Harmony Endpoint Specialist (CCES)

Course Description

This course is designed for Endpoint Specialists responsible for holding a Harmony Endpoint security solution. Based on the E86 release. It also helps prepare participants for the Harmony Endpoint Specialist exam.

Learn How To

  • Identify the security features & capabilities that Harmony Endpoint provides.
  • Configure & maintain a Harmony Endpoint Security Management Server
  • Deploy local & remote Harmony Endpoint Clients
  • Configure & maintain Harmony Endpoint security rules & policies
  • Troubleshoot basic deployment & configuration issues
  • Identify technologies to expand a Harmony Endpoint configuration

Prerequisites

Working knowledge of Unix based/Linux &/or Windows operating systems, networking (TCP/IP) & network security and security administration.

Target Audience

This course is designed for Security Administrators responsible for managing a Harmony Endpoint security solution.

Learning Objectives

  • Explain Check Point Infinity’s Consolidated Security Architecture. 
  • Describe the distinction between the Harmony Endpoint On-Premises & Cloud management environments. 
  • Recognize the main components of the Harmony Endpoint Security Architecture. 
  • Identify the basic workflow for Harmony Endpoint Security Management. 
  • Give examples of valuable resources for Harmony Endpoint Security Management. 
  • Log into the Web Management Console. 
  • Guide the Web Management interface to acquire a basic understanding of the elements & capabilities Harmony Endpoint provides for Security Management.
  • Discuss situations where it might be required to change default policy rules. 
  • Recognize recommended releases for a Harmony Endpoint Client deployment. 
  • Identify the different types of data security available to deploy. 
  • Explain how Full Disk Encryption protects & recovers data that is accessed & stored on Endpoint computers. 
  • Recognize how to secure removable media devices & protect ports. 
  • Recognize remote Help & recovery capabilities. 
  • Discuss the challenges of threat prevention. 
  • Give illustrations of advanced threats. 
  • Recognize how Harmony Endpoint defends networks against advanced threats. 
  • Recognize the components in standalone & distributed Harmony Endpoint deployments. 
  • Recognize sizing guidelines for Harmony Endpoint deployments. 
  • Describe how to expand the environment for large-scale configurations. 
  • Describe the difference between Active Directory & High Availability servers. 
  • Recognize valuable resources for troubleshooting Harmony Endpoint. 
  • Give illustrations of potential problems or issues when using Harmony Endpoint. 
  • Research & troubleshoot basic Harmony Endpoint troubleshooting scenarios.

 

Content Outline

  • Introduction to Harmony Endpoint 
  • Harmony Endpoint Security Management 
  • Deploying Harmony Endpoint
  • Data Security Protection 
  • Advanced Threat Prevention 
  • Advanced Configurations 
  • Troubleshooting
  • Deploying an Endpoint Security Management Server 
  • Deploying Endpoint Security Clients to Local Hosts 
  • Deploying Endpoint Security Clients to Remote Hosts 
  • Changing the Full Disk Encryption Algorithm
  • Analyzing & Maintaining Policies 
  • Configuring Directory Services 
  • Troubleshooting Endpoint Communication

Demonstrate a comprehension of the Check Point Harmony Endpoint solution, including its components & capabilities. Apply knowledge & skills gained during training to manage & protect a Harmony Endpoint solution.

 

FAQs

To become an Endpoint specialist, you must start with Endpoint fundamentals. An individual with a professional experience in an Endpoint-specific job role can easily aim at improving their skills with official certification. However, you could also be included in other scenarios.

 

Endpoint Specialists responsible for maintaining a Harmony Endpoint security solution.

 

To attend the training session, one should have operational Desktops or Laptops with the needed specification and a suitable internet connection to access the labs. 

 

We would always suggest you attend the live session to practice & clear the doubts instantly & get more value from your investment. However, if you have to skip the class due to some emergency, Radiant Techlearning will assist you with the recorded session of that particular day. However, those sessions are not meant only for private consumption & NOT for distribution or commercial use.

 

Radiant Techlearning has a data center containing a Virtual Training environment for participant hand-on-practice. 

Learners can easily access these labs over Cloud with the assistance of a remote desktop connection. 

Radiant virtual labs enable you to learn from anywhere in the world & in any time zone. 

 

The learners will be enthralled as we engage them the real-world & industry Oriented projects during the training program. These projects will improve your skills & knowledge & you will gain a better experience. These real-time projects will help you a lot in your future tasks & assignments.

Send a Message.


  • Enroll