-
This course provides you with the fundamental knowledge, skills, and hands-on experience necessary to set up a new Quantum security environment. You will learn how to install SmartConsole, the GAIA operating system, a Security Management Server, and a Security Gateway, and perform basic configuration.
In addition, the course shows you how to create a basic policy, set up a Security Gateway cluster, configure a Dedicated Log Server, perform maintenance tasks such as system backups and snapshots, and perform batch imports of objects and rules.
This course focuses on the deployment of GAIA systems. Without any prior knowledge, you will learn all the necessary steps from scratch and can use this knowledge directly to set up a lab environment – with 15 days of unlimited use after each new installation.
-
Course Contents
-
- Introduction to Quantum Security
- Quantum Security Architecture
- Primary Security Management Server Deployment
- Security Gateway Deployment
- Policy Fundamentals
- Security Gateway Cluster Deployment
- Dedicated Log Server Deployment
- Maintenance Fundamentals
- Batch Import of Security Environment Components
You will receive the original course documentation as a Check Point e-Kit.
-
Target Group
-
- Deployment Administrators
- Security Administrators
- Security Consultants
-
Knowledge Prerequisites
-
Base Knowledge:
- Unix-like and/or Windows OS
- Internet Fundamentals
- Networking Fundamentals
- Networking Security
- System Administration
- TCP/IP Networking
- Text Editors in Unix-like OS
-
Complementary and Continuative Courses
- Check Point Certified Security Administrator R82 – CCSA
-
Course Objective
-
The course teaches you the skills needed to plan, install, and configure Check Point security solutions. You will learn how to implement security policies, integrate them into existing network infrastructures, and perform basic troubleshooting measures. The aim is to ensure a stable and secure network environment.
| Module 1: Introduction to Quantum Security |
| Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment. |
| Module 2: Quantum Security Architecture |
| Identify key considerations when planning a new Quantum Security deployment. |
| Lab Tasks |
| Verify the Check Point Hosts |
| Document the Network Environment |
| Verify the A-GUI Client Host |
| Module 3: Primary Security Management Server Deployment |
| Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment. |
| Lab Tasks |
| Install the Gaia Operating System |
| Configure the Primary Security Management Server |
| Deploy SmartConsole |
| Module 4: Security Gateway Deployment |
| Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment. |
| Lab Tasks |
| Run the First Time Wizard on the Security Gateway |
| Create a Security Gateway Object |
| Test SIC and Install Licenses |
| Module 5: Policy Fundamentals |
| Describe the essential elements of a Security Policy. |
| Identify features and capabilities that enhance the configuration and management of the Security Policy. |
| Lab Tasks |
| Create an Access Control Policy Package |
| Add and Modify a Rule in the Access Control Policy |
| Module 6: Security Gateway Cluster Deployment |
| Identify the basic workflow, guidelines, and best practices for a Security Gateway Custer deployment. |
| Lab Tasks |
| Reconfigure the Security Environment |
| Configure Cluster Members as Security Gateways |
| Configure Cluster Member Interfaces |
| Add Members to the Clusters |
| Add Licenses to the Cluster Members |
| Module 7: Dedicated Log Server Deployment |
| Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment. |
| Lab Tasks |
| Configure a dedicated Log Server |
| Add a dedicated Log Server |
| Module 8: Maintenance Fundamentals |
| Explain the purpose of a regular maintenance strategy. |
| Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates. |
| Lab Tasks |
| Collect and Download System Backups |
| Collect and Download Snapshots |
| Module 9: Batch Import of Security Environment Components |
| Describe purpose of a batch import and give import use cases. |
| Identify the basic workflow, guidelines, and best practices for a batch import. |
| Lab Tasks |
| Import and Create Host Objects |
| Import and Create Network Objects |
| Import and Create Group Objects |
| Import and Create Access Control Rules |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
-
This course provides you with the fundamental knowledge, skills, and hands-on experience necessary to set up a new Quantum security environment. You will learn how to install SmartConsole, the GAIA operating system, a Security Management Server, and a Security Gateway, and perform basic configuration.
In addition, the course shows you how to create a basic policy, set up a Security Gateway cluster, configure a Dedicated Log Server, perform maintenance tasks such as system backups and snapshots, and perform batch imports of objects and rules.
This course focuses on the deployment of GAIA systems. Without any prior knowledge, you will learn all the necessary steps from scratch and can use this knowledge directly to set up a lab environment – with 15 days of unlimited use after each new installation.
-
Course Contents
-
- Introduction to Quantum Security
- Quantum Security Architecture
- Primary Security Management Server Deployment
- Security Gateway Deployment
- Policy Fundamentals
- Security Gateway Cluster Deployment
- Dedicated Log Server Deployment
- Maintenance Fundamentals
- Batch Import of Security Environment Components
You will receive the original course documentation as a Check Point e-Kit.
-
Target Group
-
- Deployment Administrators
- Security Administrators
- Security Consultants
-
Knowledge Prerequisites
-
Base Knowledge:
- Unix-like and/or Windows OS
- Internet Fundamentals
- Networking Fundamentals
- Networking Security
- System Administration
- TCP/IP Networking
- Text Editors in Unix-like OS
-
Complementary and Continuative Courses
- Check Point Certified Security Administrator R82 – CCSA
-
Course Objective
-
The course teaches you the skills needed to plan, install, and configure Check Point security solutions. You will learn how to implement security policies, integrate them into existing network infrastructures, and perform basic troubleshooting measures. The aim is to ensure a stable and secure network environment.
| Module 1: Introduction to Quantum Security |
| Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment. |
| Module 2: Quantum Security Architecture |
| Identify key considerations when planning a new Quantum Security deployment. |
| Lab Tasks |
| Verify the Check Point Hosts |
| Document the Network Environment |
| Verify the A-GUI Client Host |
| Module 3: Primary Security Management Server Deployment |
| Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment. |
| Lab Tasks |
| Install the Gaia Operating System |
| Configure the Primary Security Management Server |
| Deploy SmartConsole |
| Module 4: Security Gateway Deployment |
| Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment. |
| Lab Tasks |
| Run the First Time Wizard on the Security Gateway |
| Create a Security Gateway Object |
| Test SIC and Install Licenses |
| Module 5: Policy Fundamentals |
| Describe the essential elements of a Security Policy. |
| Identify features and capabilities that enhance the configuration and management of the Security Policy. |
| Lab Tasks |
| Create an Access Control Policy Package |
| Add and Modify a Rule in the Access Control Policy |
| Module 6: Security Gateway Cluster Deployment |
| Identify the basic workflow, guidelines, and best practices for a Security Gateway Custer deployment. |
| Lab Tasks |
| Reconfigure the Security Environment |
| Configure Cluster Members as Security Gateways |
| Configure Cluster Member Interfaces |
| Add Members to the Clusters |
| Add Licenses to the Cluster Members |
| Module 7: Dedicated Log Server Deployment |
| Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment. |
| Lab Tasks |
| Configure a dedicated Log Server |
| Add a dedicated Log Server |
| Module 8: Maintenance Fundamentals |
| Explain the purpose of a regular maintenance strategy. |
| Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates. |
| Lab Tasks |
| Collect and Download System Backups |
| Collect and Download Snapshots |
| Module 9: Batch Import of Security Environment Components |
| Describe purpose of a batch import and give import use cases. |
| Identify the basic workflow, guidelines, and best practices for a batch import. |
| Lab Tasks |
| Import and Create Host Objects |
| Import and Create Network Objects |
| Import and Create Group Objects |
| Import and Create Access Control Rules |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
