Kod: CKT_CCES_R81.20
Czas trwania: 16 Hours (2 days)
Cena netto: zł5 100,00
Demonstrate an understanding of the Check Point Harmony Endpoint solution, including its features and capabilities. Apply knowledge and skills gained during training to manage and protect a Harmony Endpoint solution.
• Describe Check Point Infinity’s Consolidated Security Architecture.
• Explain the difference between the Harmony Endpoint On-Premises and Cloud management environments.
• Identify the main components of the Harmony Endpoint Security Architecture.
• Identity the basic workflow for Harmony Endpoint Security Management.
• Give examples of useful resources for Harmony Endpoint Security Management.
• Log in to the Web Management Console.
• Navigate the Web Management interface to gain a basic understanding of the features and capabilities Harmony Endpoint provides for security management.
• Discuss situations where it might be necessary to change default policy rules.
• Identify recommended releases for a Harmony Endpoint Client deployment.
• Identify deployment prerequisites.
• Given a deployment scenario, identify deployment methods, Endpoint Client packages, and the basic workflow.
• Recognize the different types of data security available to deploy.
• Describe how Full Disk Encryption protects and recovers data that is accessed and stored on Endpoint computers.
• Identify how to secure removable media devices and protect ports.
• Identify remote help and recovery capabilities.
• Discuss the challenges of threat prevention.
• Identify how Harmony Endpoint defends networks against advanced threats.
• Identify the key components in Harmony Endpoint simplified and large-scale deployments.
• Identify sizing guidelines for Harmony Endpoint deployments.
• Give examples of how to expand the solution with Super Nodes and External Policy Servers.
• Identify the additional capabilities that High Availability (HA) and Active Directory configurations support.
• Identify useful resources for basic troubleshooting.
• Give examples of potential problems or issues that might occur when using Harmony Endpoint.
• Investigate and troubleshoot basic Harmony Endpoint troubleshooting scenarios.
• Define Harmony Endpoint Management as a Service.
• Explain the set-up process for Harmony Endpoint Management as a Service.
• Discuss the workflow when migrating from Endpoint On-Premises to Endpoint Management as a Service
This course is designed for Security Administrators who are responsible for deploying and managing a Harmony Endpoint security solution.
Working knowledge of Unix-like and/or Windows operating systems, networking fundamentals, networking security, TCP/IP networking, administration.
Exercises:
Attend two Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master (CCSM).
Attend four Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master Elite (CCSM Elite).
Choose from the following Infinity Specialization courses:
Prepare for exam #156-536 at
www.VUE.com/checkpointExam vouchers are available at an additional cost.
Full information on Check Point’s Certification Program can be viewed at:
https://www.checkpoint.com/downloads/training/check-point-certification-faq.pdf
Please note that Check Point only offer e-kit courseware for training courses. Each delegate will be provided with an official set of e-kit courseware.
Arrow ECS are a Check Point Platinum Elite Authorised Training Company (ATC) Partner and participate in the Check Point Learning Credits (CLCs) and Partner Coop Training Program.