Takaisin

Check Point Automation Specialist (CCAS) R80.20

The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies.

This course is for technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments. Prerequisite for this course is CCSA certification.

COURSE OBJECTIVES
- Explain how automation and orchestration work together
- Understand the key drivers for incorporating automation and orchestration into security management
- Execute a shell script that demonstrates how to build a comprehensive Security Policy.
- Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks
- Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions
- Demonstrate how to define new objects and modify existing ones by using the Check Point API
- Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database
- Demonstrate how to use different methods to update the database with API commands
- Become familiar with client-side and server-side scripting and scripting languages
- Understand how to use the Bash shell to develop APIs
- Recognize and describe many of the open source tools that are available to assist with API development
- Demonstrate how to use a custom REST application to update the database of a Security Management Server
- Demonstrate how to use Postman to manage the Security Policy database through the Check Point API
- Understand what steps to take to troubleshoot and debug API scripts
- Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms
- Understand how to use self-service portal capabilities to provide general IT services
- Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals
- Demonstrate common tasks that are automated in a Web portal to manage the Security Policy

COURSE TOPICS
- Introduction to automation and orchestration
- Check Point APIs
- API development
- API troubleshooting
- Self-service Web portals

LAB EXERCISES
- Demonstrate Check Point automation and orchestration
- Manage objects using the Check Point API
- Create a management API shell script
- Use a variety of methods to execute API commands
- Use a custom REST tool for API calls
- Use Postman for API calls
- Debug the Check Point management API
- Automate tasks using a Check Point API enabled Web portal

ArrowECS

ArrowECS vastaa kurssin järjestämisestä.

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.