provides students with the fundamental knowledge, skills, and hands-on experience needed to deploy a new Quantum Security Environment. Students learn how to install and perform basic configuration of SmartConsole, the Gaia Operating System, a Security Management Server, and a Security Gateway. Additionally, students learn how to create a basic policy, deploy a Security Gateway Cluster, configure a Dedicated Log Server, perform maintenance tasks including System Backups and Snapshots and batch import Objects and Rules.

Who should attend

  • Deployment Administrators
  • Security Administrators
  • Security Consultants

Prerequisites

Base Knowledge

  • Unix-like and/or Windows OS
  • Internet Fundamentals
  • Networking Fundamentals
  • Networking Security
  • System Administration
  • TCP/IP Networking
  • Text Editors in Unix-like OS

Outline: Check Point Deployment Administrator (CPDA)

Module 1: Introduction to Quantum Security

  • Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.

Module 2: Quantum Security Architecture

  • Identify key considerations when planning a new Quantum Security deployment.

Lab Tasks:

  • Verify the Check Point Hosts
  • Document the Network Environment
  • Verify the A-GUI Client Host

Module 3: Primary Security Management Server Deployment

  • Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.

Lab Tasks:

  • Install the Gaia Operating System
  • Configure the Primary Security Management Server
  • Deploy SmartConsole

Module 4: Security Gateway Deployment

  • Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.

Lab Tasks:

  • Run the First Time Wizard on the Security Gateway
  • Create a Security Gateway Object
  • Test SIC and Install Licenses

Module 5: Policy Fundamentals

  • Describe the essential elements of a Security Policy.
  • Identify features and capabilities that enhance the configuration and management of the Security Policy.

Lab Tasks:

  • Create an Access Control Policy Package
  • Add and Modify a Rule in the Access Control Policy

Module 6: Security Gateway Cluster Deployment

  • Identify the basic workflow, guidelines, and best practices for a Security Gateway Cluster deployment.

Lab Tasks:

  • Reconfigure the Security Environment
  • Configure Cluster Members as Security Gateways
  • Configure Cluster Member Interfaces
  • Add Members to the Clusters
  • Add Licenses to the Cluster Members

Module 7: Dedicated Log Server Deployment

  • Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.

Lab Tasks:

  • Configure a dedicated Log Server
  • Add a dedicated Log Server

Module 8: Maintenance Fundamentals

  • Explain the purpose of a regular maintenance strategy.
  • Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.

Lab Tasks:

  • Collect and Download System Backups
  • Collect and Download Snapshots

Module 9: Batch Import of Security Environment Components

  • Describe purpose of a batch import and give import use cases.
  • Identify the basic workflow, guidelines, and best practices for a batch import.

Lab Tasks:

  • Import and Create Host Objects
  • Import and Create Network Objects
  • Import and Create Group Objects
  • Import and Create Access Control Rules

Prices & Delivery methods

Online Training

Duration
2 days

Price
  • US $ 2,000
Classroom Training

Duration
2 days

Price
  • United States: US $ 2,000

Click on town name or "Online Training" to book Schedule

Guaranteed date:   This green checkmark in the Upcoming Schedule below indicates that this session is Guaranteed to Run.
This is an Instructor-Led Classroom course
Instructor-led Online Training:   This is an Instructor-Led Online (ILO) course. These sessions are conducted via WebEx in a VoIP environment and require an Internet Connection and headset with microphone connected to your computer or laptop. If you have any questions about our online courses, feel free to contact us via phone or Email anytime.
This is a FLEX course, which is delivered simultaneously in two modalities. Choose to attend the Instructor-Led Online (ILO) virtual session or Instructor-Led Classroom (ILT) session.
*   This class is delivered by a vendor or third party partner.

United States

Guaranteed to Run Online Training 10:00 Eastern Daylight Time (EDT) * Enroll