Check Point Certified Endpoint Specialist (CCES)

This 2-day specialist course provides an understanding of the skills necessary to effectively manage and protect your endpoint security network using the Check Point R81 Harmony Endpoint product.

Audience

This course is designed for security engineers, developers, technical professionals and Check Point resellers who need to deploy and manage Endpoint Security within their security environment and are working towards their Point Certified Endpoint Specialist (CCES) certification.

Prerequisites

  • Working knowledge of UNIX and/or Windows operating systems
  • Working knowledge of Networking TCP/IP
  • Advanced knowledge of Check Point Security products

Course objectives

  • Understand the emergence of increasingly more sophisticated cyberattacks and the need to protect endpoints.
  • Explain the advantages of Harmony Endpoint as a security solution. 
  • Become familiar with the growing Endpoint Security Market.
  • Describe the key elements of the Harmony Endpoint Architecture.
  • Describe the Harmony Endpoint Management Environment.
  • Understand Check Point’s Infinity Portal.
  • Explain the new Harmony Endpoint Web Management Service
  • Identify main features of the Harmony Endpoint Management console.
  • Explain how to create and assign security policies for Endpoint clients using endpoint security. 
  • Understand deployment methods and server considerations for Endpoint Security Management installation.
  • Identify the different ways to install and configure Endpoint clients.
  • Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
  • Describe additional server configurations that are available to help manage Endpoint clients.
  • Recognize the different types of data security available to deploy on end user machines.
  • Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
  • Understand how to secure removable media devices.
  • Understand how Harmony Endpoint is defending company networks against sophisticated attacks.
  • Describe Check Point Harmony Endpoint Agent.
  • Explain how Harmony Endpoint Agent’s advanced technologies are preventing attacks from infiltrating Endpoint machines and corporate resources.
  • Become familiar with Harmony Endpoint troubleshooting methods
  • Understand how to troubleshoot and debug issues that may occur in the Endpoint Security environment.

Exercises:

  • Activate the Harmony Endpoint manager in the Cloud.
  • Configure Active Directory.
  • Connect Active Directory to the Cloud management server.
  • Install Initial Agent on the Domain Controller.
  • Demonstrate how to deploy the Harmony Endpoint Agent on a client.
  • Configure the policy operation mode.
  • Create exception rules for specific removable media devices.
  • Deploy and configure Anti-Bot and URL Filtering on an Endpoint client.
  • Configure and deploy Full Disk Encryption on a client.
  • Test Anti-Bot behavioral engine.
  • Configure and deploy Media Encryption.
  • Block access to certain websites for specific user groups.
  • Configure and deploy Port Protection on an Endpoint client.
  • Perform threat emulation and extraction of malicious content.
  • Learn how to extract malicious content from a document.

Certification

This course is recommended as preparation for exam 156-530: Check Point Certified Endpoint Specialist (CCES).

Other relevant courses