HOME > IT & Software > CheckPoint Endpoint Security

CheckPoint Endpoint Security

SynopsisCheckPoint Endpoint Security, available at $49.99, has an ave...
CheckPoint Endpoint Security  No.1

CheckPoint Endpoint Security, available at $49.99, has an average rating of 4.7, with 23 lectures, based on 104 reviews, and has 1534 subscribers.

You will learn about Students would learn about Checkpoint Endpoint Security Students would learn how to deploy and manage endpoints either via the Endpoint Security Management Server or via the Harmony Endpoint (Infinity Portal). Students would learn how to protect endpoints using Anti-Bot, Anti-Exploit, Anti-Ransomware, Behavioral Guard, and Forensics. Students would learn how to configure Anti-Malware, Threat Prevention, Threat Emulation. Students would learn how to configure Application Control, Client Settings, Push Operations etc. Students would also learn how to configure Remote Access VPN for Endpoints, how to use Remote Help and configure Reporting This course is ideal for individuals who are Network Administrators, Network Security Engineers, IT Administrators etc, and anyone interested in protecting their laptops using Checkpoint Endpoint Security It is particularly useful for Network Administrators, Network Security Engineers, IT Administrators etc, and anyone interested in protecting their laptops using Checkpoint Endpoint Security.

Enroll now: CheckPoint Endpoint Security

Summary

Title: CheckPoint Endpoint Security

Price: $49.99

Average Rating: 4.7

Number of Lectures: 23

Number of Published Lectures: 23

Number of Curriculum Items: 23

Number of Published Curriculum Objects: 23

Original Price: $19.99

Quality Status: approved

Status: Live

What You Will Learn

  • Students would learn about Checkpoint Endpoint Security
  • Students would learn how to deploy and manage endpoints either via the Endpoint Security Management Server or via the Harmony Endpoint (Infinity Portal).
  • Students would learn how to protect endpoints using Anti-Bot, Anti-Exploit, Anti-Ransomware, Behavioral Guard, and Forensics.
  • Students would learn how to configure Anti-Malware, Threat Prevention, Threat Emulation.
  • Students would learn how to configure Application Control, Client Settings, Push Operations etc.
  • Students would also learn how to configure Remote Access VPN for Endpoints, how to use Remote Help and configure Reporting
  • Who Should Attend

  • Network Administrators, Network Security Engineers, IT Administrators etc, and anyone interested in protecting their laptops using Checkpoint Endpoint Security
  • Target Audiences

  • Network Administrators, Network Security Engineers, IT Administrators etc, and anyone interested in protecting their laptops using Checkpoint Endpoint Security
  • Having an hybrid approach to network security entails having both perimeter and endpoint security solutions that protect assets and infrastructure anywhere i.e., both on-premise and off-premise. While our previously produced CCSA course shows how to protect the perimeter using a Next-Generation Firewall (NGFW), this Course, Checkpoint Certified Endpoint Specialist, shows how to proffer layered security by protecting the endpoints.

    In this CCES course, we would learn how to configure Checkpoint Endpoint Securityusing Harmony Endpoint (also called the cloud-based Infinity Portal). We would also learn how to configure Endpoint Security using an on-premise Endpoint Security Management Server and the SmartEndpoint.

    In this CCES course, we would learn how to configure Full Disk Encryption, Media Encryption & Port Protection, OneCheck User Authentication, Capsule Docs(for protecting sensitive documents), Anti-Malware, Sandblast Anti-Ransomware, Behavioral Guardand Forensics.

    In this CCES course, we would also learn how to configure Sandblast Agent Anti-Bot, Threat Extraction, Threat Emulation and Anti-Exploit. We would learn about URL Filtering, Firewall (defining inbound and outbound rules for Endpoints), Access Zones, Application Control, Remote Access VPN (so remote workers can securely connect to the office).

    Furthermore, we would learn about Compliance, Client Settings, Push Operations, Remote Helpand Reporting.

    Topics Include: 

    * Full Disk Encryption

    * Media Encryption & Port Protection

    * OneCheck User Authentication

    * Capsule Docs

    * Anti-Malware

    * Anti-Ransomware

    * Behavioral Guard and Forensics

    * Sandblast Anti-Bot

    * Threat Extraction

    * Threat Emulation

    * Anti-Exploit

    * URL Filtering

    * Firewall

    * Access Zones

    * Application Control

    * Remote Access VPN

    * Compliance

    * Remote Help

    * Client Settings

    * Push Operations

    * Reporting

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Course Overview

    Lecture 2: Setup of Endpoint Server / Harmony Endpoint

    Lecture 3: Installation of SMS and Gateway

    Lecture 4: Adding Gateway to the SMS (Endpoint Server)

    Lecture 5: Creating Internet Access on the ISP Router

    Chapter 2: Harmony Endpoint (Infinity Portal)

    Lecture 1: Installing Test PC on AWS

    Lecture 2: Installing Endpoint Security on AWS

    Lecture 3: Harmony Endpoint Overview

    Lecture 4: Threat Prevention

    Lecture 5: Full Disk Encryption

    Lecture 6: Media Encryption

    Lecture 7: Port Protection

    Lecture 8: OneCheck User Authentication

    Lecture 9: 22 – Access & Compliance

    Lecture 10: Client Settings

    Chapter 3: Endpoint Security (On-Premise Server)

    Lecture 1: Enabling the Endpoint Security Blade

    Lecture 2: Endpoint Security Package Download

    Lecture 3: SmartEndpoint Overview

    Lecture 4: Full Disk Encryption

    Lecture 5: Media Encryption & Port Protection

    Lecture 6: OneCheck User Authentication

    Lecture 7: Capsule Docs

    Lecture 8: Anti-Malware

    Instructors

  • CheckPoint Endpoint Security  No.2
    Grezitech Company
    Network Security Company
  • CheckPoint Endpoint Security  No.3
    Johnpaul Chukwujekwu
    Instructor at Udemy
  • Rating Distribution

  • 1 stars: 1 votes
  • 2 stars: 2 votes
  • 3 stars: 11 votes
  • 4 stars: 23 votes
  • 5 stars: 67 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!