title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
Harmony Endpoint Specialist (CCES)
Course Description
Overview
This course is designed for Security Administrators responsible for deploying and managing a Harmony Endpoint security solution.Demonstrate an understanding of the Check Point Harmony Endpoint solution, including its features and capabilities. Apply knowledge and skills gained during training to manage and protect a Harmony Endpoint solution.
Objectives
- Apply knowledge of Harmony Endpoint workflow to deploy On-Premises Harmony Endpoint security management for simplified and large scale environments.
- Investigate and troubleshoot basic and expert Harmony Endpoint troubleshooting scenarios.
- Apply knowledge of Harmony Endpoint security features and capabilities to protect against imminent threats to the endpoint.
- Evaluate and customize security rules and policies to meet an organization’s security needs.
- Explain the difference between the Harmony Endpoint On-Premises and Cloud management environments.
- Identify the main components of the Harmony Endpoint Security Architecture.
- Identity the basic workflow for Harmony Endpoint Security Management.
- Give examples of useful resources for Harmony Endpoint Security Management.
- Log in to the Web Management Console.
- Navigate the Web Management interface to gain a basic understanding of the features and capabilities Harmony Endpoint provides for security management.
- Discuss situations where it might be necessary to change default policy rules.
- Identify recommended releases for a Harmony Endpoint Client employment.
- Identify deployment prerequisites.
- Given a deployment scenario, identify deployment methods, Endpoint Client packages, and the basic workflow.
- Recognize the different types of data security available to deploy.
- Describe how Full Disk Encryption protects and recovers data that is accessed and stored on Endpoint computers.
- Identify how to secure removable media devices and protect ports.
- Identify remote help and recovery capabilities.
- Discuss the challenges of threat prevention.
- Identify how Harmony Endpoint defends networks against advanced threats.
- Identify the key components in Harmony Endpoint simplified and large-scale deployments.
- Identify sizing guidelines for Harmony Endpoint deployments.
- Give examples of how to expand the solution with Super Nodes and External Policy Servers.
- Identify the additional capabilities that High Availability (HA) and Active Directory configurations support.
- Identify useful resources for basic troubleshooting.
- Give examples of potential problems or issues that might occur when using Harmony Endpoint.
- Investigate and troubleshoot basic Harmony Endpoint troubleshooting scenarios.
- Define Harmony Endpoint Management as a Service.
- Explain the set-up process for Harmony Endpoint Management as a Service.
- Discuss the workflow when migrating from Endpoint On-Premises to Endpoint Management as a Service
Audience
Prerequisites
-
Before taking this course, the following prerequisites are strongly encouraged:
- Unix-like and/or Windows operating systems
- Networking Fundamentals
- Networking Security
- TCP/IP Networking
- Security Administration
Topics
- Introduction to Harmony Endpoint
- Harmony Endpoint Security Management
- Deploying Harmony Endpoint
- Data Security Protection
- Advanced Threat Prevention
- Large-Scale Harmony Endpoint Deployment
- Troubleshooting
- Harmony Endpoint Management as a Service
- Install the Endpoint Security Management Server
- Deploy an Endpoint Security Management Server
- Configure Endpoint for Deployment
- Deploy Endpoint Security Clients to Hosts
- Test and Analyze Threat Response
- Configure LDAP Strong Authentication
- Deploy a Secondary Endpoint Security Management Server
- Troubleshoot Endpoint Communication Issues
- Migrate from On-Premises to Endpoint Management as a Service (Optional)
- Connect Existing Hosts to Endpoint Management as a Service (Optional)
Related Courses
-
Security Administration R81.20 (CCSA)
CP-CCSA- Duration: 3
- Delivery Format: Classroom Training, Online Training
- Price: 3,000.00 USD
-
Certified Security Expert R81.20 (CCSE)
CP-CCSE- Duration: 3
- Delivery Format: Classroom Training, Online Training
- Price: 3,000.00 USD
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.
STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.