Advocate | Educate | Innovate
X
Training
A10
Advanced Technology Courses
Alibaba Cloud
AMA
APMG
AWS
Blockchain
Business IT
Cisco
CompTIA
Cyber Security
DELL EMC
DevOps Institute
EC-Council
EXIN
Fortinet
Google Cloud
Huawei
IBM
ISACA
ISC2
ITIL
Microsoft
NetApp
Nutanix
Oracle
Palo Alto Networks
PMI
Pulse Secure
Red Hat
Rocheston
Ruckus
Scrum Inc
Scrum org
Splunk
Trend Micro
UiPath
VMware
Highlights
Blog
Services
Facilities Rental
Modalities
Remote Labs
Schedule
Vendors
Testing Center
About Us
Our Story
Leadership
Awards
News & Announcements
Career
Contact Us
Refund Policy
Settings
Sign Out
Home
>
Vendors
>
cybersecurity
>
cces
Enquire Now
x
Enquiry Form
Required
Please provide a valid Name
Required
Please provide a valid Name
Required
Please provide a valid Email
Required
Please provide a valid phone
Required
R3Oaft
Required
By clicking "Submit", I agree to the Terms Of Use and
Privacy Policy
CCES - Harmony Endpoint Specialist (CCES)
Overview
Duration:
2.0 days
This course is designed for Endpoint Specialists who are responsible for maintaining a Harmony Endpoint security solution. Based on the E86 release. It also helps prepare participants for the Harmony Endpoint Specialist exam.
What You Will Learn
Describe Check Point Infinity’s Consolidated Security Architecture.
Explain the difference between the Harmony Endpoint On-Premises and Cloud management environments.
Identify the main components of the Harmony Endpoint Security Architecture.
Identity the basic workflow for Harmony Endpoint Security Management.
Give examples of useful resources for Harmony Endpoint Security Management.
Log into the Web Management Console.
Navigate the Web Management interface to gain a basic understanding of the features and capabilities Harmony Endpoint provides for Security Management.
Discuss situations where it might be necessary to change default policy rules.
Identify recommended releases for a Harmony Endpoint Client deployment.
Recognize the different types of data security available to deploy.
Describe how Full Disk Encryption protects and recovers data that is accessed and stored on Endpoint computers.
Identify how to secure removable media devices and protect ports.
Identify remote Help and recovery capabilities.
Discuss the challenges of threat prevention.
Give examples of advanced threats.
Identify how Harmony Endpoint defends networks against advanced threats.
Identify the components in standalone and distributed Harmony Endpoint deployments.
Identify sizing guidelines for Harmony Endpoint deployments.
Explain how to expand the environment for large-scale configurations.
Explain the difference between Active Directory and High Availability servers.
Identify useful resources for troubleshooting Harmony Endpoint.
Give examples of potential problems or issues that might occur when using Harmony Endpoint.
Investigate and troubleshoot basic Harmony Endpoint troubleshooting scenarios.
Syllabus
Introduction to Harmony Endpoint
Harmony Endpoint Security Management
Deploying Harmony Endpoint
Data Security Protection
Advanced Threat Prevention
Advanced Configurations
Troubleshooting
This Course Is For
This course is designed for Security Administrators who are responsible for managing a Harmony Endpoint security solution.
Prerequisites
Unix-based/Linux and/or Windows operating systems
Networking (TCP/IP) and networking security
Security administration (CCSA)
Certification
Schedule
Enquire Now
First Name
*
*
Please provide a valid Name
Last Name
*
*
Please provide a valid Name
E-mail address
*
*
Please provide a valid Email
Phone No
*
*
Please provide a valid phone
Company
Enter your message
*
*
By clicking "Submit", I agree to the Terms Of Use and
Privacy Policy
Enquire Now
Your Cart
Is Empty!
Subtotal
Enquire Now
*
Please provide a valid Name
*
Please provide a valid Name
*
Please provide a valid phone
*
Please provide a valid Email
*
R3Oaft
*
By clicking "Submit", I agree to the Terms Of Use and
Privacy Policy
Submit
Close