fbpx

Check Point Certified Automation Specialist (CCAS)

This two-day Specialist-level course is designed for security professionals who want to gain practical knowledge and skills to automate routine security operations within their security.

No events to show

  • 20
    May
    2 days, Mon & Tue 12:00 PM – 7:00 PM
    Virtual - GST
    Session information
    Sessions
    Session 1
    Mon 20 May 12:00 - Mon 20 May 19:00
    Virtual - GST
    Session 2
    Tue 21 May 12:00 - Tue 21 May 19:00
    Virtual - GST
    • €2,249.00 excl.
  • 18
    Jul
    2 days, Thu & Fri 9:00 AM – 5:00 PM
    Virtual - CET
    Session information
    Sessions
    Session 1
    Thu 18 Jul 09:00 - Thu 18 Jul 17:00
    Virtual - CET
    Session 2
    Fri 19 Jul 09:00 - Fri 19 Jul 17:00
    Virtual - CET
    • €2,249.00 excl.

Description

Course Overview

This certification is designed for security professionals who want to gain expertise in automating security operations and deploying security policies across their organisation. It also provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies.

View Course Outline

Objectives

  • Explain how automation and orchestration work together.
  • Understand the key drivers for incorporating automation and orchestration into security management.
  • Execute a shell script that demonstrates how to build a comprehensive Security Policy.
  • Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks.
  • Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions.
  • Demonstrate how to define new objects and modify existing ones by using the Check Point API
  • Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database.
  • Demonstrate how to use different methods to update the database with API commands.
  • Become familiar with client-side and server-side scripting and scripting languages.
  • Understand how to use the Bash shell to develop APIs.
  • Recognize and describe many of the open-source tools that are available to assist with API development.
  • Demonstrate how to use a custom REST application to update the database of a Security Management Server
  • Demonstrate how to use Postman to manage the Security Policy database through the Check Point API
  • Understand what steps to take to troubleshoot and debug API scripts.
  • Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms.
  • Understand how to use self-service portal capabilities to provide general IT services.
  • Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals.
  • Demonstrate common tasks that are automated in a Web portal to manage the Security Policy.

Who Should Attend?

This course is designed for security engineers, developers, and Check Point resellers who need to create and execute automated scripts to perform routine tasks within their security environment and are working towards their Check Point Certified Automation.

What You'll Learn

Provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies.

COURSE TOPICS:

  • Introduction to automation and orchestration
  • Check Point APIs
  • API development
  • API troubleshooting
  • Self-service Web portals

Prerequisites

  • UNIX and Windows operating systems
  • System Administration
  • Networking (TCP/IP)

Related Certifications:

This advanced two-day specialist course validates the skills and knowledge of IT professionals in deploying and managing Check Point security solutions. This certification is designed for security professionals who want to gain expertise in automating security operations and deploying security policies across their organisation. The focus on automation and orchestration makes it an essential certification for security professionals who want to advance their careers in cybersecurity.

Attending Check Point Training Courses, helps you reach your certification goals and ensures that you know every detail about Check Point Technologies. Here at Red Education, we cover all Check Point’s training courses. To Learn more, head to our course outline page.

Translate »