Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
30 views1 page

Training Data Sheet HarmonyCCES

The Check Point Harmony Endpoint Specialist (CCES) course is aimed at Security Administrators responsible for managing Harmony Endpoint security solutions. It covers topics such as security management, advanced threat prevention, and data protection, with a focus on practical skills and troubleshooting. Prerequisites include knowledge of Unix/Linux or Windows operating systems, networking, and security administration.

Uploaded by

mritto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views1 page

Training Data Sheet HarmonyCCES

The Check Point Harmony Endpoint Specialist (CCES) course is aimed at Security Administrators responsible for managing Harmony Endpoint security solutions. It covers topics such as security management, advanced threat prevention, and data protection, with a focus on practical skills and troubleshooting. Prerequisites include knowledge of Unix/Linux or Windows operating systems, networking, and security administration.

Uploaded by

mritto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CHECK POINT

HARMONY ENDPOINT SPECIALIST


(CCES)

AUDIENCE GOALS PREREQUISITES


This course is designed for Demonstrate an understanding of the Check Working knowledge of Unix-
Security Administrators Point Harmony Endpoint solution, including based/Linux and/or Windows
who are responsible for its features and capabilities. Apply knowledge operating systems, networking
managing a Harmony and skills gained during training to manage (TCP/IP) and network security,
Endpoint security solution. and protect a Harmony Endpoint solution. and security administration.

TOPICS

Introduction to Harmony Endpoint Harmony Endpoint Security Management Deploying Harmony Endpoint Data Security Protection

Advanced Threat Prevention Advanced Configurations Troubleshooting

OBJECTIVES
• Describe Check Point Infinity’s Consolidated Security Architecture. • Describe how Full Disk Encryption protects and recovers data that is
• Explain the difference between the Harmony Endpoint On-Premises accessed and stored on Endpoint computers.
and Cloud management environments. • Identify how to secure removable media devices and protect ports.
• Identify the main components of the Harmony Endpoint Security • Identify remote Help and recovery capabilities.
Architecture. • Discuss the challenges of threat prevention.
• Identity the basic workflow for Harmony Endpoint Security • Give examples of advanced threats.
Management. • Identify how Harmony Endpoint defends networks against advanced
• Give examples of useful resources for Harmony Endpoint Security threats.
Management. • Identify the components in standalone and distributed Harmony
• Log into the Web Management Console. Endpoint deployments.
• Navigate the Web Management interface to gain a basic • Identify sizing guidelines for Harmony Endpoint deployments.
understanding of the features and capabilities Harmony Endpoint • Explain how to expand the environment for large-scale configurations.
provides for Security Management. • Explain the difference between Active Directory and High Availability
• Discuss situations where it might be necessary to change default servers.
policy rules. • Identify useful resources for troubleshooting Harmony Endpoint.
• Identify recommended releases for a Harmony Endpoint Client • Give examples of potential problems or issues that might occur when
deployment. using Harmony Endpoint.
• Recognize the different types of data security available to deploy. • Investigate and troubleshoot basic Harmony Endpoint troubleshooting
scenarios.

EXERCISES
• Deploying an Endpoint Security Management Server • Analyzing and Maintaining Policies
• Deploying Endpoint Security Clients to Local Hosts • Configuring Directory Services
• Deploying Endpoint Security Clients to Remote Hosts • Troubleshooting Endpoint Communication
• Changing the Full Disk Encryption Algorithm

CCES
CERTIFICATION
INFORMATION
Prepare for exam #156-535 VUE.com/checkpoint
© 2022 Check Point Software Technologies Ltd. All rights reserved.
[Protected] Non-confidential content – DOC-TDS-CCES-R81-V1.1-062022

You might also like