CheckPoint Endpoint Security

Video Tutorials, Courses

CheckPoint Endpoint Security
Published 08/2022
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 48.0 KHz
Language: English | Size: 2.17 GB | Duration: 23 lectures • 6h 16m
Checkpoint Certified Endpoint Specialist R81


What you'll learn
Students would learn about Checkpoint Endpoint Security
Students would learn how to deploy and manage endpoints either via the Endpoint Security Management Server or via the Harmony Endpoint (Infinity Portal).
Students would learn how to protect endpoints using Anti-Bot, Anti-Exploit, Anti-Ransomware, Behavioral Guard, and Forensics.
Students would learn how to configure Anti-Malware, Threat Prevention, Threat Emulation.
Students would learn how to configure Application Control, Client Settings, Push Operations etc.
Students would also learn how to configure Remote Access VPN for Endpoints, how to use Remote Help and configure Reporting
Requirements
Basic Networking Knowledge
CCSA knowledge (If you don't have, we would start from scratch)
Description
Having an hybrid approach to network security entails having both perimeter and endpoint security solutions that protect assets and infrastructure anywhere i.e., both on-premise and off-premise. While our previously produced CCSA course shows how to protect the perimeter using a Next-Generation Firewall (NGFW), this Course, Checkpoint Certified Endpoint Specialist, shows how to proffer layered security by protecting the endpoints.
In this CCES course, we would learn how to configure Checkpoint Endpoint Security using Harmony Endpoint (also called the cloud-based Infinity Portal). We would also learn how to configure Endpoint Security using an on-premise Endpoint Security Management Server and the SmartEndpoint.
In this CCES course, we would learn how to configure Full Disk Encryption, Media Encryption & Port Protection, OneCheck User Authentication, Capsule Docs (for protecting sensitive documents), Anti-Malware, Sandblast Anti-Ransomware, Behavioral Guard and Forensics.
In this CCES course, we would also learn how to configure Sandblast Agent Anti-Bot, Threat Extraction, Threat Emulation and Anti-Exploit. We would learn about URL Filtering, Firewall (defining inbound and outbound rules for Endpoints), Access Zones, Application Control, Remote Access VPN (so remote workers can securely connect to the office).
Furthermore, we would learn about Compliance, Client Settings, Push Operations, Remote Help and Reporting.
Topics Include:
* Full Disk Encryption
* Media Encryption & Port Protection
* OneCheck User Authentication
* Capsule Docs
* Anti-Malware
* Anti-Ransomware
* Behavioral Guard and Forensics
* Sandblast Anti-Bot
* Threat Extraction
* Threat Emulation
* Anti-Exploit
* URL Filtering
* Firewall
* Access Zones
* Application Control
* Remote Access VPN
* Compliance
* Remote Help
* Client Settings
* Push Operations
* Reporting
Who this course is for
Network Administrators, Network Security Engineers, IT Administrators etc, and anyone interested in protecting their laptops using Checkpoint Endpoint Security


Homepage
https://www.udemy.com/course/checkpoint-endpoint-security/




Download ( Rapidgator )
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
Download (Uploadgig)
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
Download ( NitroFlare )
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM

Please Help Me Click Connect Icon Below Here and Share News to Social Network | Thanks you !