Check Point Deployment Administrator (CPDA) R82 (includes 180 days' lab access) [ARR_CKT_CPDA_R82]

Total time
Location
At location
Starting date and place

Check Point Deployment Administrator (CPDA) R82 (includes 180 days' lab access) [ARR_CKT_CPDA_R82]

Global Knowledge Network Training Ltd.
Logo Global Knowledge Network Training Ltd.
Provider rating: starstarstarstarstar_border 7.7 Global Knowledge Network Training Ltd. has an average rating of 7.7 (out of 3 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places
placeArrow ECS - Virtual
8 Jun 2026 until 9 Jun 2026
placeArrow ECS - Virtual
13 Jul 2026 until 14 Jul 2026
placeArrow ECS - Virtual
7 Sep 2026 until 8 Sep 2026
placeArrow ECS - Virtual
12 Oct 2026 until 13 Oct 2026
placeArrow ECS - Virtual
9 Nov 2026 until 10 Nov 2026
placeArrow ECS - Virtual
7 Dec 2026 until 8 Dec 2026
Description

OVERVIEW

This course provides students with the fundamental knowledge, skills, and hands-on experience needed to deploy a new Quantum Security Environment. 

Students learn how to install and perform basic configuration of SmartConsole, the Gaia Operating System, a Security Management Server, and a Security Gateway. 

Additionally, students learn how to create a basic policy, deploy a Security Gateway Cluster, configure a Dedicated Log Server, perform maintenance tasks including System Backups and Snapshots and batch import Objects and Rules.

Category | Quantum

AUDIENCE

• Deployment Administrators 

• Security Administrators 

• Security Consultants


NIST/NICE Work Role Categories 

• Implementat…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Check Point, Citrix, Administrative Management, CompTIA A+ / Network+ / Security+, and IT Security.

OVERVIEW

This course provides students with the fundamental knowledge, skills, and hands-on experience needed to deploy a new Quantum Security Environment. 

Students learn how to install and perform basic configuration of SmartConsole, the Gaia Operating System, a Security Management Server, and a Security Gateway. 

Additionally, students learn how to create a basic policy, deploy a Security Gateway Cluster, configure a Dedicated Log Server, perform maintenance tasks including System Backups and Snapshots and batch import Objects and Rules.

Category | Quantum

AUDIENCE

• Deployment Administrators 

• Security Administrators 

• Security Consultants


NIST/NICE Work Role Categories 

• Implementation and Operation (IO)


CERTIFICATION

This course does not have an accreditation or certification

NEXT STEP

Check Point CCSA R82

CONTENT

Module 1: Introduction to Quantum Security 

• Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment. 

Module 2: Quantum Security Architecture 

• Identify key considerations when planning a new Quantum Security deployment. 

Lab Tasks 

• Verify the Check Point Hosts 

• Document the Network Environment 

• Verify the A-GUI Client Host 

Module 3: Primary Security Management Server Deployment 

• Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment. 

Lab Tasks 

• Install the Gaia Operating System 

• Configure the Primary Security Management Server 

• Deploy SmartConsole 

Module 4: Security Gateway Deployment 

• Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment. 

Lab Tasks 

• Run the First Time Wizard on the Security Gateway 

• Create a Security Gateway Object 

• Test SIC and Install Licenses 

Module 5: Policy Fundamentals 

• Describe the essential elements of a Security Policy. 

• Identify features and capabilities that enhance the configuration and management of the Security Policy. 

Lab Tasks 

• Create an Access Control Policy Package 

• Add and Modify a Rule in the Access Control Policy


Module 6: Security Gateway Cluster Deployment 

• Identify the basic workflow, guidelines, and best practices for a Security Gateway Custer deployment. 

Lab Tasks 

• Reconfigure the Security Environment 

• Configure Cluster Members as Security Gateways 

• Configure Cluster Member Interfaces 

• Add Members to the Clusters 

• Add Licenses to the Cluster Members 

Module 7: Dedicated Log Server Deployment 

• Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment. 

Lab Tasks 

• Configure a dedicated Log Server 

• Add a dedicated Log Server 

Module 8: Maintenance Fundamentals 

• Explain the purpose of a regular maintenance strategy. 

• Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates. 

Lab Tasks 

• Collect and Download System Backups 

• Collect and Download Snapshots 

Module 9: Batch Import of Security Environment Components 

• Describe purpose of a batch import and give import use cases. 

• Identify the basic workflow, guidelines, and best practices for a batch import. 

Lab Tasks 

• Import and Create Host Objects 

• Import and Create Network Objects 

• Import and Create Group Objects 

• Import and Create Access Control Rules


There are no reviews yet.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.