CCES Check Point Certified Endpoint Specialist
*Looking for flexible schedule (after hours or weekend)? Please call or email us: 858-208-4141 or email@example.com.
Student financing options are available.
Transitioning military and Veterans, please contact us to sign up for a free consultation on training and hiring options.
The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.
- Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices.
- Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management.
- Identify and describe key elements of the SmartEndpoint Management console.
- Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console.
- Explain how to create and assign security policies for Endpoint clients using Endpoint Security.
- Understand deployment methods and server considerations for Endpoint Security Management installation.
- Identify the different ways to install and configure Endpoint clients.
- Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources.
- Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
- Describe additional server configurations that are available to help manage Endpoint clients.
- Recognize the different types of data security protections available to deploy on end user machines.
- Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
- Understand how to secure removable media devices.
- Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues.
- Recognize the types of threats that target Endpoint computers.
- Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment.
- Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources.
- Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events.
- Understand how to troubleshoot and debug issues
- Introduction to Endpoint Security
- Endpoint Security Management
- Deploying Endpoint Security
- Additional Endpoint Server Configurations
- Data Security Protection
- Advanced Threat Prevention
- Reporting and Troubleshooting
Technical professionals who need to deploy and manage Endpoint Security within their security environment
- Installing the Endpoint Security Management Solution
- Deploying Endpoint Client Packages
- Deploying Endpoint Policy Servers
- Configuring High Availability for Endpoint Security
- Modifying Client Installations
- Working with Deployment Rules
- Working with SandBlast Agent
Prior to taking this course, it is recommended that learners possess the following:
- Check Point CCSA and CCSE Certification
With CCS Learning Academy, you’ll receive:
- 2 Day certified Instructor-led training
- Official Training Seminar Student Handbook
- Pre and Post assessments/evaluations
- Collaboration with classmates (not currently available for self-paced course)
- Real-world learning activities and scenarios
- Exam scheduling support*
- Enjoy job placement assistance for the first 12 months after course completion.
- This course is eligible for CCS Learning Academy’s Learn and Earn Program: get a tuition fee refund of up to 50% if you are placed in a job through CCS Global Tech’s Placement Division*
- Government and Private pricing available.*
*For more details call: 858-208-4141 or email: firstname.lastname@example.org; email@example.com