CHECK POINT
HARMONY ENDPOINT SPECIALIST
(CCES)
AUDIENCE GOALS PREREQUISITES
This course is designed for Demonstrate an understanding of the Check Working knowledge of Unix-
Security Administrators Point Harmony Endpoint solution, including based/Linux and/or Windows
who are responsible for its features and capabilities. Apply knowledge operating systems, networking
managing a Harmony and skills gained during training to manage (TCP/IP) and network security,
Endpoint security solution. and protect a Harmony Endpoint solution. and security administration.
TOPICS
Introduction to Harmony Endpoint Harmony Endpoint Security Management Deploying Harmony Endpoint Data Security Protection
Advanced Threat Prevention Advanced Configurations Troubleshooting
OBJECTIVES
• Describe Check Point Infinity’s Consolidated Security Architecture. • Describe how Full Disk Encryption protects and recovers data that is
• Explain the difference between the Harmony Endpoint On-Premises accessed and stored on Endpoint computers.
and Cloud management environments. • Identify how to secure removable media devices and protect ports.
• Identify the main components of the Harmony Endpoint Security • Identify remote Help and recovery capabilities.
Architecture. • Discuss the challenges of threat prevention.
• Identity the basic workflow for Harmony Endpoint Security • Give examples of advanced threats.
Management. • Identify how Harmony Endpoint defends networks against advanced
• Give examples of useful resources for Harmony Endpoint Security threats.
Management. • Identify the components in standalone and distributed Harmony
• Log into the Web Management Console. Endpoint deployments.
• Navigate the Web Management interface to gain a basic • Identify sizing guidelines for Harmony Endpoint deployments.
understanding of the features and capabilities Harmony Endpoint • Explain how to expand the environment for large-scale configurations.
provides for Security Management. • Explain the difference between Active Directory and High Availability
• Discuss situations where it might be necessary to change default servers.
policy rules. • Identify useful resources for troubleshooting Harmony Endpoint.
• Identify recommended releases for a Harmony Endpoint Client • Give examples of potential problems or issues that might occur when
deployment. using Harmony Endpoint.
• Recognize the different types of data security available to deploy. • Investigate and troubleshoot basic Harmony Endpoint troubleshooting
scenarios.
EXERCISES
• Deploying an Endpoint Security Management Server • Analyzing and Maintaining Policies
• Deploying Endpoint Security Clients to Local Hosts • Configuring Directory Services
• Deploying Endpoint Security Clients to Remote Hosts • Troubleshooting Endpoint Communication
• Changing the Full Disk Encryption Algorithm
CCES
CERTIFICATION
INFORMATION
Prepare for exam #156-535 VUE.com/checkpoint
© 2022 Check Point Software Technologies Ltd. All rights reserved.
[Protected] Non-confidential content – DOC-TDS-CCES-R81-V1.1-062022