Got a Question?     Call 1800-8892-877

Check Point Certified Automation Specialist (CCAS)

This two-day Specialist-level course is designed for security professionals who want to gain practical knowledge and skills to automate routine security operations within their security.

• Explain how automation and orchestration work together
• Understand the key drivers for incorporating automation and orchestration into security management
• Execute a shell script that demonstrates how to build a comprehensive Security Policy.
• Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks
• Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions
• Demonstrate how to define new objects and modify existing ones by using the Check Point API
• Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database
• Demonstrate how to use different methods to update the database with API commands
• Become familiar with client-side and server-side scripting and scripting languages

• Understand how to use the Bash shell to develop APIs
• Recognize and describe many of the open source tools that are available to assist with API development
• Demonstrate how to use a custom REST application to update the database of a Security Management Server
• Demonstrate how to use Postman to manage the Security Policy database through the Check Point API
• Understand what steps to take to troubleshoot and debug API scripts
• Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms
• Understand how to use self-service portal capabilities to provide general IT services
• Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals
• Demonstrate common tasks that are automated in a Web portal to manage the Security Policy

 

Show More

Virtual Classroom Live

Prerequisites

Working knowledge of: Unix-like and/or Windows operating systems Networking Fundamentals Networking Security TCP/IP Networking Bash Scripting vi Editor Check Point Training/Certification: Check Point Certified Security Administrator (CCSA) Check Point Certified Security Expert (CCSE) Other: Minimum of six months practical experience with Check Point security management.

Target Audience

  • Technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments.
What You’ll Learn
  • Explain how automation and orchestration work together
  • Understand the key drivers for incorporating automation and orchestration into security management
  • Execute a shell script that demonstrates how to build a comprehensive Security Policy.
  • Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks
  • Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions
  • Demonstrate how to define new objects and modify existing ones by using the Check Point API
  • Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database
  • Demonstrate how to use different methods to update the database with API commands
  • Become familiar with client-side and server-side scripting and scripting languages
  • Understand how to use the Bash shell to develop APIs
  • Recognize and describe many of the open source tools that are available to assist with API development
  • Demonstrate how to use a custom REST application to update the database of a Security Management Server
  • Demonstrate how to use Postman to manage the Security Policy database through the Check Point API
  • Understand what steps to take to troubleshoot and debug API scripts
  • Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms
  • Understand how to use self-service portal capabilities to provide general IT services
  • Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals
  • Demonstrate common tasks that are automated in a Web portal to manage the Security Policy
Course Outline
  • Identify security tasks and processes that are suitable for automation and orchestration.
  • Apply knowledge and skills of Check Point and third-party automation and orchestration technologies to streamline and improve security management consistency and efficiency.
  • Identify and use guidelines and best practices for automation and orchestration.

• Explain how automation and orchestration work together
• Understand the key drivers for incorporating automation and orchestration into security management
• Execute a shell script that demonstrates how to build a comprehensive Security Policy.
• Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks
• Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions
• Demonstrate how to define new objects and modify existing ones by using the Check Point API
• Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database
• Demonstrate how to use different methods to update the database with API commands
• Become familiar with client-side and server-side scripting and scripting languages

• Understand how to use the Bash shell to develop APIs
• Recognize and describe many of the open source tools that are available to assist with API development
• Demonstrate how to use a custom REST application to update the database of a Security Management Server
• Demonstrate how to use Postman to manage the Security Policy database through the Check Point API
• Understand what steps to take to troubleshoot and debug API scripts
• Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms
• Understand how to use self-service portal capabilities to provide general IT services
• Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals
• Demonstrate common tasks that are automated in a Web portal to manage the Security Policy