Contact CCES
Overview
This course is designed for Security Administrators responsible for deploying and managing a Harmony Endpoint security solution.
Students will learn:
- Describe Check Point Infinity’s Consolidated Security Architecture.
- Identify the main components of the Harmony Endpoint Security Architecture.
- Log in to the Web Management Console.
- Discuss situations where it might be necessary to change default policy rules.
- Recognize the different types of data security available to deploy.
- Describe how Full Disk Encryption protects and recovers
- Identify how to secure removable media devices and protect ports.
- Identify remote help and recovery capabilities.
- Discuss the challenges of threat prevention.
- Identify how Harmony Endpoint defends networks against advanced threats.
Duration
Language
- English
- Portuguese
- Spanish
Delivery Mode:
Location Mexico