Let’s make it work for you 

Overview

This course introduces learners to the core concepts, capabilities, and administrative workflows required to configure, manage, and monitor a Check Point Quantum Security Environment. Participants develop practical skills using both the Gaia Portal and the Gaia Command Line Interface while gaining experience with Smart Console and the Check Point three-tier architecture. The course provides hands-on practice with object management, security policies, ordered and inline layers, HTTPS Inspection, Identity Awareness, Application Control and URL Filtering, and Autonomous Threat Prevention. Through guided labs and real-world exercises, learners build confidence in securing, optimising, and maintaining a Quantum deployment.

Read more +

Prerequisites

Participants should have knowledge of:

  • Unix-like and Windows operating systems
  • Internet fundamentals
  • Networking fundamentals
  • Network security principles
  • System administration
  • TCP/IP networking

Target audience

This course is designed for:

  • Security administrators
  • Security engineers
  • Security analysts
  • Security consultants
  • Security architects

The content also aligns to NIST/NICE work role categories for implementation and operation, and protection and defence.

Read more +

Learning objectives

By the end of this course, learners will be able to:

  • Describe the Check Point three-tier architecture and its role within a Quantum Security Environment.
  • Navigate the Gaia Portal, Gaia Command Line Interface, and core SmartConsole views.
  • Create and manage administrator accounts, profiles, and collaborative session controls.
  • Configure physical and logical objects within SmartConsole to support policy design.
  • Create, modify, and validate security policies aligned to organisational access requirements.
  • Implement and test ordered layers and inline layers to improve inspection accuracy.
  • Monitor system performance, logs, events, and platform state using SmartConsole and Gaia tools.
  • Configure Identity Awareness components and integrate user identity into policy rules.
  • Enable and tune HTTPS Inspection for encrypted traffic visibility.
  • Implement Application Control and URL Filtering to govern application and web access.
  • Enable and validate Autonomous Threat Prevention to elevate overall security posture.

Read more +

Course outline

Introduction to Quantum Security

  • Overview of the Check Point three-tier architecture
  • Interaction between management, log servers, and gateways
  • Navigating core SmartConsole views
  • Accessing and reviewing Gaia on management servers, log servers, and gateway clusters

Lab tasks

  • Explore Gaia on management, log servers, and gateways
  • Connect to SmartConsole
  • Navigate gateways and servers, security policies, logs and events, and manage and settings views

Administrator account management

  • Purpose of SmartConsole administrator accounts
  • Session management and concurrent administration capabilities
  • Assigning administrator profiles

Lab tasks

  • Create administrator accounts and assign profiles
  • Test administrator permissions and session controls
  • Manage concurrent sessions and take over another administrator session

Object management

  • Purpose and function of SmartConsole objects
  • Overview of physical and logical object types
  • Using objects to support policy operations

Lab tasks

  • View and modify gateway and server objects
  • View and modify network objects
  • View and modify service objects

Security policy management

  • Purpose of security policies
  • Core elements of a policy rule
  • Features that support efficient configuration and management

Lab tasks

  • Verify the security policy
  • Modify policy rules
  • Install the standard policy
  • Test rule outcomes

Policy layers

  • Concept and function of ordered policy layers
  • How layers affect traffic inspection
  • Creating inline layers such as DMZ layer

Lab tasks

  • Add an ordered layer
  • Configure and deploy ordered layer rules
  • Test the ordered layer policy
  • Create an inline DMZ layer and test outcomes

Security operations monitoring

  • Purpose of monitoring in Check Point environments
  • Log server configuration and tuning
  • Querying and filtering log data
  • Monitoring system states and blade status

Lab tasks

  • Configure log management settings
  • Enhance rulebase view and logging behaviours
  • Review logs and execute targeted searches
  • Configure the monitoring blade
  • Monitor system status

Identity awareness

  • Purpose and function of Identity Awareness
  • Core components and identity sources
  • Integrating identity into policy

Lab tasks

  • Adjust the security policy for identity awareness
  • Configure the identity collector
  • Define user access roles
  • Test identity-based access

HTTPS Inspection

  • Purpose of HTTPS Inspection
  • Essential components and configuration concepts

Lab tasks

  • Enable HTTPS Inspection
  • Adjust access control rules
  • Deploy the gateway certificate
  • Test and analyse policy behaviour with inspection enabled

Application control and URL filtering

  • Purpose of application and URL filtering
  • Core elements and configuration workflow

Lab tasks

  • Adjust the access control policy
  • Create and modify application and URL filtering rules
  • Test and refine rules

Threat prevention fundamentals

  • Purpose of Autonomous Threat Prevention
  • Key components of the threat prevention solution

Lab tasks

  • Enable Autonomous Threat Prevention
  • Test threat prevention outcomes

Exams and assessments
This course prepares learners for Exam 156-215.82. No formal assessment is included within the training delivery. Learners complete structured labs and knowledge checks throughout the course to reinforce understanding and practical competence.

Hands-on learning
The course includes extensive hands-on labs, guided configuration tasks, and real-world scenarios. Learners perform live configurations across Gaia, Smart Console, Identity Awareness, HTTPS Inspection, threat prevention, and policy management. Instructors support learners through troubleshooting and validation of each exercise.

Read more +

Why choose QA

Yellow
Need to know

Frequently asked questions

How can I create an account on myQA.com?

There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.

If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".

If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.

Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.

How do QA’s virtual classroom courses work?

Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.

We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.

How do QA’s online courses work?

QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course. When you book a QA online learning course you will receive immediate access to it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.

All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.

When will I receive my joining instructions?

Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.

When will I receive my certificate?

Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.

Let's talk

A member of the team will contact you within 4 working hours after submitting the form.

By submitting this form, you agree to QA processing your data in accordance with our Privacy Policy.