CHECK POINT Certified Endpoint Specialist (CCES) – Updated 2021 (R81)
About this Course
-
-
A 2-day Specialist course which provides a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.
-
Course Goals/Skills
- This course is designed for security engineers, developers, and Check Point resellers who need to deploy and manage Endpoint Security within their security environment and are working towards their Point Certified Endpoint Specialist (CCES) certification.
Audience
- Technical professionals who need to deploy and manage Endpoint Security within their security environment
Course Format:
Присъствен (Classroom) Курс в Учебната ни зала или В Офис на Клиент | Онлайн (Online/Virtual) Курс във виртуална зала с инструктор |
Course Language Option:
Български (Bulgarian) | Английски (English) |
Student Guides:
Course Materials:Digital Format. Lifetime Access. Official Learning Material from Check Point.
Lab Environment:
Lab: Individual Environment for each Delegate.
At Course Completion:
Lifetime Access - Video Archive 24/7 | Certificate of Course Completion |
Course Duration:
- 2 work days (09:00/10:00 – 17:00/18:00)
or
- 16 learning hours after hours, for 2 weeks
- sat and sun 10:00 – 14:00, 14:00 – 18:00, 18:00 – 22:00
- mon and wed 19:00 – 23:00
- tue and thu 19:00 – 23:00
Payments:
Payment can be made via Check Point Learning Credits (CLC). Contact us for details.
If you are Check Point Partner you can also get free training via the Co-op Program. Check your eligibility and request funds here or For any further questions or additional assistance, please E-Mail: [email protected]
Invoice can be requested up to 7 days after payment.
Course Calendar:
Please contact us for Private Events or additional dates if you dont find suitable date.
Curriculum
- 8 Sections
- 41 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- Preface: Endpoint Specialist1
- Chapter 1: Introduction to Harmony Endpoint4
- Chapter 2: Harmony Endpoint Security Management10
- 4.1R81 Harmony Endpoint Management Environment
- 4.2Infinity Portal
- 4.3R81 Endpoint Web Management Service
- 4.4Set-up of Endpoint Web Interface
- 4.5Management Consoles
- 4.6Endpoint Security Policies
- 4.7Endpoint Licenses
- 4.8Managing Users
- 4.9Lab 2.1: Harmony Endpoint Account Registration
- 4.10Lab 2.2: Connecting Active Directory To Cloud Management Server
- Chapter 3: Deploying Harmony Endpoint6
- Chapter 4: Additional Endpoint Server Configurations3
- Chapter 5: Data Security Protection5
- Chapter 6: Advanced Threat Prevention7
- Chapter 7: Harmony Endpoint Troubleshooting5
FAQs
156-530 – Check Point Certified Endpoint Specialist (CCES)
Requirements
- Working knowledge of Windows, UNIX, networking technology, the Internet and TCP/IP.security solutions.
Features
- Understand the emergence of increasingly more sophisticated cyberattacks and the need to protect endpoints.
- Explain the advantages of Harmony Endpoint as a security solution.
- Become familiar with the growing Endpoint Security Market.
- Describe the key elements of the Harmony Endpoint Architecture.
- Describe the Harmony Endpoint Management Environment.
- Understand Check Point’s Infinity Portal.
- Explain the new Harmony Endpoint Web Management Service.
- Identify main features of the Harmony Endpoint Management console.
- Explain how to create and assign security policies for Endpoint clients using endpoint security.
- Understand deployment methods and server considerations for Endpoint Security Management installation.
- Identify the different ways to install and configure Endpoint clients.
- Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
- Describe additional server configurations that are available to help manage Endpoint clients.
- Recognize the different types of data security available to deploy on end user machines.
- Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
- Understand how to secure removable media devices.
- Understand how Harmony Endpoint is defending company networks against sophisticated attacks.
- Describe Check Point Harmony Endpoint Agent.
- Explain how Harmony Endpoint Agent’s advanced technologies are preventing attacks from infiltrating Endpoint machines and corporate resources.
- Become familiar with Harmony Endpoint troubleshooting methods.
- Understand how to troubleshoot and debug issues that may occur in the Endpoint Security environment.
- Activate the Harmony Endpoint manager in the Cloud.
- Configure Active Directory.
- Connect Active Directory to the Cloud management server.
- Install Initial Agent on the Domain Controller.
- Demonstrate how to deploy the Harmony Endpoint Agent on a client.
- Configure the policy operation mode
- Create exception rules for specific removable media devices.
- Deploy and configure Anti-Bot and URL Filtering on an Endpoint client.
- Configure and deploy Full Disk Encryption on a client
- Test Anti-Bot behavioral engine.
- Configure and deploy Media Encryption
- Block access to certain websites for specific user groups.
- Configure and deploy Port Protection on an Endpoint client.
- Perform threat emulation and extraction of malicious content
- Learn how to extract malicious content from a document.
Target audiences
- Technical professionals who support, install deploy or administer Check Point products.
Related Courses
€ 1000,00
372 Students