<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="36264" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/checkpoint-cpda" lastchanged="2026-01-12T11:59:12+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Check Point Deployment Administrator</title><productcode>CPDA</productcode><vendorcode>CP</vendorcode><vendorname>Check Point</vendorname><fullproductcode>CP-CPDA</fullproductcode><version>R82</version><essentials>&lt;p&gt;Base Knowledge 
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Unix-like and/or Windows OS&lt;/li&gt;&lt;li&gt;Internet Fundamentals&lt;/li&gt;&lt;li&gt;Networking Fundamentals&lt;/li&gt;&lt;li&gt;Networking Security&lt;/li&gt;&lt;li&gt;System Administration&lt;/li&gt;&lt;li&gt;TCP/IP Networking&lt;/li&gt;&lt;li&gt;Text Editors in Unix-like OS&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;ul&gt;
&lt;li&gt;Deployment Administrators&lt;/li&gt;&lt;li&gt;Security Administrators&lt;/li&gt;&lt;li&gt;Security Consultants&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;h4&gt;&lt;strong&gt;Module 1: Introduction to Quantum Security&lt;/strong&gt;&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 2: Quantum Security Architecture&lt;/strong&gt;&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Identify key considerations when planning a new Quantum Security deployment.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Verify the Check Point Hosts&lt;/li&gt;&lt;li&gt;Document the Network Environment&lt;/li&gt;&lt;li&gt;Verify the A-GUI Client Host&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 3: Primary Security Management Server Deployment&lt;/strong&gt;&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Install the Gaia Operating System&lt;/li&gt;&lt;li&gt;Configure the Primary Security Management Server&lt;/li&gt;&lt;li&gt;Deploy SmartConsole&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 4: Security Gateway Deployment&lt;/strong&gt;&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Run the First Time Wizard on the Security Gateway&lt;/li&gt;&lt;li&gt;Create a Security Gateway Object&lt;/li&gt;&lt;li&gt;Test SIC and Install Licenses&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Module 5: Policy Fundamentals&lt;/strong&gt;&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Describe the essential elements of a Security Policy.&lt;/li&gt;&lt;li&gt;Identify features and capabilities that enhance the configuration and management of the Security Policy.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Create an Access Control Policy Package&lt;/li&gt;&lt;li&gt;Add and Modify a Rule in the Access Control Policy&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 6: Security Gateway Cluster Deployment&lt;/strong&gt;&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Identify the basic workflow, guidelines, and best practices for a Security Gateway Cluster deployment.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Reconfigure the Security Environment&lt;/li&gt;&lt;li&gt;Configure Cluster Members as Security Gateways&lt;/li&gt;&lt;li&gt;Configure Cluster Member Interfaces&lt;/li&gt;&lt;li&gt;Add Members to the Clusters&lt;/li&gt;&lt;li&gt;Add Licenses to the Cluster Members&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Module 7: Dedicated Log Server Deployment&lt;/strong&gt;&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Configure a dedicated Log Server&lt;/li&gt;&lt;li&gt;Add a dedicated Log Server&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 8: Maintenance Fundamentals&lt;/strong&gt;&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Explain the purpose of a regular maintenance strategy.&lt;/li&gt;&lt;li&gt;Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Collect and Download System Backups&lt;/li&gt;&lt;li&gt;Collect and Download Snapshots&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;&lt;strong&gt;Module 9: Batch Import of Security Environment Components&lt;/strong&gt;&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Describe purpose of a batch import and give import use cases.&lt;/li&gt;&lt;li&gt;Identify the basic workflow, guidelines, and best practices for a batch import.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab Tasks:&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Import and Create Host Objects&lt;/li&gt;&lt;li&gt;Import and Create Network Objects&lt;/li&gt;&lt;li&gt;Import and Create Group Objects&lt;/li&gt;&lt;li&gt;Import and Create Access Control Rules&lt;/li&gt;&lt;/ul&gt;</outline><essentials_plain>Base Knowledge 



- Unix-like and/or Windows OS
- Internet Fundamentals
- Networking Fundamentals
- Networking Security
- System Administration
- TCP/IP Networking
- Text Editors in Unix-like OS</essentials_plain><audience_plain>- Deployment Administrators
- Security Administrators
- Security Consultants</audience_plain><outline_plain>Module 1: Introduction to Quantum Security


- Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
Module 2: Quantum Security Architecture


- Identify key considerations when planning a new Quantum Security deployment.

Lab Tasks:



- Verify the Check Point Hosts
- Document the Network Environment
- Verify the A-GUI Client Host
Module 3: Primary Security Management Server Deployment


- Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.

Lab Tasks:



- Install the Gaia Operating System
- Configure the Primary Security Management Server
- Deploy SmartConsole
Module 4: Security Gateway Deployment


- Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.

Lab Tasks:



- Run the First Time Wizard on the Security Gateway
- Create a Security Gateway Object
- Test SIC and Install Licenses

Module 5: Policy Fundamentals


- Describe the essential elements of a Security Policy.
- Identify features and capabilities that enhance the configuration and management of the Security Policy.

Lab Tasks:



- Create an Access Control Policy Package
- Add and Modify a Rule in the Access Control Policy
Module 6: Security Gateway Cluster Deployment


- Identify the basic workflow, guidelines, and best practices for a Security Gateway Cluster deployment.

Lab Tasks:



- Reconfigure the Security Environment
- Configure Cluster Members as Security Gateways
- Configure Cluster Member Interfaces
- Add Members to the Clusters
- Add Licenses to the Cluster Members

Module 7: Dedicated Log Server Deployment


- Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.

Lab Tasks:



- Configure a dedicated Log Server
- Add a dedicated Log Server
Module 8: Maintenance Fundamentals


- Explain the purpose of a regular maintenance strategy.
- Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.

Lab Tasks:



- Collect and Download System Backups
- Collect and Download Snapshots
Module 9: Batch Import of Security Environment Components


- Describe purpose of a batch import and give import use cases.
- Identify the basic workflow, guidelines, and best practices for a batch import.

Lab Tasks:



- Import and Create Host Objects
- Import and Create Network Objects
- Import and Create Group Objects
- Import and Create Access Control Rules</outline_plain><duration unit="d" days="2">2 jours</duration><pricelist><price country="DE" currency="EUR">1990.00</price><price country="GB" currency="GBP">1600.00</price></pricelist><miles/></course>