<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

Check Point Endpoint Specialist (CCES) R80.30

Course Overview

Check Point Endpoint Specialist is a two-day course providing a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.

With Cadre's enhanced course, the participants will receive 24/7 access to the labs for 6 months. The instructor will also provide additional study guide materials and lecture that are important to know for real-world use of the features covered in the class. 

If you choose to take the class Live on-line, Cadre provides a fully modern remote classroom experience with a state-of-the-art high resolution digital whiteboard. The whiteboard is excellent for complex network diagrams. 

Course Goal: Provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.

Duration:  2 Days 

Prerequisites: Check Point CCSA and CCSE Certification

Price: $1,995 (Group discounts available)

CHECK AVAILABILITY

 

 

Who Should Attend

Technical professionals who need to deploy and manage Endpoint Security within their security environment.

Course Topics:

  • Introduction to Endpoint Security
  • Endpoint Security Management
  • Deploying Endpoint Security
  • Additional Endpoint Server Configurations
  • Data Security Protection
  • Advanced Threat Prevention
  • Reporting and Troubleshooting

Course Objectives:

  • Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices
  • Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management
  • Identify and describe key elements of the SmartEndpoint Management console
  • Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console
  • Explain how to create and assign security policies for Endpoint clients using Endpoint Security
  • Understand deployment methods and server considerations for Endpoint Security Management installation
  • Identify the different ways to install and configure Endpoint clients
  • Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources
  •  Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server
  • Describe additional server configurations that are available to help manage Endpoint clients
  • Recognize the different types of data security protections available to deploy on end user machines
  • Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers
  • Understand how to secure removable media devices
  • Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues
  • Recognize the types of threats that target Endpoint computers
  • Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment
  • Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources
  • Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events
  • Understand how to troubleshoot and debug issues

Lab Exercises Include:

  • Installing the Endpoint Security Management Solution
  • Deploying Endpoint Client Packages
  • Deploying Endpoint Policy Servers
  • Configuring High Availability for Endpoint Security
  • Modifying Client Installations
  • Working with Deployment Rules
  • Working with SandBlast Agent

CHECK AVAILABILITY