Skip to main Content

Check Point Certified Automation Specialist (CCAS) R81.20 (includes 1 month's lab access)

  • Course Code CKT_CCAS_R81_20
  • Duration 2 days

Public Classroom Price

£1,595.00

excl. VAT

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Company Event

    Event at company

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview

Top

Gain the knowledge and skills to effectively implement automation and orchestration technologies in a Check Point security environment.

Course Schedule

Top
    • Delivery Format: Virtual Learning
    • Date: 02-03 February, 2026 | 9:00 AM to 5:00 PM
    • Location: Virtual (GMT Standa)
    • Language: English

    £1,595.00

    • Delivery Format: Virtual Learning
    • Date: 16-17 March, 2026 | 9:00 AM to 5:00 PM
    • Location: Virtual (GMT Standa)
    • Language: English

    £1,595.00

    • Delivery Format: Virtual Learning
    • Date: 16-17 April, 2026 | 9:00 AM to 5:00 PM
    • Location: Virtual (GMT Standa)
    • Language: English

    £1,595.00

    • Delivery Format: Virtual Learning
    • Date: 18-19 May, 2026 | 9:00 AM to 5:00 PM
    • Location: Virtual (GMT Standa)
    • Language: English

    £1,595.00

    • Delivery Format: Virtual Learning
    • Date: 18-19 June, 2026 | 9:00 AM to 5:00 PM
    • Location: Virtual (GMT Standa)
    • Language: English

    £1,595.00

    • Delivery Format: Virtual Learning
    • Date: 15-16 July, 2026 | 9:00 AM to 5:00 PM
    • Location: Virtual (GMT Standa)
    • Language: English

    £1,595.00

Target Audience

Top

This Specialist-level course is designed for Security Professionals who want to gain practical knowledge and skills using automation and orchestration technologies to streamline and improve Check Point security management and operations.

Course Objectives

Top

• Define and explain the benefits of automation and orchestration.

• Discuss technologies used for automation and orchestration, such as scripts and APIs.

• Discuss the basic components of the Check Point API infrastructure and how these components interact to provide security automation and orchestration.

• Given a scenario, prepare the Check Point environment for API operations.

• Describe the basic workflow for Management API command usage.

• Identify the supported automation tools for Management API commands.

• Given a scenario, use the appropriate automation tool to run Management API commands.

• Describe the basic workflow for Gaia API command usage.

• Identify the supported automation tools for Gaia API commands.

• Given a scenario, use the appropriate automation tool to run Gaia API commands.

• List best practices and guidelines for Management and Gaia APIs.

• Identify the benefits of using the JSON argument (--format json) with Management API commands.

• Give examples of how to use the jq utility to filter Management API output.

• Identify the prerequisites for using Postman for Check Point Web API calls.

• Describe the basic workflow for using Postman to send Check Point Web API calls.

• Given a scenario, configure and use Postman to send Web API commands.

Course Content

Top

• Introduction to automation and orchestration  

• Introduction to Check Point APIs 

• Management API

• Gaia API

• Best practices and guidelines

• JSON and jq

• Postman

Exercises:

• Use scripts to deploy a Security Management Server.

• Deploy a Security Gateway using the Blink utility.

• Use best practices to prepare the security environment for API usage.

• Use internal and external tools to automate object and policy creation and modification.

• Automate the creation and installation of the security policy.

• Automate the connection of the Security Gateway.

• Automate adjustments to Check Point Server Configuration with the Gaia API.

• Use the Management API and the Gaia API to add resources,modify object settings, and perform maintenance tasks.

• Use JSON scripts and jq to view objects and monitor performance.


Course Prerequisites

Top

• Working knowledge of Unix-like and/or Windows operating systems, networking fundamentals, networking security, TCP/IP networking, Bash scripting, and vi editor. 

• Other prerequisites that are strongly encouraged include knowledge of Check Point security (CCSA and CCSE) and a minimum of six months practical experience with Check Point security solutions.

Test Certification

Top

Prepare for exams #156-521 at www.VUE.com/checkpoint

Exam vouchers are available at an additional cost - please ask for details.

Full information on Check Point’s Certification Program can be viewed at https://www.checkpoint.com/downloads/training/check-point-certification-faq.pdf

Follow on Courses

Top

Attend two Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master (CCSM).

Attend four Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master Elite (CCSM Elite).

• Check Point Certified Endpoint Specialist (CCES)

• Check Point Certified Troubleshooting Administrator (CCTA)

• Check Point Certified Cloud Specialist (CCCS)

• Check Point Certified MDSM Specialist (CCMS) 

• Check Point Certified VSX Specialist (CCVS)

• Check Point Certified Troubleshooting Expert (CCTE)

• Check Point Certified Maestro Expert (CCME)

• Check Point Certified Cloud Network Security Expert for AWS (CNSE-AWS) 

• Check Point Certified Cloud Network Security Expert for Azure (CNSE-AZURE)

Further Information

Top

Please note that Check Point only offer e-kit courseware for training courses. Each delegate will be provided with an official set of e-kit courseware.