Check Point Certified Deployment Administrator (CPDA) – Outline

Detailed Course Outline

Module 1: Introduction to Quantum Security

  • Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.

Module 2: Quantum Security Architecture

  • Identify key considerations when planning a new Quantum Security deployment.

Lab Tasks:

  • Verify the Check Point Hosts
  • Document the Network Environment
  • Verify the A-GUI Client Host

Module 3: Primary Security Management Server Deployment

  • Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.

Lab Tasks:

  • Install the Gaia Operating System
  • Configure the Primary Security Management Server
  • Deploy SmartConsole

Module 4: Security Gateway Deployment

  • Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.

Lab Tasks:

  • Run the First Time Wizard on the Security Gateway
  • Create a Security Gateway Object
  • Test SIC and Install Licenses

Module 5: Policy Fundamentals

  • Describe the essential elements of a Security Policy.
  • Identify features and capabilities that enhance the configuration and management of the Security Policy.

Lab Tasks:

  • Create an Access Control Policy Package
  • Add and Modify a Rule in the Access Control Policy

Module 6: Security Gateway Cluster Deployment

  • Identify the basic workflow, guidelines, and best practices for a Security Gateway Cluster deployment.

Lab Tasks:

  • Reconfigure the Security Environment
  • Configure Cluster Members as Security Gateways
  • Configure Cluster Member Interfaces
  • Add Members to the Clusters
  • Add Licenses to the Cluster Members

Module 7: Dedicated Log Server Deployment

  • Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.

Lab Tasks:

  • Configure a dedicated Log Server
  • Add a dedicated Log Server

Module 8: Maintenance Fundamentals

  • Explain the purpose of a regular maintenance strategy.
  • Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.

Lab Tasks:

  • Collect and Download System Backups
  • Collect and Download Snapshots

Module 9: Batch Import of Security Environment Components

  • Describe purpose of a batch import and give import use cases.
  • Identify the basic workflow, guidelines, and best practices for a batch import.

Lab Tasks:

  • Import and Create Host Objects
  • Import and Create Network Objects
  • Import and Create Group Objects
  • Import and Create Access Control Rules