Detailed Course Outline
Module 1: Introduction to Quantum Security
- Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
Module 2: Quantum Security Architecture
- Identify key considerations when planning a new Quantum Security deployment.
Lab Tasks:
- Verify the Check Point Hosts
- Document the Network Environment
- Verify the A-GUI Client Host
Module 3: Primary Security Management Server Deployment
- Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.
Lab Tasks:
- Install the Gaia Operating System
- Configure the Primary Security Management Server
- Deploy SmartConsole
Module 4: Security Gateway Deployment
- Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.
Lab Tasks:
- Run the First Time Wizard on the Security Gateway
- Create a Security Gateway Object
- Test SIC and Install Licenses
Module 5: Policy Fundamentals
- Describe the essential elements of a Security Policy.
- Identify features and capabilities that enhance the configuration and management of the Security Policy.
Lab Tasks:
- Create an Access Control Policy Package
- Add and Modify a Rule in the Access Control Policy
Module 6: Security Gateway Cluster Deployment
- Identify the basic workflow, guidelines, and best practices for a Security Gateway Cluster deployment.
Lab Tasks:
- Reconfigure the Security Environment
- Configure Cluster Members as Security Gateways
- Configure Cluster Member Interfaces
- Add Members to the Clusters
- Add Licenses to the Cluster Members
Module 7: Dedicated Log Server Deployment
- Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.
Lab Tasks:
- Configure a dedicated Log Server
- Add a dedicated Log Server
Module 8: Maintenance Fundamentals
- Explain the purpose of a regular maintenance strategy.
- Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.
Lab Tasks:
- Collect and Download System Backups
- Collect and Download Snapshots
Module 9: Batch Import of Security Environment Components
- Describe purpose of a batch import and give import use cases.
- Identify the basic workflow, guidelines, and best practices for a batch import.
Lab Tasks:
- Import and Create Host Objects
- Import and Create Network Objects
- Import and Create Group Objects
- Import and Create Access Control Rules