- Overview
- Prerequisites
- Schedules
- Objectives
- Why ProbotLearning
- Curriculum
CCAS Check Point Certified Automation Specialist Training
CCAS Check Point Certified Automation Specialist Training course provides you with extensive learning of automation and Checkpoints Management API architecture
Category : Checkpoint
Course Price : $2595 Per Participant
Course Details
- Certification: YES
- Skill Level: Intermediate
- Enrolled: 1581
- Duration: 5 Days
500+
Courses
20+
Years of Experience
95k+
Global Learners
Course Description
CCAS Check Point Certified Automation Specialist Training course provides you with extensive learning of automation and Checkpoints Management API architecture.
Microtek Learning certified tutors can give you a classroom learning atmosphere virtually, and you can also interact with them for any queries or discussions.
Aspirants from IT or technical backgrounds can preferably opt for this training module who automate, orchestrate or troubleshoot Check Points and security environments.
Professionals that need a Check Point CCSA Certification are best suitable for this course.
This course includes an introduction to automation and orchestration, API Development, Check Point APIs, API troubleshooting, and self-service web portals.
Our goal of offering this technical training is to help you organize and automate the orchestrated tasks relevant to the management of Check Point Security Policies.
We also impart a top-notch Enterprise Training experience if you want to upgrade the skill set from any organization.
Pursuing training from professionals allows a better concentration and skill set that can be applied to further certifications or advanced courses.
What You Learn at Probot Learning:
- Explain how automation and orchestration work together
- Execute a shell script that demonstrates how to build a comprehensive Security Policy.
- Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions
- Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database
- Become familiar with client-side and server-side scripting and scripting languages
- Recognize and describe many of the open source tools that are available to assist with API development
- Demonstrate how to use Postman to manage the Security Policy database through the Check Point API
- Understand the key drivers for incorporating automation and orchestration into security management
- Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks
- Demonstrate how to define new objects and modify existing ones by using the Check Point API
- Demonstrate how to use different methods to update the database with API commands
- Understand how to use the Bash shell to develop APIs
- Demonstrate how to use a custom REST application to update the database of a Security Management Server
- Understand what steps to take to troubleshoot and debug API scripts
Prerequisites
Prior to taking this course, it is recommended that learners possess the following:
- Check Point CCSA Certification
Who should attend this course?
- This course is recommended for technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments.
What You Receive at Probot Learning:
Certified Instructor-led training
Industry Best Trainers
Official Training Course Student Handbook
Pre and Post assessments/evaluations
Collaboration with classmates (not available for a self-paced course)
Real-world knowledge activities and scenarios
Exam scheduling support*
Learn and earn program*
Practice Tests
Knowledge acquisition and exam-oriented
Learning Modules
Modules
- Introduction to automation and orchestration
- Check Point APIs
- API development
- API troubleshooting
- Self-service Web portals
Lab Exercises:
- Demonstrate Check Point automation and orchestration
- Manage objects using the Check Point API
- Create a management API shell script
- Use a variety of methods to execute API commands
- Use a custom REST tool for API calls
- Use Postman for API calls
- Debug the Check Point management API
- Automate tasks using a Check Point API enabled Web portal
This Certified Ethical Hacker Certification is valid for three years staring from the certification date. You must renew your certification before expiry date.