Course Objectives
Introduction to automation and orchestration Check Point APIs API development API troubleshooting Self-service Web portals
Who Should Attend?
This course is recommended for technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments.
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Lessons
- Explain how automation and orchestration work together
- Understand the key drivers for incorporating automation and orchestration into security management
- Execute a shell script that demonstrates how to build a comprehensive Security Policy.
- Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks
- Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions
- Demonstrate how to define new objects and modify existing ones by using the Check Point API
- Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database
- Demonstrate how to use different methods to update the database with API commands
- Become familiar with client-side and server-side scripting and scripting languages
- Understand how to use the Bash shell to develop APIs
- Recognize and describe many of the open source tools that are available to assist with API development
- Demonstrate how to use a custom REST application to update the database of a Security Management Server
- Demonstrate how to use Postman to manage the Security Policy database through the Check Point API
- Understand what steps to take to troubleshoot and debug API scripts
- Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms
- Understand how to use self-service portal capabilities to provide general IT services
- Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals
- Demonstrate common tasks that are automated in a Web portal to manage the Security Policy
2 - Lab Exercises
- Demonstrate Check Point automation and orchestration
- Manage objects using the Check Point API
- Create a management API shell script
- Use a variety of methods to execute API commands
- Use a custom REST tool for API calls
- Use Postman for API calls
- Debug the Check Point management API
- Automate tasks using a Check Point API enabled Web portal