check point endpoint security

By attending Check Point Endpoint Security Workshop, Participants will learn to:

  • Unify all endpoint security capabilities in a single console
  • Install and deploy server and client
  • How to implement and configure full disk encryption, media encryption and port protection, Anti malware and program control, firewall and security compliance verification and remote access
  • Basic reporting and Troubleshoot

This Check Point Endpoint Security Training course covers on how to unify all endpoint security protection in a single management console and server. It focuses on endpoint management installation and deployment as well as deploying full disk encryption, media encryption and port protection, Anti malware and program control, firewall and security compliance verification and remote access. This course demonstrates how to protect both users and machines with increased visibility and control.

  • Basic networking skills and basic knowledge of Active Directory
  • Knowledge of Windows Server, TCP/IP and the Internet

COURSE AGENDA

  • Deploying company-wide endpoint security
  • Learning to implement full disk encryption, media encryption and port protection, Anti malware and program control, firewall and security compliance verification and remote access
  • Discuss about the unique Endpoint security architecture
  • Deployment strategy
  • Discuss how to implement and configure full disk encryption, media encryption and port protection
  • Discuss how to implement and configure Anti malware and program control, firewall and security compliance verification, webcheck secure browsing and remote access
  • Configure active directory scanner
  • How to create a package for distribution
  • How to deploy the above mentioned features at organization level, OU level and user level
  • Reporting and troubleshooting
  • Endpoint security management server installation
  • Initial configuration of endpoint management server
  • Deploying initial software package and enable full disk encryption
  • Configuring and deploying OU level policies using profiles for application control, media encryption and port protection, VPN
  • Configuring and deploying User level policy configuration using profiles for media encryption and port protection
  • Modifying policies for organization roles using profiles for media encryption and port protection, application control, webcheck and firewall and security compliance verification