Check Point Endpoint Security E80
Course
In London
Description
-
Type
Course
-
Location
London
-
Start date
Different dates available
Check Point Endpoint Security E80 Training CourseThe Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities in a single console. This 3-day course teaches how to monitor, manage and enforce policy, from an at-a-glance dashboard down to user and machine details, all with a few clicks.
Facilities
Location
Start date
Start date
Reviews
Subjects
- Security
- IT Security
- IT Management
- Management
- Security Management
Course programme
• Deploy Clients and software blades
• Manage users and provide access to protected resources
• Build a strategy for implementing Endpoint Security across an existing corporate infrastructure
• Install and deploy Endpoint Security E80 in a corporate environment suitable to company infrastructure requirements
• Perform multiple client installations on local and remote sites all at once
• Design a standard endpoint policy for users based on departmental requirements
• Verify client functionality based on the defined policy
• Adjust maintenance cycles according to needs assessments and provide updates to users seamlessly company-wide
• Monitor, track and update users based on feedback from users in the field and logged information about network traffic
• Report findings of network activity for specific departments, or across the corporate infrastructure to determine needs and value assessments
LAB EXERCISES INCLUDE
• Install Endpoint Security E80 Server
• Security Gateway Configuration
• Microsoft .Net Framework Installation (optional)
• Configure Endpoint Security Management
• Configure the directory scanner
• Deploy the initial client package
• Managing and applying software blades in Policies
• One Check User settings
• Full Disk Encryption
• Media Encryption and Port Protection
• Firewall Rules
• Application Control
• Access Zones Definitions
• Malware Protection
• Creating the Organizational Unit Policy
• Accessing the User Node
• MIS OU Requirements
• Exception for users
• Auditing and Reporting standards
• Monitoring and Reporting with Endpoint Security E80
• Guidelines for Troubleshooting
• Installation Issues
• Client Debugging
• Management Debugging
• Important Files locations
Additional information
Expenses
Check Point Endpoint Security E80