Microtek Learning Logo

CCES Check Point Certified Endpoint Specialist Training

5
(5)

CCES Check Point Certified Endpoint Specialist Training aims at offering a proficient live online training program for tech-based professionals. They want to deploy and manage Endpoint Security with a dedicated security environment.

  • Category : Checkpoint

Course Price : $1795 Per Participant

Course Description

CCES Check Point Certified Endpoint Specialist Training aims to offer a proficient live online training program for tech-based professionals.

They want to deploy and manage Endpoint Security with a dedicated security environment. We suggest getting Check Point CCSA and CCSE certification before attending this Endpoint specialist training course.

Primary enrollers for this course would include security engineers, developers, and CheckPoint resellers who require knowledge of deploying and managing Endpoint Security.

Aspirants who wish to retrieve CCES certification can also polish their skill set with our integrated modules. 

Course objectives for CCES Check Point Certified Endpoint Specialist Training include an introduction to Endpoint security, endpoint security management, deploying endpoint security, data security protection, additional Endpoint server configurations, and advanced threat protection.

Reporting and troubleshooting problems and errors is also a part of this comprehensive CCES training course.

Our primary vision in designing this course is to impart a technical skill set to an understanding of Check Point Endpoint Security and deploy it to the corporate network environment. 

Microsoft Course Microsoft Course
500+

Courses

experience experience
20+

Years of Experience

learners learners
95K+

Global Learners

What you will learn

  • green-tick Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices.
  • green-tick Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management.
  • green-tick Identify and describe key elements of the SmartEndpoint Management console.
  • green-tick Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console.
  • green-tick Explain how to create and assign security policies for Endpoint clients using Endpoint Security.
  • green-tick Understand deployment methods and server considerations for Endpoint Security Management installation.
  • green-tick Identify the different ways to install and configure Endpoint clients.
  • green-tick Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources.
  • green-tick Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
  • green-tick Describe additional server configurations that are available to help manage Endpoint clients.
  • green-tick Recognize the different types of data security protections available to deploy on end user machines.
  • green-tick Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
  • green-tick Understand how to secure removable media devices.
  • green-tick Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues.
  • green-tick Recognize the types of threats that target Endpoint computers.
  • green-tick Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment.
  • green-tick Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources.
  • green-tick Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events.
  • green-tick Understand how to troubleshoot and debug issues.

Prerequisites

Prior to taking this course, it is recommended that learners possess the following:

  • Check Point CCSA and CCSE Certification

Who should attend this course?

  • This training is suitable for technical professionals who necessitate managing and deploying Endpoint Security within environments.

Schedules

Oops! For this course, there are currently no public schedules available. Clicking on "Notify Me" will allow you to express your interest.

For dates, times, and location customization of this course, get in touch with us.

You can also speak with a learning consultant by calling 800-961-0337.

Curriculum

  • Installing the Endpoint Security Management Solution
  • Deploying Endpoint Client Packages
  • Deploying Endpoint Policy Servers
  • Configuring High Availability for Endpoint Security
  • Modifying Client Installations
  • Working with Deployment Rules
  • Working with SandBlast Agent
  • Course Details

    • enroll enroll-green
      Enrolled: 1526
    • duration duration green
      Duration: 2 Days

    Talk to Learning Advisor