Arrow Electronics, Inc.

Check Point Certified Automation Specialist (CCAS) R81.20

CODE: CKT_CCAS_R81.20

LENGTH: 16 Hours (2 days)

PRICE: Free

Description

Gain the knowledge and skills to effectively implement automation and orchestration technologies in a Check Point security environment.

 

Objectives

• Define and explain the benefits of automation and orchestration.

• Discuss technologies used for automation and orchestration, such as scripts and APIs.

• Discuss the basic components of the Check Point API infrastructure and how these components interact to provide security automation and orchestration.

• Given a scenario, prepare the Check Point environment for API operations.

• Describe the basic workflow for Management API command usage.

• Identify the supported automation tools for Management API commands.

• Given a scenario, use the appropriate automation tool to run Management API commands.

• Describe the basic workflow for Gaia API command usage.

• Identify the supported automation tools for Gaia API commands.

• Given a scenario, use the appropriate automation tool to run Gaia API commands.

• List best practices and guidelines for Management and Gaia APIs.

• Identify the benefits of using the JSON argument (--format json) with Management API commands.

• Give examples of how to use the jq utility to filter Management API output.

• Identify the prerequisites for using Postman for Check Point Web API calls.

• Describe the basic workflow for using Postman to send Check Point Web API calls.

• Given a scenario, configure and use Postman to send Web API commands.

Audience

This course is designed for Security Professionals who want to gain practical knowledge and skills using automation and orchestration technologies to streamline and improve Check Point security management and operations.

Prerequisites

Working knowledge of Unix-like and/or Windows operating systems, networking fundamentals, networking security, TCP/IP networking, Bash scripting, and vi editor.

Other prerequisites that are strongly encouraged include knowledge of Check Point security (CCSA and CCSE) and a minimum of six months practical experience with Check Point security solutions.

Programme

Topics:

  1. Introduction to Check Point APIs
  2. Management API
  3. Introduction to Automation and Orchestration
  4. Gaia API
  5. JSON and jq
  6. Postman
  7. Best Practices and Guidelines

Exercises:

• Use scripts to deploy a Security Management Server.

• Deploy a Security Gateway using the Blink utility.

• Use best practices to prepare the security environment for API usage.

• Use internal and external tools to automate object and policy creation and modification.

• Automate the creation and installation of the security policy.

• Automate the connection of the Security Gateway.

• Automate adjustments to Check Point Server Configuration with the Gaia API.

• Use the Management API and the Gaia API to add resources, modify object settings, and perform maintenance tasks.

• Use JSON scripts and jq to view objects and monitor performance.

Follow on courses

Attend two Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master (CCSM).

Attend four Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master Elite (CCSM Elite).

Choose from the following Infinity Specialization courses:

  • Check Point Certified Troubleshooting Administrator (CCTA)
  • Check Point Certified Harmony Endpoint Specialist (CCES)
  • Check Point Certified Cloud Specialist (CCCS)
  • Check Point Certified MDSM Specialist (CCMS)
  • Check Point Certified VSX Specialist (CCVS)
  • Check Point Certified Troubleshooting Expert (CCTE)
  • Check Point Certified Maestro Expert (CCME)
  • Check Point Certified Cloud Network Security Expert for AWS (CNSE-AWS)
  • Check Point Certified Cloud Network Security Expert for Azure (CNSE-AZURE)

Test and Certification

This course prepares you for exam #156-520 at

www.VUE.com/checkpoint 

Full information on Check Point’s Certification Program can be viewed at:

https://www.checkpoint.com/downloads/training/check-point-certification-faq.pdf 

Further Information

Please note that Check Point only offer e-kit courseware for training courses. Each delegate will be provided with an official set of e-kit courseware approximately 1 week prior to the start date of the course.

Session Dates