Check Point Endpoint Specialist is a two-day course providing a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.
With Cadre's enhanced course, the participants will receive 24/7 access to the labs for 6 months. The instructor will also provide additional study guide materials and lecture that are important to know for real-world use of the features covered in the class.
If you choose to take the class Live on-line, Cadre provides a fully modern remote classroom experience with a state-of-the-art high resolution digital whiteboard. The whiteboard is excellent for complex network diagrams.
Course Goal: Provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.
Duration: 2 Days
Prerequisites: Check Point CCSA and CCSE Certification
Price: $1,995 (Group discounts available)
Who Should Attend
Technical professionals who need to deploy and manage Endpoint Security within their security environment.
Introduction to Endpoint Security
Endpoint Security Management
Deploying Endpoint Security
Additional Endpoint Server Configurations
Data Security Protection
Advanced Threat Prevention
Reporting and Troubleshooting
Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices
Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management
Identify and describe key elements of the SmartEndpoint Management console
Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console
Explain how to create and assign security policies for Endpoint clients using Endpoint Security
Understand deployment methods and server considerations for Endpoint Security Management installation
Identify the different ways to install and configure Endpoint clients
Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources
Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server
Describe additional server configurations that are available to help manage Endpoint clients
Recognize the different types of data security protections available to deploy on end user machines
Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers
Understand how to secure removable media devices
Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues
Recognize the types of threats that target Endpoint computers
Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment
Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources
Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events
Understand how to troubleshoot and debug issues
Lab Exercises Include:
Installing the Endpoint Security Management Solution
Deploying Endpoint Client Packages
Deploying Endpoint Policy Servers
Configuring High Availability for Endpoint Security