Check Point Jump Start: CloudGuard Workload Protection

Learn about Check Point CloudGuard Workload Protection and Application Security
Rating: 4.6 out of 5 (55 ratings)
1,008 students
English
English

Describe the cyber security challenges faced by workloads and web applications in the cloud
Describe Check Point’s solutions for protecting workloads and web applications
Describe the steps required to deploy the various CloudGuard workload protection and application security solutions
Perform light deployments of the various CloudGuard workload protection and application security solutions

Requirements

  • Familiarity with basic cloud networking concepts (e.g. TCP/IP, subnetting) is helpful but not required.

Description

The purpose of this program is to give you an insight into the security challenges involving workload protection and application security in the cloud, and Check Point’s solutions for those challenges. The program will also enable you to perform a basic deployment and configuration of the various solutions under the CloudGuard umbrella.

  • Chapter 1 - Program introduction

  • Chapter 2 – Introduction to Workload protection and application security

    • Lesson 1: Introduction to cybersecurity in the cloud

    • Lesson 2: Security challenges of cloud workloads

    • Lesson 3: CloudGuard Workload Protection

  • Chapter 3 - CloudGuard Workload Protection - Container Security

    • Lesson 1: Recap

    • Lesson 2: Runtime Protection

    • Lesson 3: Image Assurance

    • Lesson 4: Admission Control

    • Lesson 5: Threat Intelligence

    • Lesson 6: Posture Management

    • Lesson 7: Deployment

    • Lesson 8: Deployment troubleshooting

  • Chapter 4 - Shifting protection to the left with CloudGuard ShiftLeft

    • Lesson 1: Introduction to shifting security to the left

    • Lesson 2: Deployment

  • Chapter 5 – CloudGuard Workload protection - Serverless Security

    • Lesson 1: Serverless security

    • Lesson 2: CloudGuard Serverless Security for AWS Lambda

    • Lesson 3: Deployment

  • Chapter 6 – CloudGuard Application Security and API Protection

    • Lesson 1: Introduction to application security and API protection

    • Lesson 2: The CloudGuard AppSec solution

    • Lesson 3: Architecture and deployment considerations

    • Lesson 4: Deployment process

    • Lesson 5: Deployment

    • Lesson 6: Setting up API protection

    • Lesson 7: Data and customization of AppSec policy

  • Chapter 7 – Program summary

Check Point CloudGuard provides unified cloud native security for all your assets and workloads, giving you the confidence to automate security, prevent threats, and manage posture – everywhere – across your multi-cloud environment.

Who this course is for:

  • Network Administrators and Engineers with a background in Cloud Security

Course content

7 sections25 lectures1h 13m total length
  • Program introduction
    02:16

Instructors

Check Point Software Technologies, Ltd.
Check Point Software Technologies, Ltd.
  • 4.6 Instructor Rating
  • 2,591 Reviews
  • 22,748 Students
  • 10 Courses

Founded in 1993, Check Point Software Technologies is the worldwide leader in securing the Internet. Making Internet communications and critical data secure, reliable and available everywhere has been and continues to be our ongoing vision. We are committed to staying focused on real customer needs and to developing new and innovative security solutions that redefine the security landscape.

Check Point’s products and services are sold to enterprises, service providers, small- and medium-sized businesses and consumers. We secure more than 100,000 businesses and millions of users worldwide.

L
  • 4.6 Instructor Rating
  • 55 Reviews
  • 1,008 Students
  • 1 Course
DN
  • 4.6 Instructor Rating
  • 2,591 Reviews
  • 22,748 Students
  • 10 Courses