Training Check Point

Training goals

code: CP-SBM

This course provides an understanding of basic concepts and skills necessary to configure mobile devices in the SandBlast Mobile solution.

WHO SHOULD ATTEND?

Technical professionals who support, install, deploy or administer Check Point Software Blades.

COURSE OBJECTIVES AND TOPICS INCLUDE:

  • Review the five methods of mobile device attacks.
  • Understand how the SandBlast Mobile solution works with existing mobile security solutions to protect mobile devices and the corporate network.
  • Evaluate the important contributions of each SandBlast mobile component.
  • Recognize how the SandBlast Mobile components communicate with each other.
  • Understand how the SandBlast Mobile solution integrates with Amazon Web Services and MDM systems.
  • Examine the responsibilities of SandBlast Mobile administrators.
  • Understand the roles and permissions that can be assigned to SandBlast Mobile administrators.
  • Register a mobile device and add it to a new group.
  • Add an administrator.
  • Configure privacy and password settings.
  • Whitelist an app and export a log of audit events.
  • Recognize how the SandBlast Mobile components work together to detect threats.
  • Remediate a Man-in-the-Middle attack detected by the SandBlast Mobile Protect app.
  • Describe how data is collected from mobile devices, installed apps, and the SandBlast Mobile dashboard.
  • Understand how data is securely stored and distributed throughout the SandBlast Mobile solution.

Conspect Show list

  1. SandBlast Mobile Overview
  2. SandBlast Mobile Components
  3. Administration of SandBlast Mobile
  4. Threat Collection
  5. Data Collection, Storage, and Distribution

Lab exercises:

  1. Administering the SandBlast Mobile Dashboard
  2. Simulating a Man-in-the-Middle Attack
Download conspect training as PDF

Additional information

Requirements

Persons attending this course should have a:

  • CCSA
  • Basic knowledge of networking
  • 6 months to 1 year of experience with Check Point products recommended
Difficulty level
Duration 1 day
Certificate

The participants will obtain certificates signed by Check Point Software Technologies Ltd. (course completion).

Trainer

Authorized Check Point Software Technologies Ltd. Trainer

Training thematically related

IT Security

Network Security

Contact form

Please fill form below to obtain more info about this training.







* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

860 EUR

close

Discount codes

Discount code may refer to (training, producer, deadline). If you have a discount code, enter it in the appropriate field.
(green means entering the correct code | red means the code is incorrect)

FORM OF TRAINING ?

close

Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

TRAINING MATERIALS ?

close

Electronic materials

Electronic Materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.

 

SELECT TERM TRAINING

No deadlines for this training.

Suggest your own appointment