CNSE-AZURE: Cloud Network Security Expert for Azure

*Looking for flexible schedule (after hours or weekend)? Please call or email us: 858-208-4141 or sales@ccslearningacademy.com.

Student financing options are available.
Looking for group training? Contact Us
Category:

Download PDF of Course Details

Course Description:

Learn advanced concepts and develop skills needed to design and administer CloudGuard Network Security Environments.

Format

Instructor-Led

Topic

Vendor

Check Point

Course Objectives

  • Discuss Azure Platform Components and their relationship to Check Point CloudGuard Network Security.
  • Explain how to maintain a secure, efficient, and stable cloud environment.
  • Describe the components and constraints of a hub and spoke cloud security environment.
  • Describe the function of the Cloud Management Extension
  • Explain the purpose of identity and access controls and constraints in different cloud platforms.
  • Explain the steps required to configure Identity and Access controls in Azure.
  • Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
  • Explain how to design and configure Cloud Adaptive Policies.
  • Discuss the purpose and function of Data Center Objects.
  • Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployment.
  • Explain how CSP templates can be used for maintenance tasks in the cloud environment.
  • Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
  • Discuss Scaling Solutions and Options for Cloud Environments.
  • Explain the Scaling Options in Azure.
  • Describe the workflow for configuring scaling solutions in Azure.
  • Discuss how ClusterXL operates and what elements work together to permit traffic failover.
  • Explain how ClusterXL functions differently in a Cloud Environment.
  • Describe how clusters are created and function in Azure.
  • Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
  • Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
  • Describe the components and constraint involved in deploying a Disaster
  • Recovery Site in the cloud.
  • Discuss the steps required for troubleshooting automation in Azure.
  • Explain the steps required for troubleshooting Scaling Solution issues in Azure.
  • Describe the steps required for troubleshooting clusters in Azure.

What You'll learn

  • Discuss Azure Platform Components and their relationship to Check Point CloudGuard Network Security.
  • Explain how to maintain a secure, efficient, and stable cloud environment.
  • Describe the components and constraints of a hub and spoke cloud security environment.
  • Describe the function of the Cloud Management Extension
  • Explain the purpose of identity and access controls and constraints in different cloud platforms.
  • Explain the steps required to configure Identity and Access controls in Azure.
  • Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
  • Explain how to design and configure Cloud Adaptive Policies.
  • Discuss the purpose and function of Data Center Objects.
  • Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployment.
  • Explain how CSP templates can be used for maintenance tasks in the cloud environment.
  • Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
  • Discuss Scaling Solutions and Options for Cloud Environments.
  • Explain the Scaling Options in Azure.
  • Describe the workflow for configuring scaling solutions in Azure.
  • Discuss how ClusterXL operates and what elements work together to permit traffic failover.
  • Explain how ClusterXL functions differently in a Cloud Environment.
  • Describe how clusters are created and function in Azure.
  • Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
  • Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
  • Describe the components and constraint involved in deploying a Disaster
  • Recovery Site in the cloud.
  • Discuss the steps required for troubleshooting automation in Azure.
  • Explain the steps required for troubleshooting Scaling Solution issues in Azure.
  • Describe the steps required for troubleshooting clusters in Azure.

Target Audience

This course is recommended for cloud architects, security experts, and network administrators requiring in depth knowledge on CloudGuard Network Security products.

Lab Exercise

  • Deploy a Security Management Server
  • Connect to SmartConsole
  • Configure Azure Active Directory and the Service Principle
  • Install the Cloud Management Extension
  • Configure the Cloud Management Extension
  • Configure the Access Control Policy
  • Assign the Service Principle
  • Create the CloudGuard Controller Object
  • Configure Access Control Policy with a Data Center Object
  • Deploy the Spoke vNets
  • Create the Spoke Route Table
  • Deploy Web Servers into the Spoke vNets
  • Deploy the Virtual Machine Scale Set
  • Assign the Service Principle to the VMSS Resource Group
  • Enable Indentity Awareness on the VMSS
  • Create Load Balancer Rules
  • Create vNet Peers
  • Create Web Server Access Control policy
  • Deploy the Azure High Availability Solution
  • Create the Cluster Object
  • Configure the vNet Peering
  • Create the Internal User Defined Routes
  • Create the Security Policy for Internal Traffic
  • Test the Internal Traffic
  • Troubleshoot the CloudGuard Controller
  • Debugs the CloudGuard Controller
  • Debug the Cloud Management Extension

Prerequisites

Prior to taking this course, it is recommended that learners possess the following:

  • Working knowledge of Unix and Windows operating systems
  • Certificate management
  • Security administration
  • Networking
  • Completed CCCS Training or Certification
  • Completed CCSE Training or Certification

Inclusions

With CCS Learning Academy, you’ll receive:

  • 2 Day Certified Instructor-led training
  • Official Training Seminar Student Handbook
  • Collaboration with classmates (not currently available for self-paced course)
  • Real-world learning activities and scenarios
  • Exam scheduling support*
  • Enjoy job placement assistance for the first 12 months after course completion.
  • This course is eligible for CCS Learning Academy’s Learn and Earn Program: get a tuition fee refund of up to 50% if you are placed in a job through CCS Global Tech’s Placement Division*
  • Government and Private pricing available.*

*For more details call: 858-208-4141 or email: training@ccslearningacademy.com; sales@ccslearningacademy.com

 

Shopping Cart
en_USEnglish