25,000+ Courses Nationwide
0345 4506120

Check Point Certified Endpoint Specialist (CCES) R80.x

This course will provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.

Select specific date to see price, venue and full details.

Learning Objectives

  • Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices.
  • Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management.
  • Identify and describe key elements of the SmartEndpoint Management console.
  • Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console.
  • Explain how to create and assign security policies for Endpoint clients using Endpoint Security.
  • Understand deployment methods and server considerations for Endpoint Security Management installation.
  • Identify the different ways to install and configure Endpoint clients.
  • Recognise how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources.
  • Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
  • Describe additional server configurations that are available to help manage Endpoint clients.
  • Recognise the different types of data security protections available to deploy on end user machines.
  • Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
  • Understand how to secure removable media devices.
  • Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues.
  • Recognise the types of threats that target Endpoint computers.
  • Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment.
  • Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources.
  • Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events.
  • Understand how to troubleshoot and debug issues.

Course Content

COURSE TOPICS

  • Introduction to Endpoint Security
  • Endpoint Security Management
  • Deploying Endpoint Security
  • Additional Endpoint Server Configurations
  • Data Security Protection
  • Advanced Threat Prevention
  • Reporting and Troubleshooting

LAB EXERCISES

  • Installing the Endpoint Security Management Solution
  • Deploying Endpoint Client Packages
  • Deploying Endpoint Policy Servers
  • Configuring High Availability for Endpoint Security
  • Modifying Client Installations
  • Working with Deployment Rules
  • Working with SandBlast Agent

Related Courses

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

We work with the best