CCES - Harmony Endpoint Specialist (CCES)

This course is designed for Endpoint Specialists who are responsible for maintaining a Harmony Endpoint security solution. Based on the E86 release. It also helps prepare participants for the Harmony Endpoint Specialist exam.

Code: cces

Duration: 2.0 days

Enquire Now

Start learning today!

Click Hereto customize your Training

Objectives

  • Describe Check Point Infinity’s Consolidated Security Architecture. 
  • Explain the difference between the Harmony Endpoint On-Premises and Cloud management environments. 
  • Identify the main components of the Harmony Endpoint Security Architecture. 
  • Identity the basic workflow for Harmony Endpoint Security Management. 
  • Give examples of useful resources for Harmony Endpoint Security Management.
  • Log into the Web Management Console. 
  • Navigate the Web Management interface to gain a basic understanding of the features and capabilities Harmony Endpoint provides for Security Management. 
  • Discuss situations where it might be necessary to change default policy rules. 
  • Identify recommended releases for a Harmony Endpoint Client deployment. 
  • Recognize the different types of data security available to deploy. 
  • Describe how Full Disk Encryption protects and recovers data that is accessed and stored on Endpoint computers. 
  • Identify how to secure removable media devices and protect ports. 
  • Identify remote Help and recovery capabilities. 
  • Discuss the challenges of threat prevention. 
  • Give examples of advanced threats. 
  • Identify how Harmony Endpoint defends networks against advanced threats. 
  • Identify the components in standalone and distributed Harmony Endpoint deployments. 
  • Identify sizing guidelines for Harmony Endpoint deployments. 
  • Explain how to expand the environment for large-scale configurations. 
  • Explain the difference between Active Directory and High Availability servers. 
  • Identify useful resources for troubleshooting Harmony Endpoint. 
  • Give examples of potential problems or issues that might occur when using Harmony Endpoint. 
  • Investigate and troubleshoot basic Harmony Endpoint troubleshooting scenarios.

Content

  • Introduction to Harmony Endpoint 
  • Harmony Endpoint Security Management 
  • Deploying Harmony Endpoint 
  • Data Security Protection 
  • Advanced Threat Prevention 
  • Advanced Configurations 
  • Troubleshooting

Audience

This course is designed for Security Administrators who are responsible for managing a Harmony Endpoint security solution.

Prerequisites

  • Unix-based/Linux and/or Windows operating systems 
  • Networking (TCP/IP) and networking security 
  • Security administration (CCSA)

Certification

product-certification

Course Benefits

product-benefits
  • Career growth
  • Broad Career opportunities
  • Worldwide recognition from leaders
  • Up-to Date technical skills
  • Popular Certification Badges

Cyber Security Popular Courses

crtp

A Certified Red Team Professional is a cybersecurity expert trained and certified to simulate cyberattacks and security breaches on a company's systems, network
Enquire Now
 
 
 
 
3MkJ6T
By clicking "Submit", I agree to the Terms Of Use and Privacy Policy