check point - CPIS (check point integrity)

The Check Point - CPIS (Check Point Integrity) training course is an endpoint security software product developed by Check Point Software Technologies. It is designed to protect personal computers and the networks they connect to from computer worms, Trojan horses, spyware, and intrusion attempts by hackers. The software aims to stop new PC threats and attacks before signature updates have been installed on the PC

COURSE AGENDA

  • Integrity Security Policies
  • Enterprise Policies
  • Personal Policy
  • The Default Policy
  • Policy Arbitration
  • Policy Rules Overview
  • Classic Firewall Rules
  • Zone Rules and Program Rules
  • Enforcement Rules
  • Rule Evaluation and Precedence
  • How Traffic Is Evaluated
  • Policy Creation
  • Preconfigured Policy Templates
  • Integrity Overview
  • Integrity Architecture
  • Web-based Management
  • Management-Server Platform
  • Integrity Client
  • Integrity Licensing
  • Integrity Administrator Console
  • Installing Integrity Advanced Server
  • Integrity Advanced Server Installation Process
  • Synchronizing User Catalogs
  • Administrator Role Assignments
  • Integrity Client Executables
  • The Control Center
  • Auto-Updating a Client Package
  • Understanding Firewall Rules
  • Zone Rules
  • Defining Zones
  • How Zone Rules Work
  • Workflow for Zone-Based Security
  • Managing Access Zones
  • Configuring the Trusted Zone
  • Choosing Security Levels
  • Program Control
  • Understanding Program Control
  • Workflow for Program Control
  • Observing Program Activity
  • Creating Program Rules
  • Program Rule Types
  • Program Permissions
  • SmartDefense Program Advisor
  • SmartDefense Program Advisor Process
  • Integrity Advanced Server Program Advisor Process
  • Understanding Enforcement Rules
  • How Enforcement Rules Work
  • What the Restricted User Experiences
  • Enforcement-Rule Workflow
  • Cooperative Enforcement
  • Anti-Spyware
  • Understanding Integrity
  • Configuring Anti-Spyware
  • Setting Up Regular Anti-Spyware Scans
  • Enforcing Anti-Spyware Scans and Treatments
  • Anti-Spyware Updates
  • Preventing E-mail Attacks
  • Understanding Inbound e-mail Protection
  • What the User Experiences
  • Limitations of MailSafe e-mail Protection
  • Understanding Outbound Protection
  • Protecting Instant Messaging
  • Monitoring Integrity Endpoint Security
  • Overview of Endpoint Connectivity
  • Tracking Enforcement-Rule Compliance
  • Current Client Compliance Status Report
  • Tracking Client-Security Events
  • Tracking and Observing Programs