Check Point Certified Endpoint Specialist (CCES)

 

Course Overview

Provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.

  • Introduction to Endpoint Security
  • Endpoint Security Management
  • Deploying Endpoint Security
  • Additional Endpoint Server Configurations
  • Data Security Protection
  • Advanced Threat Prevention
  • Reporting and Troubleshooting

Who should attend

Technical professionals who need to deploy and manage Endpoint Security within their security environment.

Prerequisites

Check Point CCSA and CCSE Certification.

Course Objectives

  • Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices.
  • Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management.
  • Identify and describe key elements of the SmartEndpoint Management console.
  • Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console.
  • Explain how to create and assign security policies for Endpoint clients using Endpoint Security.
  • Understand deployment methods and server considerations for Endpoint Security Management installation.
  • Identify the different ways to install and configure Endpoint clients.
  • Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources.
  • Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
  • Describe additional server configurations that are available to help manage Endpoint clients.
  • Recognize the different types of data security protections available to deploy on end user machines.
  • Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.Understand how to secure removable media devices.
  • Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues.
  • Recognize the types of threats that target Endpoint computers.
  • Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment.
  • Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources.
  • Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events.
  • Understand how to troubleshoot and debug issues.

Prices & Delivery methods

Online Training

Duration
2 days

Price
  • US $ 2,000
Classroom Training

Duration
2 days

Price
  • United States: US $ 2,000

Click on town name or "Online Training" to book Schedule

This is an Instructor-Led Classroom course
Instructor-led Online Training:   This is an Instructor-Led Online (ILO) course. These sessions are conducted via WebEx in a VoIP environment and require an Internet Connection and headset with microphone connected to your computer or laptop. If you have any questions about our online courses, feel free to contact us via phone or Email anytime.
This is a FLEX course, which is delivered simultaneously in two modalities. Choose to attend the Instructor-Led Online (ILO) virtual session or Instructor-Led Classroom (ILT) session.
*   This class is delivered by a vendor or third party partner.

Belgium

Diegem This is a FLEX course. * Enroll
Online Training Time zone: Central European Summer Time (CEST) Enroll

France

Online Training Time zone: Central European Summer Time (CEST) * Enroll
Online Training Time zone: Central European Time (CET) * Enroll

Netherlands

Houten This is a FLEX course. * Enroll
Online Training Time zone: Central European Summer Time (CEST) Enroll
Houten This is a FLEX course. * Enroll
Online Training Time zone: Central European Time (CET) Enroll