Check Point Authorized Training
Check Point Authorized Training
Check Point Authorized Training

Check Point Certified Endpoint Specialist (CCES) R80.x

Course Details

This course will provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment

COURSE TOPICS

  • Introduction to Endpoint Security
  • Endpoint Security Management
  • Deploying Endpoint Security
  • Additional Endpoint Server Configurations
  • Data Security Protection
  • Advanced Threat Prevention
  • Reporting and Troubleshooting

LAB EXERCISES

  • Installing the Endpoint Security Management Solution
  • Deploying Endpoint Client Packages
  • Deploying Endpoint Policy Servers
  • Configuring High Availability for Endpoint Security
  • Modifying Client Installations
  • Working with Deployment Rules
  • Working with SandBlast Agent

COURSE OBJECTIVES

  • Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices.
  • Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management.
  • Identify and describe key elements of the SmartEndpoint Management console.
  • Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console.
  • Explain how to create and assign security policies for Endpoint clients using Endpoint Security.
  • Understand deployment methods and server considerations for Endpoint Security Management installation.
  • Identify the different ways to install and configure Endpoint clients.
  • Recognise how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources.
  • Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
  • Describe additional server configurations that are available to help manage Endpoint clients.
  • Recognise the different types of data security protections available to deploy on end user machines.
  • Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
  • Understand how to secure removable media devices.
  • Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues.
  • Recognise the types of threats that target Endpoint computers.
  • Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment.
  • Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources.
  • Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events.
  • Understand how to troubleshoot and debug issues.

duration2 Days

price£1,295.00 — £1,430.00


address

Stuart House East Wing
St Johns Rd
Peterborough
PE1 5DD