18756 Stone Oak Park Way, Suite200, San Antonio TX 78258 USA
100 Queen St W, Brampton, ON L6X 1A4, Canada
country flagUnited States
share button

CCES Check Point Certified Endpoint Specialist Training


What CCES Check Point Certified Endpoint Specialist training is all about?

CCES Check Point Certified Endpoint Specialist Training aims at offering a proficient live online training program for tech-based professionals. They want to deploy and manage Endpoint Security with a dedicated security environment. We suggest getting Check Point CCSA and CCSE certification before attending this Endpoint specialist training course. Primary enrollers for this course would include security engineers, developers, and CheckPoint resellers who require knowledge of deploying and managing Endpoint Security. Aspirants who wish to retrieve CCES certification can also polish their skill set with our integrated modules.

Course objectives for CCES Check Point Certified Endpoint Specialist Training include an introduction to Endpoint security, endpoint security management, deploying endpoint security, data security protection, additional Endpoint server configurations, and advanced threat protection. Reporting and troubleshooting the problems and errors is also a part of this comprehensive CCES training course. Our primary vision in designing this course is to impart technical skill set to an understanding of Check Point Endpoint Security and deploy it to the corporate network environment.

Schedule

Contact us to customize this class with your preferred dates, times and location. You can call us on 1-800-961-0337 or Chat with our representative.

What are the course objectives for CCES Check Point Certified Endpoint Specialist training?
  • Introducing Endpoint Security.
  • Security Endpoint Management
  • Endpoint Security Deployment.
  • Troubleshooting & Reporting.
  • Data Security & Advanced Threat Prevention
  • Endpoint Server Configurations
Who should attend CCES Check Point Certified Endpoint Specialist training?

This training is suitable for technical professionals who necessitate managing and deploying Endpoint Security within environments.

What is the course outline for CCES Check Point Certified Endpoint Specialist training?
  • 1. Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices.
  • 2. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management.
  • 3. Identify and describe key elements of the SmartEndpoint Management console.
  • 4. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console.
  • 5. Explain how to create and assign security policies for Endpoint clients using Endpoint Security.
  • 6. Understand deployment methods and server considerations for Endpoint Security Management installation.
  • 7. Identify the different ways to install and configure Endpoint clients.
  • 8. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources.
  • 9. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
  • 10. Describe additional server configurations that are available to help manage Endpoint clients.
  • 11. Recognize the different types of data security protections available to deploy on end user machines.
  • 12. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
  • 13. Understand how to secure removable media devices.
  • 14. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues.
  • 15. Recognize the types of threats that target Endpoint computers.
  • 16. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment.
  • 17. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources.
  • 18. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events.
  • 19. Understand how to troubleshoot and debug issues.
  • 20. Lab Exercises Include:
  • a). Installing the Endpoint Security Management Solution
  • b). Deploying Endpoint Client Packages
  • c). Deploying Endpoint Policy Servers
  • d). Configuring High Availability for Endpoint Security
  • e). Modifying Client Installations
  • f). Working with Deployment Rules
  • g). Working with SandBlast Agent