Vendors

This course is designed for Endpoint Specialists who are responsible for maintaining a Harmony Endpoint security solution. Based on the E86 release. It also helps prepare participants for the Harmony Endpoint Specialist exam.
img-course-overview.jpg

What You'll Learn

  • Describe Check Point Infinity’s Consolidated Security Architecture. 
  • Explain the difference between the Harmony Endpoint On-Premises and Cloud management environments. 
  • Identify the main components of the Harmony Endpoint Security Architecture. 
  • Identity the basic workflow for Harmony Endpoint Security Management. 
  • Give examples of useful resources for Harmony Endpoint Security Management.
  • Log into the Web Management Console. 
  • Navigate the Web Management interface to gain a basic understanding of the features and capabilities Harmony Endpoint provides for Security Management. 
  • Discuss situations where it might be necessary to change default policy rules. 
  • Identify recommended releases for a Harmony Endpoint Client deployment. 
  • Recognize the different types of data security available to deploy. 
  • Describe how Full Disk Encryption protects and recovers data that is accessed and stored on Endpoint computers. 
  • Identify how to secure removable media devices and protect ports. 
  • Identify remote Help and recovery capabilities. 
  • Discuss the challenges of threat prevention. 
  • Give examples of advanced threats. 
  • Identify how Harmony Endpoint defends networks against advanced threats. 
  • Identify the components in standalone and distributed Harmony Endpoint deployments. 
  • Identify sizing guidelines for Harmony Endpoint deployments. 
  • Explain how to expand the environment for large-scale configurations. 
  • Explain the difference between Active Directory and High Availability servers. 
  • Identify useful resources for troubleshooting Harmony Endpoint. 
  • Give examples of potential problems or issues that might occur when using Harmony Endpoint. 
  • Investigate and troubleshoot basic Harmony Endpoint troubleshooting scenarios.

Who Should Attend

This course is designed for Security Administrators who are responsible for managing a Harmony Endpoint security solution.
img-who-should-learn.png

Prerequisites

  • Unix-based/Linux and/or Windows operating systems 
  • Networking (TCP/IP) and networking security 
  • Security administration (CCSA)

Learning Journey

Coming Soon...

  • Introduction to Harmony Endpoint 
  • Harmony Endpoint Security Management 
  • Deploying Harmony Endpoint 
  • Data Security Protection 
  • Advanced Threat Prevention 
  • Advanced Configurations 
  • Troubleshooting

Frequently Asked Questions (FAQs)

None

Keep Exploring

Course Curriculum

Course Curriculum

Training Schedule

Training Schedule

Exam & Certification

Exam & Certification

FAQs

Frequently Asked Questions

img-improve-career.jpg

Improve yourself and your career by taking this course.

More Courses By Cyber Security

img-get-info.jpg

Ready to Take Your Business from Great to Awesome?

Level-up by partnering with Trainocate. Get in touch today.

Name
Email
Phone
I'm inquiring for

Inquiry Details

By providing your contact details, you agree to our Privacy Policy.