This two-day course for specialists provides a comprehensive knowledge of the Check Point Endpoint Security solution and its deployment in a corporate network environment. Learn the fundamental concepts and develop the skills needed to [...]
  • CCESR
  • Duration 2 days
  • 0 ITK points
  • 1 term
  • Praha (25 500 Kč)

    Brno (on request)

    Bratislava (1 109 €)

This two-day course for specialists provides a comprehensive knowledge of the Check Point Endpoint Security solution and its deployment in a corporate network environment. Learn the fundamental concepts and develop the skills needed to manage Harmony Endpoint Security.

»
  • Understand the emergence of increasingly more sophisticated cyberattacks and the need to protect endpoints.
  • Explain the advantages of Harmony Endpoint as a security solution.
  • Become familiar with the growing Endpoint Security Market.
  • Describe the key elements of the Harmony Endpoint Architecture.
  • Describe the Harmony Endpoint Management Environment.
  • Understand Check Point’s Infinity Portal.
  • Explain the new Harmony Endpoint Web Management Service.
  • Identify main features of the Harmony Endpoint Management console.
  • Explain how to create and assign security policies for Endpoint clients using endpoint security.
  • Understand deployment methods and server considerations for Endpoint Security Management installation.
  • Identify the different ways to install and configure Endpoint clients.
  • Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
  • Describe additional server configurations that are available to help manage Endpoint clients.
  • Recognize the different types of data security available to deploy on end user machines.
  • Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
  • Understand how to secure removable media devices.
  • Understand how Harmony Endpoint is defending company networks against sophisticated attacks.
  • Describe Check Point Harmony Endpoint Agent.
  • Explain how Harmony Endpoint Agent’s advanced technologies are preventing attacks from infiltrating Endpoint machines and corporate resources.
  • Become familiar with Harmony Endpoint troubleshooting methods.
  • Understand how to troubleshoot and debug issues that may occur in the Endpoint Security environment.

Working knowledge of Windows, UNIX, networking technology, the Internet and TCP/IP.security solutions.

Data Protection
Zero-Day Detection
Behavioral Guard
Deployment
Anti-Malware
Anti-Bot
Automatic Remediation
Threat Emulation
Threat Extraction
Forensics
Port Protection
Cloud-Based
Threat Detection
Anti-Exploit
Anti-Ransomware
Remote Access VPN
APTs

  • Activate the Harmony Endpoint manager in the Cloud.
  • Configure Active Directory.
  • Connect Active Directory to the Cloud management server.
  • Install Initial Agent on the Domain Controller.
  • Demonstrate how to deploy the Harmony Endpoint Agent on a client.
  • Configure the policy operation mode.
  • Create exception rules for specific removable media devices.
  • Deploy and configure Anti-Bot and URL Filtering on an Endpoint client.
  • Configure and deploy Full Disk Encryption on a client.
  • Test Anti-Bot behavioral engine.
  • Configure and deploy Media Encryption.
  • Block access to certain websites for specific user groups.
  • Configure and deploy Port Protection on an Endpoint client.
  • Perform threat emulation and extraction of malicious content.
  • Learn how to extract malicious content from a document.
Current offer
Training location
Course language

The prices are without VAT.