Deployment Administrator (CPDA R82)

This course provides students with the fundamental knowledge, skills, and hands-on experience needed to deploy a new Quantum Security Environment. Students learn how to install and perform basic configuration of SmartConsole, the Gaia Operating System, a Security Management Server, and a Security Gateway. Additionally, students learn how to create a basic policy, deploy a Security Gateway Cluster, configure a Dedicated Log Server, perform maintenance tasks including System Backups and Snapshots and batch import Objects and Rules.


Target Audience

  • Deployment Administrators
  • Security Administrators
  • Security Consultants


Duration

2 days


Accreditation/Certification

None


Prerequisites

Base Knowledge

  • Unix-like and/or Windows OS
  • Internet Fundamentals
  • Networking Fundamentals
  • Networking Security
  • System Administration
  • TCP/IP Networking
  • Text Editors in Unix-like OS

Check Point Courses

  • No prerequisite courses
Pokaz szczególy


Agenda

Module 1: Introduction to Quantum Security

  • Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.


Module 2: Quantum Security Architecture

  • Identify key considerations when planning a new Quantum Security deployment.

Lab Tasks

  • Verify the Check Point Hosts
  • Document the Network Environment
  • Verify the A-GUI Client Host


Module 3: Primary Security Management Server Deployment

  • Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.

Lab Tasks

  • Install the Gaia Operating System
  • Configure the Primary Security Management Server
  • Deploy SmartConsole


Module 4: Security Gateway Deployment

  • Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.

Lab Tasks

  • Run the First Time Wizard on the Security Gateway
  • Create a Security Gateway Object
  • Test SIC and Install Licenses


Module 5: Policy Fundamentals

  • Describe the essential elements of a Security Policy.
  • Identify features and capabilities that enhance the configuration and management of the Security Policy.

Lab Tasks

  • Create an Access Control Policy Package
  • Add and Modify a Rule in the Access Control Policy


Module 6: Security Gateway Cluster Deployment

  • Identify the basic workflow, guidelines, and best practices for a Security Gateway Custer deployment.

Lab Tasks

  • Reconfigure the Security Environment
  • Configure Cluster Members as Security Gateways
  • Configure Cluster Member Interfaces
  • Add Members to the Clusters
  • Add Licenses to the Cluster Members


Module 7: Dedicated Log Server Deployment

  • Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.

Lab Tasks

  • Configure a dedicated Log Server
  • Add a dedicated Log Server


Module 8: Maintenance Fundamentals

  • Explain the purpose of a regular maintenance strategy.
  • Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.

Lab Tasks

  • Collect and Download System Backups
  • Collect and Download Snapshots


Module 9: Batch Import of Security Environment Components

  • Describe purpose of a batch import and give import use cases.
  • Identify the basic workflow, guidelines, and best practices for a batch import.

Lab Tasks

  • Import and Create Host Objects
  • Import and Create Network Objects
  • Import and Create Group Objects
  • Import and Create Access Control Rules