Check Point Stars Partner Logo

Check Point Deployment Administrator R82

CPDA

Check Point Stars Partner Logo

This course provides you with the fundamental knowledge, skills, and hands-on experience necessary to set up a new Quantum security environment. You will learn how to install SmartConsole, the GAIA operating system, a Security Management Server, and a Security Gateway, and perform basic configuration.

In addition, the course shows you how to create a basic policy, set up a Security Gateway cluster, configure a Dedicated Log Server, perform maintenance tasks such as system backups and snapshots, and perform batch imports of objects and rules.

This course focuses on the deployment of GAIA systems. Without any prior knowledge, you will learn all the necessary steps from scratch and can use this knowledge directly to set up a lab environment – with 15 days of unlimited use after each new installation.

Course Contents

  • Introduction to Quantum Security
  • Quantum Security Architecture
  • Primary Security Management Server Deployment
  • Security Gateway Deployment
  • Policy Fundamentals
  • Security Gateway Cluster Deployment
  • Dedicated Log Server Deployment
  • Maintenance Fundamentals
  • Batch Import of Security Environment Components

E-Book Symbol You will receive the original course documentation as a Check Point e-Kit.

Request in-house training now

Target Group

  • Deployment Administrators
  • Security Administrators
  • Security Consultants

Knowledge Prerequisites

Base Knowledge:

  • Unix-like and/or Windows OS
  • Internet Fundamentals
  • Networking Fundamentals
  • Networking Security
  • System Administration
  • TCP/IP Networking
  • Text Editors in Unix-like OS

Complementary and Continuative Courses

Check Point Certified Security Administrator R82 – CCSA

Course Objective

The course teaches you the skills needed to plan, install, and configure Check Point security solutions. You will learn how to implement security policies, integrate them into existing network infrastructures, and perform basic troubleshooting measures. The aim is to ensure a stable and secure network environment.

Module 1: Introduction to Quantum Security
Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
 
Module 2: Quantum Security Architecture
Identify key considerations when planning a new Quantum Security deployment.
Lab Tasks
Verify the Check Point Hosts
Document the Network Environment
Verify the A-GUI Client Host
 
Module 3: Primary Security Management Server Deployment
Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.
Lab Tasks
Install the Gaia Operating System
Configure the Primary Security Management Server
Deploy SmartConsole
 
Module 4: Security Gateway Deployment
Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.
Lab Tasks
Run the First Time Wizard on the Security Gateway
Create a Security Gateway Object
Test SIC and Install Licenses
 
Module 5: Policy Fundamentals
Describe the essential elements of a Security Policy.
Identify features and capabilities that enhance the configuration and management of the Security Policy.
Lab Tasks
Create an Access Control Policy Package
Add and Modify a Rule in the Access Control Policy
 
Module 6: Security Gateway Cluster Deployment
Identify the basic workflow, guidelines, and best practices for a Security Gateway Custer deployment.
Lab Tasks
Reconfigure the Security Environment
Configure Cluster Members as Security Gateways
Configure Cluster Member Interfaces
Add Members to the Clusters
Add Licenses to the Cluster Members
 
Module 7: Dedicated Log Server Deployment
Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.
Lab Tasks
Configure a dedicated Log Server
Add a dedicated Log Server
 
Module 8: Maintenance Fundamentals
Explain the purpose of a regular maintenance strategy.
Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.
Lab Tasks
Collect and Download System Backups
Collect and Download Snapshots
 
Module 9: Batch Import of Security Environment Components
Describe purpose of a batch import and give import use cases.
Identify the basic workflow, guidelines, and best practices for a batch import.
Lab Tasks
Import and Create Host Objects
Import and Create Network Objects
Import and Create Group Objects
Import and Create Access Control Rules

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

This course provides you with the fundamental knowledge, skills, and hands-on experience necessary to set up a new Quantum security environment. You will learn how to install SmartConsole, the GAIA operating system, a Security Management Server, and a Security Gateway, and perform basic configuration.

In addition, the course shows you how to create a basic policy, set up a Security Gateway cluster, configure a Dedicated Log Server, perform maintenance tasks such as system backups and snapshots, and perform batch imports of objects and rules.

This course focuses on the deployment of GAIA systems. Without any prior knowledge, you will learn all the necessary steps from scratch and can use this knowledge directly to set up a lab environment – with 15 days of unlimited use after each new installation.

Course Contents

  • Introduction to Quantum Security
  • Quantum Security Architecture
  • Primary Security Management Server Deployment
  • Security Gateway Deployment
  • Policy Fundamentals
  • Security Gateway Cluster Deployment
  • Dedicated Log Server Deployment
  • Maintenance Fundamentals
  • Batch Import of Security Environment Components

E-Book Symbol You will receive the original course documentation as a Check Point e-Kit.

Request in-house training now

Target Group

  • Deployment Administrators
  • Security Administrators
  • Security Consultants

Knowledge Prerequisites

Base Knowledge:

  • Unix-like and/or Windows OS
  • Internet Fundamentals
  • Networking Fundamentals
  • Networking Security
  • System Administration
  • TCP/IP Networking
  • Text Editors in Unix-like OS

Complementary and Continuative Courses

Check Point Certified Security Administrator R82 – CCSA

Course Objective

The course teaches you the skills needed to plan, install, and configure Check Point security solutions. You will learn how to implement security policies, integrate them into existing network infrastructures, and perform basic troubleshooting measures. The aim is to ensure a stable and secure network environment.

Module 1: Introduction to Quantum Security
Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
 
Module 2: Quantum Security Architecture
Identify key considerations when planning a new Quantum Security deployment.
Lab Tasks
Verify the Check Point Hosts
Document the Network Environment
Verify the A-GUI Client Host
 
Module 3: Primary Security Management Server Deployment
Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.
Lab Tasks
Install the Gaia Operating System
Configure the Primary Security Management Server
Deploy SmartConsole
 
Module 4: Security Gateway Deployment
Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.
Lab Tasks
Run the First Time Wizard on the Security Gateway
Create a Security Gateway Object
Test SIC and Install Licenses
 
Module 5: Policy Fundamentals
Describe the essential elements of a Security Policy.
Identify features and capabilities that enhance the configuration and management of the Security Policy.
Lab Tasks
Create an Access Control Policy Package
Add and Modify a Rule in the Access Control Policy
 
Module 6: Security Gateway Cluster Deployment
Identify the basic workflow, guidelines, and best practices for a Security Gateway Custer deployment.
Lab Tasks
Reconfigure the Security Environment
Configure Cluster Members as Security Gateways
Configure Cluster Member Interfaces
Add Members to the Clusters
Add Licenses to the Cluster Members
 
Module 7: Dedicated Log Server Deployment
Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.
Lab Tasks
Configure a dedicated Log Server
Add a dedicated Log Server
 
Module 8: Maintenance Fundamentals
Explain the purpose of a regular maintenance strategy.
Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.
Lab Tasks
Collect and Download System Backups
Collect and Download Snapshots
 
Module 9: Batch Import of Security Environment Components
Describe purpose of a batch import and give import use cases.
Identify the basic workflow, guidelines, and best practices for a batch import.
Lab Tasks
Import and Create Host Objects
Import and Create Network Objects
Import and Create Group Objects
Import and Create Access Control Rules

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.