Agenda CCSA:
Module 1: Introduction to Quantum Security
- Identify the primary components of the Check
Point Three-Tier Architecture and explain how they
work together in the Check Point environment.
Lab Tasks
Explore Gaia on the Security Management Server
Explore Gaia on the Dedicated Log Server
Explore Gaia on the Security Gateway Cluster Members
Connect to SmartConsole
Navigate GATEWAYS & SERVERS Views
Navigate SECURITY POLICIES Views
Navigate LOGS & EVENTS Views
Navigate MANAGE & SETTINGS Views
Module 2: Administrator Account Management
Explain the purpose of SmartConsole
administrator accounts.
- Identify useful features for administrator
collaboration, such as session management,
concurrent administration, and concurrent policy
installation.
Lab Tasks
Create New Administrators and Assign Profiles
Test Administrator Profile Assignments
Manage Concurrent Administrator Sessions
Take Over Another Session and Verify Session
Status
Module 3: Object Management
Explain the purpose of SmartConsole Objects.
Give examples of SmartConsole Physical and Logical
Objects.
Lab Task3
View and Modify GATEWAYS & SERVERS Objects
View and Modify Network Objects
View and Modify Service Objects
Module 4: Security Policy Management
Explain the purpose of Security Policies.
Identify the essential elements of a Security Policy.
Identify features and capabilities that enhance the
configuration and management of the Security Policy.
Lab Tasks
Verify the Security Policy
Modify Security Policies
Install the Standard Security Policy
Test the Security Policy
Module 5: Policy Layers
Demonstrate an understanding of the Check Point
policy layer concept.
- Explain how policy layers affect traffic inspection.
Lab Tasks
Add an Ordered Layer
Configure and Deploy the Ordered Layer Rules
Test the Ordered Layer Policy
Create an Inline DMZ Layer
Test the Inline DMZ Layer
Module 6: Security Operations Monitoring
Explain the purpose of Security Operations
Monitoring.
- Tune the Log Server configuration.
- Use predefined and custom queries to filter the
logging results.
- Monitor the state of Check Point systems.
Lab Tasks
Configure Log Management
Enhance Rulebase View, Rules, and Logging
Review Logs and Search for Data
Configure the Monitoring Blade
Monitor the Status of the Systems
Module 7: Identity Awareness
Explain the purpose of the Identity Awareness
solution.
- Identify the essential elements of Identity
Awareness.
Lab Tasks
Adjust the Security Policy for Identity Awareness
Configure the Identity Collector
Define the User Access Role
Test Identity Awareness
Module 8: HTTPS Inspection
Explain the purpose of the HTTPS Inspection
solution.
- Identify the essential elements of HTTPS
Inspection.
Lab Tasks
Enable HTTPS Inspection
Adjust Access Control Rules
Deploy the Security Gateway Certificate
Test and Analyze Policy with HTTPS Inspection
Module 9: Application Control and URL Filtering
Explain the purpose of the Application Control and
URL Filtering solutions.
- Identify the essential elements of Application
Control and URL Filtering.
Lab Tasks
Adjust the Access Control Policy
Create and Adjust Application Control and URL
Test and Adjust the Application Control and URL
Filtering Rules
Module 10: Threat Prevention Fundamentals
Explain the purpose of the Threat Prevention
solution.
- Identify the essential elements of Autonomous
Threat Prevention.
Lab Tasks
Enable Autonomous Threat Prevention
Test Autonomous Threat Prevention
Agenda CCTA:
Module 1: Introduction to Troubleshooting
Identify the principles of troubleshooting methodology.
Understand how to use the OSI (Open Systems
Interconnection) model for cause isolation.
- Identify resources available to troubleshoot Check Point
Security Gateways and Security Management Servers that
run on the Gaia operating system.
Lab Tasks
Analyze Resources and Performance
Analyze System Information with CPStat
Analyze Statistical Data with CPView
Collect CPInfo Output on the Security Management Server
Collect CPInfo Output on the Security Gateway
Analyze the CPInfo Output
Module 2: Traffic Monitoring Fundamentals
Describe the functions of packet captures.
Describe how logs and monitoring are used when
troubleshooting.
- Investigate and troubleshoot potential traffic flow issues.
- Monitor network activity and performance.
Lab Tasks
Analyze Logs
Trace Rules and Craft Policy
Test Policy and NAT Rules
Examine Routing and State Logging
Module 3: Packet Capture Fundamentals
Understand the impact of packet captures and packet
capture limitations.
- Understand the use and limitations of four tools that can be
used when capturing packets.
- Investigate and troubleshoot potential traffic flow issues
using packet captures.
- Monitor network activity and performance using packet
captures.
Lab Tasks
Capture Traffic with the FW Monitor Expression Filter
Capture Traffic with the FW Monitor Simple Filter
Capture Traffic with the tcpdump Utility
Capture Traffic with Check Point PCAP
Module 4: Packet Capture Analysis Using CLI
Identify command line output formats for tcpdump,
cppcap, fw monitor -e, and fw monitor -F.
- Identify cppcap flags and their impact on output
verbosity.
- Understand how CPMonitor can be used during packet
capture analysis.
- Analyze packet captures in CLI.
Lab Tasks
Create Issues
Troubleshoot Fundamental Traffic Issues
Troubleshoot Policy Configuration Issues
Troubleshoot Routing Issues
Troubleshoot NAT Issues
Restore the environment
Module 5: Packet Capture Analysis Using Wireshark
Understand Wireshark coloring rules and the
modifications you can make.
- Identify file saving methodology for captures being
analyzed in Wireshark.
- Analyze packet captures in Wireshark.
Lab Tasks
Configure Wireshark for use with Check Point
Save Packet Captures
Analyze FW Monitor Packet Captures in Wireshark
Analyze Interface Packet Captures in Wireshark
Module 6: Check Point Processes Troubleshooting Processes Troubleshooting
Demonstrate an understanding of user space, kernel
space, and Check Point User Space Firewall processes.
- Investigate and troubleshoot process issues.
Lab Tasks
Verify Process States
Analyze Process Connectivity
Module 7: SmartConsole Troubleshooting
Investigate and troubleshoot issues with Check Point
SmartConsole.
Lab Tasks
Activate the Bad Actor
Troubleshoot SmartConsole Login Issues
Restore the Environment
Module 8: Log Collection Troubleshooting
Troubleshoot log collection issues and interrupted
communications.
Lab Tasks
Activate the Bad Actor
Troubleshoot Gateway Log Connectivity
Troubleshoot the Security Management Server Log Collection
Restore the Environment
Module 9: Identity Awareness Troubleshooting
Identify and use the appropriate troubleshooting
commands/tools to resolve advanced Identity
Awareness issues.
Lab Tasks
Activate the Bad Actor
Troubleshoot Identity Awareness
Restore the Environment
Module 10: Application Control and URL Filtering Troubleshooting
Investigate and troubleshoot Application Control and
URL Filtering issues.
Lab Tasks
Activate the Bad Actor
Troubleshoot URL Filtering
Restore the Environment