Training Check Point

Training goals dlearning

code: CP-CCES | version: R80.x

A 2-day Specialist course which provides a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.

Course objectives:

  • Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices.
  • Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management.
  • Identify and describe key elements of the SmartEndpoint Management console.
  • Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console.
  • Explain how to create and assign security policies for Endpoint clients using Endpoint Security.
  • Understand deployment methods and server considerations for Endpoint Security Management installation.
  • Identify the different ways to install and configure clients.
  • Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources.
  • Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
  • Describe additional server configurations that are available to help manage Endpoint clients.
  • Recognize the different types of data security protections available to deploy on end user machines.
  • Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
  • Understand how to secure removable media devices.
  • Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues.
  • Recognize the types of threats that target Endpoint computers.
  • Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment.
  • Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources.
  • Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events.
  • Understand how to troubleshoot and debug issues

Who should attend?

Technical professionals who need to deploy and manage Endpoint Security within their security environment.

Conspect Show list

  1. Introduction to Endpoint Security
  2. Endpoint Security Management
  3. Deploying Endpoint Security
  4. Additional Endpoint Server Configurations
  5. Data Security Protection
  6. Advanced Threat Prevention
  7. Reporting and Troubleshooting
  8. Lab Exercises
    • Installing the Endpoint Security Management Solution
    • Deploying Endpoint Client Packages
    • Deploying Endpoint Policy Servers
    • Configuring High Availability for Endpoint Security
    • Modifying Client Installations
    • Working with Deployment Rules
    • Working with SandBlast Agent
Download conspect training as PDF

Additional information

Prerequisites
  • CCSA and CCSE training/certification or equivalent knowledge.
Difficulty level
Duration 2 days
Certificate

The participants will obtain certificates signed by Check Point Software Technologies Ltd. (course completion).

This course additionally helps prepare for CCES exam #156-530 available at Pearson VUE test centers.

Trainer

Authorized Check Point Software Technologies Ltd. Trainer.

Other training Check Point | Product Training

Training thematically related

IT Security

Contact form

Please fill form below to obtain more info about this training.







* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

1000 EUR

FORM OF TRAINING ?

 

TRAINING MATERIALS ?

 

SELECT TERM TRAINING

    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
Book a training appointment
close

Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

Dlearning training

You may participate from at any place in the world. It is sufficient to have a computer (or, actually a tablet, or smartphone) connected to the Internet. Compendium CE provides each Distance Learning training participant with adequate software enabling connection to the Data Center. For more information, please visit dlearning.eu site

close

Paper materials

Traditional materials: The price includes standard materials issued in the form of paper books, printed or other, depending on the arrangements with the manufacturer.

Electronic materials

Electronic materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.

Upcoming Check Point training

Training schedule Check Point