Group Training Request

    Your work email address

    Your employer

    Your mobile phone number

    Tell us what types of roles, how many people or what your team needs to learn.

    Layer 8 Training is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services and other content that may interest you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:

    I agree to receive other communications from Layer 8 Training, Inc.

    You can unsubscribe from these communications whenever you like. Please review our Privacy Policy for more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy.

    By clicking submit below, you would like to allow Layer 8 Training to store and process the personal information submitted above to provide you with the content you asked for.

      Class Info Request

      Your work email address

      Your employer

      Your mobile phone number

      Tell us what types of roles, how many people or what your team needs to learn.

      Layer 8 Training is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services and other content that may interest you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:

      I agree to receive other communications from Layer 8 Training, Inc.

      You can unsubscribe from these communications whenever you like. Please review our Privacy Policy for more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy.

      By clicking submit below, you would like to allow Layer 8 Training to store and process the personal information submitted above to provide you with the content you asked for.

      CPDA-R82 Check Point Deployment Administrator

      $2000 Duration: 2 Days

      • 12/01/2025 - 12/02/2025

        10:00 am ET - 6:00 pm ET

        Live Online | Open

        Price: $2000

        Request Info

        visit now
      • 12/15/2025 - 12/16/2025

        10:00 am ET - 6:00 pm ET

        Live Online | Open

        Price: $2000

        Request Info

        visit now
      • 01/19/2026 - 01/20/2026

        10:00 am ET - 6:00 pm ET

        Live Online | Open

        Price: $2000

        Request Info

        visit now
      • 03/09/2026 - 03/10/2026

        10:00 am ET - 6:00 pm ET

        Live Online | Open

        Price: $2000

        Request Info

        visit now
      Summary

      This course provides students with the fundamental knowledge, skills, and hands-on experience needed to deploy a new Quantum Security Environment.

      Key Skills
      When you complete this course, you will be able to:
      • Install and perform basic configuration of SmartConsole, the Gaia Operating System, a Security Management Server, and a Security Gateway
      • Create a basic policy.
      • Deploy a Security Gateway Cluster
      • Configure a Dedicated Log Server
      • Perform maintenance tasks including System Backups and Snapshots
      • Batch import Objects and Rules.
      Course Outline

      Module 1: Introduction to Quantum Security

      • Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.

      Module 2: Quantum Security Architecture

      • Identify key considerations when planning a new Quantum Security deployment.

      Lab Tasks:

      • Verify the Check Point Hosts
      • Document the Network Environment
      • Verify the A-GUI Client Host

      Module 3: Primary Security Management Server Deployment

      • Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.

      Lab Tasks:

      • Install the Gaia Operating System
      • Configure the Primary Security Management Server
      • Deploy SmartConsole

      Module 4: Security Gateway Deployment

      • Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.

      Lab Tasks:

      • Run the First Time Wizard on the Security Gateway
      • Create a Security Gateway Object
      • Test SIC and Install Licenses

      Module 5: Policy Fundamentals

      • Describe the essential elements of a Security Policy.
      • Identify features and capabilities that enhance the configuration and management of the Security Policy.

      Lab Tasks:

      • Create an Access Control Policy Package
      • Add and Modify a Rule in the Access Control Policy

      Module 6: Security Gateway Cluster Deployment

      • Identify the basic workflow, guidelines, and best practices for a Security Gateway Cluster deployment.

      Lab Tasks:

      • Reconfigure the Security Environment
      • Configure Cluster Members as Security Gateways
      • Configure Cluster Member Interfaces
      • Add Members to the Clusters
      • Add Licenses to the Cluster Members

      Module 7: Dedicated Log Server Deployment

      • Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.

      Lab Tasks:

      • Configure a dedicated Log Server
      • Add a dedicated Log Server

      Module 8: Maintenance Fundamentals

      • Explain the purpose of a regular maintenance strategy.
      • Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.

      Lab Tasks:

      • Collect and Download System Backups
      • Collect and Download Snapshots

      Module 9: Batch Import of Security Environment Components

      • Describe purpose of a batch import and give import use cases.
      • Identify the basic workflow, guidelines, and best practices for a batch import.

      Lab Tasks:

      • Import and Create Host Objects
      • Import and Create Network Objects
      • Import and Create Group Objects
      • Import and Create Access Control Rules
      Audience

      This course is recommended for Security Administrators, Security Consultants, Deployment Administrators, and Operators

      Certifications

      None