Check Point Certified Endpoint Specialist (CCES)

 

Course Overview

Learn basic concepts and develop skills necessary to administer Harmony Endpoint security solutions

Course Content

  • Describe Check Point Infinity's Consolidated Security Architecture.
  • Explain the difference between the Harmony Endpoint On-Premises and Cloud management environments.
  • Identify the main components of the Harmony Endpoint Security Architecture.
  • Identity the basic workflow for Harmony Endpoint Security Management.
  • Give examples of useful resources for Harmony Endpoint Security Management.
  • Log into the Web Management Console.
  • Navigate the Web Management interface to gain a basic understanding of the features and capabilities Harmony Endpoint provides for Security Management.
  • Discuss situations where it might be necessary to change default policy rules.
  • Identify recommended releases for a Harmony Endpoint Client deployment.
  • Recognize the different types of data security available to deploy.
  • Describe how Full Disk Encryption protects and recovers data that is accessed and stored on Endpoint computers.
  • Identify how to secure removable media devices and protect ports.
  • Identify remote Help and recovery capabilities.
  • Discuss the challenges of threat prevention.
  • Give examples of advanced threats.
  • Identify how Harmony Endpoint defends networks against advanced threats.
  • Identify the components in standalone and distributed Harmony Endpoint deployments.
  • Identify sizing guidelines for Harmony Endpoint deployments.
  • Explain how to expand the environment for large-scale configurations.
  • Explain the difference between Active Directory and High Availability servers.
  • Identify useful resources for troubleshooting Harmony Endpoint.
  • Give examples of potential problems or issues that might occur when using Harmony Endpoint.
  • Investigate and troubleshoot basic Harmony Endpoint troubleshooting scenarios.

Who should attend

Technical professionals who support, install deploy or administer Check Point products.

Prerequisites

  • Working knowledge of Windows, UNIX
  • Check Point recommends that students who wish to expand their knowledge participate in the CCSA course.

Course Objectives

Learn How To

  • Identify the security features and capabilities that Harmony Endpoint provides
  • Configure and maintain a Harmony Endpoint Security Management Server
  • Deploy local and remote Harmony Endpoint Clients

Prices & Delivery methods

Online Training

Duration
2 days

Price
  • Price on request
Classroom Training

Duration
2 days

Price
  • Canada: Price on request

Click on town name or "Online Training" to book Schedule

This is an Instructor-Led Classroom course
Instructor-led Online Training:   This computer icon in the schedule indicates that this date/time will be conducted as Instructor-Led Online Training. If you have any questions about our online courses, feel free to contact us via phone or Email anytime.
This is a FLEX course, which is delivered both virtually and in the classroom.
*   This class is delivered by a vendor or third party partner.

Belgium

Diegem This is a FLEX course. * Enroll
Online Training Time zone: Central European Time (CET) Enroll

France

Online Training Time zone: Central European Time (CET) * Enroll
Online Training Time zone: Central European Time (CET) * Enroll
Online Training Time zone: Central European Summer Time (CEST) * Enroll

Netherlands

Houten This is a FLEX course. * Enroll
Online Training Time zone: Central European Time (CET) Enroll
Houten This is a FLEX course. * Enroll
Online Training Time zone: Central European Summer Time (CEST) Enroll