logo

Check Point Course

course overview

Click to View dates & book now

Overview

During this 2-day course you will learn basic concepts and develop skills necessary to administer Harmony Endpoint security solutions.


Audience

Technical professionals who support, install deploy or administer Check Point products.

Skills Gained

• Understand the emergence of increasingly more sophisticated cyberattacks and the need to protect endpoints. 

• Explain the advantages of Harmony Endpoint as a security solution. 

• Become familiar with the growing Endpoint Security Market. 

• Describe the key elements of the Harmony Endpoint Architecture. 

• Describe the Harmony Endpoint Management Environment. 

• Understand Check Point’s Infinity Portal. 

• Explain the new Harmony Endpoint Web Management Service. 

• Identify main features of the Harmony Endpoint Management console. 

• Explain how to create and assign security policies for Endpoint clients using endpoint security. 

• Understand deployment methods and server considerations for Endpoint Security Management installation. 

• Identify the different ways to install and configure Endpoint clients. 

• Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.

• Describe additional server configurations that are available to help manage Endpoint clients. 

• Recognize the different types of data security available to deploy on end user machines. 

• Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. 

• Understand how to secure removable media devices. 

• Understand how Harmony Endpoint is defending company networks against sophisticated attacks. • Describe Check Point Harmony Endpoint Agent. 

• Explain how Harmony Endpoint Agent’s advanced technologies are preventing attacks from infiltrating Endpoint machines and corporate resources. 

• Become familiar with Harmony Endpoint troubleshooting methods. 

• Understand how to troubleshoot and debug issues that may occur in the Endpoint Security environment.


Prerequisites

Working knowledge of Windows, UNIX, networking technology, the Internet and TCP/IP security solutions.

Outline

What is Check Point? Check Point are global providers of IT network and information security solutions, providing customers with robust protection against all types of threats, reduces security complexity and lowers total cost of ownership.

Best known for its FireWall-1 product, Check Point have hardware and software products covering all aspects of IT network, endpoint and data security including the popular NGX, Pointsec, VPN, VSX, R70 and R71 products.

Check Point training and certification courses ensure that IT professionals have up to date security skills, included within our training course portfolio are the Check Point Certified Security Administrator (CCSA) and the Check Point Certified Security Expert (CCSE) certifications all designed to give delegates immediate recognition of their experience, knowledge and abilities within the security arena.

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.