fbpx

Check Point Certified Automation Specialist (CCAS)

This two-day Specialist-level course is designed for security professionals who want to gain practical knowledge and skills to automate routine security operations within their security.

Register your interest in this course here
Register your interest now

  • 20
    May
    2 days, Mon & Tue 9:00 AM – 5:00 PM
    Virtual - AUS
    Session information
    Sessions
    Session 1
    Mon 20 May 09:00 - Mon 20 May 17:00
    Virtual - AUS
    Session 2
    Tue 21 May 09:00 - Tue 21 May 17:00
    Virtual - AUS
    • $2,500.00 excl. GST
  • 22
    Jul
    2 days, Mon & Tue 9:00 AM – 5:00 PM
    Virtual - AUS
    Session information
    Sessions
    Session 1
    Mon 22 Jul 09:00 - Mon 22 Jul 17:00
    Virtual - AUS
    Session 2
    Tue 23 Jul 09:00 - Tue 23 Jul 17:00
    Virtual - AUS
    • $2,500.00 excl. GST
  • 18
    Sep
    2 days, Wed & Thu 9:00 AM - 5:00 PM
    Virtual - AUS
    Session information
    Sessions
    Session 1
    Wed 18 Sep 09:00 - Wed 18 Sep 17:00
    Virtual - AUS
    Session 2
    Thu 19 Sep 09:00 - Thu 19 Sep 17:00
    Virtual - AUS
    • $2,500.00 excl. GST
  • 18
    Nov
    2 days, Mon & Tue 9:00 AM - 5:00 PM
    Virtual - AUS
    Session information
    Sessions
    Session 1
    Mon 18 Nov 09:00 - Mon 18 Nov 17:00
    Virtual - AUS
    Session 2
    Tue 19 Nov 09:00 - Tue 19 Nov 17:00
    Virtual - AUS
    • $2,500.00 excl. GST

Description

Course Overview

This certification is designed for security professionals who want to gain expertise in automating security operations and deploying security policies across their organisation. It also provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies.

View Course Outline

Objectives

  • Define and explain the benefits of automation and orchestration.

  •  Discuss technologies used for automation and orchestration, such as scripts and APIs.

  • Discuss the basic components of the Check Point API infrastructure and how these components interact to provide security automation and orchestration.

  • Given a scenario, prepare the Check Point environment for API operations.

  • Describe the basic workflow for Management API command usage.

  • Identify the supported automation tools for Management API commands.

  • Given a scenario, use the appropriate automation tool to run Management API commands.

  • Describe the basic workflow for Gaia API command usage.

  • Identify the supported automation tools for Gaia API commands. 

  • Given a scenario, use the appropriate automation tool to run Gaia API commands.

  • List best practices and guidelines for Management and Gaia APIs.

  • Identify the benefits of using the JSON argument (--format json) with Management API commands.

  • Give examples of how to use the jq utility to filter Management API output.

  • Identify the prerequisites for using Postman for Check Point Web API calls.

  • Describe the basic workflow for using Postman to send Check Point Web API calls.

  • Given a scenario, configure and use Postman to send Web API commands.

Who Should Attend?

This course is designed for security engineers, developers, and Check Point resellers who need to create and execute automated scripts to perform routine tasks within their security environment and are working towards their Check Point Certified Automation.

What You'll Learn

Provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies.

COURSE TOPICS:

  • Introduction to automation and orchestration
  • Check Point APIs
  • API development
  • API troubleshooting
  • Self-service Web portals

Prerequisites

  • UNIX and Windows operating systems
  • System Administration
  • Networking (TCP/IP)

Related Certifications:

This advanced two-day specialist course validates the skills and knowledge of IT professionals in deploying and managing Check Point security solutions. This certification is designed for security professionals who want to gain expertise in automating security operations and deploying security policies across their organisation. The focus on automation and orchestration makes it an essential certification for security professionals who want to advance their careers in cybersecurity.

Attending Check Point Training Courses, helps you reach your certification goals and ensures that you know every detail about Check Point Technologies. Here at Red Education, we cover all Check Point’s training courses. To Learn more, head to our course outline page.

Translate »