2-day Specialist course which provides an understanding of the skills necessary to effectively manage and protect your endpoint security network using the Check Point R81 Harmony Endpoint product.

Register your interest in this course here
Register your interest now

  • 18
    Nov
    2 days, Thu & Fri 9:00 AM - 5:00 PM
    Virtual US - Central Time Zone
    Session information
    Sessions
    Session 1
    Thu 18 Nov 09:00 - Thu 18 Nov 17:00
    Virtual US - Central Time Zone
    Session 2
    Fri 19 Nov 09:00 - Fri 19 Nov 17:00
    Virtual US - Central Time Zone
    • $2,000.00 excl.
  • 20
    Dec
    2 days, Mon & Tue 9:00 AM - 5:00 PM
    Virtual US - Central Time Zone
    Session information
    Sessions
    Session 1
    Mon 20 Dec 09:00 - Mon 20 Dec 17:00
    Virtual US - Central Time Zone
    Session 2
    Tue 21 Dec 09:00 - Tue 21 Dec 17:00
    Virtual US - Central Time Zone
    • $2,000.00 excl.
  • 24
    Feb
    2 days, Thu & Fri 9:00 AM - 5:00 PM
    Virtual US - Central Time Zone
    Session information
    Sessions
    Session 1
    Thu 24 Feb 09:00 - Thu 24 Feb 17:00
    Virtual US - Central Time Zone
    Session 2
    Fri 25 Feb 09:00 - Fri 25 Feb 17:00
    Virtual US - Central Time Zone
    • $2,000.00 excl.
  • 21
    Apr
    Thu & Fri 9:00am -5:00pm
    Virtual US - Central Time Zone
    Session information
    Sessions
    Session 1
    Thu 21 Apr 09:00 - Thu 21 Apr 17:00
    Virtual US - Central Time Zone
    Session 2
    Fri 22 Apr 09:00 - Fri 22 Apr 17:00
    Virtual US - Central Time Zone
    • $2,000.00 excl.

Description

Objectives

  •  Understand the emergence of increasingly more sophisticated cyberattacks and the need to protect endpoints.
  •  Explain the advantages of Harmony Endpoint as a security solution.
  •  Become familiar with the growing Endpoint Security Market.
  •  Describe the key elements of the Harmony Endpoint Architecture.
  •  Describe the Harmony Endpoint Management Environment.
  •  Understand Check Point’s Infinity Portal.
  •  Explain the new Harmony Endpoint Web Management Service.
  •  Identify main features of the Harmony Endpoint Management console.
  •  Explain how to create and assign security policies for Endpoint clients using endpoint security.
  •  Understand deployment methods and server considerations for Endpoint Security Management installation.
  •  Identify the different ways to install and configure Endpoint clients.
  •  Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
  •  Describe additional server configurations that are available to help manage Endpoint clients.
  •  Recognize the different types of data security available to deploy on end user machines.
  •  Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
  •  Understand how to secure removable media devices.
  •  Understand how Harmony Endpoint is defending company networks against sophisticated attacks.
  •  Describe Check Point Harmony Endpoint Agent.
  •  Explain how Harmony Endpoint Agent’s advanced technologies are preventing attacks from infiltrating Endpoint machines and corporate resources.
  •  Become familiar with Harmony Endpoint troubleshooting methods.
  •  Understand how to troubleshoot and debug issues that may occur in the Endpoint Security environment

Datasheets

Prerequisites

Working knowledge of Windows, UNIX, networking technology, the Internet and TCP/IP.security solutions.

Translate »