Harmony Endpoint Specialist
(CCES)
This course is designed for Endpoint Specialists who are responsible for maintaining a Harmony Endpoint security solution. Based on the E86 release. It also helps prepare participants for the Harmony Endpoint Specialist exam.
Learn How To
- Identify the security features and capabilities that Harmony Endpoint provides
- Configure and maintain a Harmony Endpoint Security Management Server
- Deploy local and remote Harmony Endpoint Clients
- Configure and maintain Harmony Endpoint security rules and policies
- Troubleshoot basic deployment and configuration issues
- Identify technologies to expand a Harmony Endpoint configuration
Prerequisites
Working knowledge of Unixbased/Linux and/or Windows operating systems, networking (TCP/IP) and network security, and security administration.
How You Will Benefit
- Apply knowledge of Harmony Endpoint security features and capabilities to protect against imminent threats to the endpoint
- Evaluate and customize security rules and policies to meet an organization’s security needs.
Topics
- Introduction to Harmony Endpoint
- Harmony Endpoint Security Management
- Deploying Harmony Endpoint
- Data Security Protection
- Advanced Threat Prevention
- Advanced Configurations
- Troubleshooting
Objectives
- Describe Check Point Infinity’s Consolidated Security Architecture.
- Explain the difference between the Harmony Endpoint On-Premises and Cloud management environments.
- Identify the main components of the Harmony Endpoint Security Architecture.
- Identity the basic workflow for Harmony Endpoint Security Management.
- Give examples of useful resources for Harmony Endpoint Security Management.
- Log into the Web Management Console.
- Navigate the Web Management interface to gain a basic understanding of the features and capabilities Harmony Endpoint provides for Security Management.
- Discuss situations where it might be necessary to change default policy rules.
- Identify recommended releases for a Harmony Endpoint Client deployment.
- Recognize the different types of data security available to deploy.
- Describe how Full Disk Encryption protects and recovers data that is accessed and stored on Endpoint computers.
- Identify how to secure removable media devices and protect ports.
- Identify remote Help and recovery capabilities.
- Discuss the challenges of threat prevention.
- Give examples of advanced threats.
- Identify how Harmony Endpoint defends networks against advanced threats.
- Identify the components in standalone and distributed Harmony Endpoint deployments.
- Identify sizing guidelines for Harmony Endpoint deployments.
- Explain how to expand the environment for large-scale configurations.
- Explain the difference between Active Directory and High Availability servers.
- Identify useful resources for troubleshooting Harmony Endpoint.
- Give examples of potential problems or issues that might occur when using Harmony Endpoint.
- Investigate and troubleshoot basic Harmony Endpoint troubleshooting scenarios.
Exercises
- Deploying an Endpoint Security Management Server
- Deploying Endpoint Security Clients to Local Hosts
- Deploying Endpoint Security Clients to Remote Hosts
- Changing the Full Disk Encryption Algorithm
- Analyzing and Maintaining Policies
- Configuring Directory Services
- Troubleshooting Endpoint Communication
