Check Point Jump Start: Harmony Endpoint Security

Prevents, protects against and quickly responds to advanced attacks on Endpoint devices
Rating: 4.6 out of 5 (59 ratings)
927 students
English
English

Network Administrators and Engineers interested in Endpoint Security

Requirements

  • Familiarity with basic networking concepts (e.g. TCP/IP, subnetting) is helpful but not required.

Description

Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.

With remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding.

Check Point Harmony is the industry’s first unified security solution for users' devices and access.
It protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.

The course modules are:

  1. Introduction

  2. Architecture

    1. Architecture-the Flow

    2. Architecture-Accessing the Endpoint Server

  3. Deployment

    1. Deployment-Installing the Client on Windows

    2. Deployment-Installing the Client on Linux

    3. Deployment-Visibility

    4. Deployment-Change Policy

    5. Deployment-Upgrade

    6. Deployment-Remove a client

  4. Communication

    1. Communication-Port, Services, and URLs

  5. Exclusions

  6. Summary

Check Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Who this course is for:

  • Network Administrators and Engineers interested in Endpoint Security

Course content

6 sections12 lectures35m total length
  • Introduction
    00:31

Instructors

Check Point Software Technologies, Ltd.
Check Point Software Technologies, Ltd.
  • 4.6 Instructor Rating
  • 2,591 Reviews
  • 22,748 Students
  • 10 Courses

Founded in 1993, Check Point Software Technologies is the worldwide leader in securing the Internet. Making Internet communications and critical data secure, reliable and available everywhere has been and continues to be our ongoing vision. We are committed to staying focused on real customer needs and to developing new and innovative security solutions that redefine the security landscape.

Check Point’s products and services are sold to enterprises, service providers, small- and medium-sized businesses and consumers. We secure more than 100,000 businesses and millions of users worldwide.

DN
  • 4.6 Instructor Rating
  • 2,591 Reviews
  • 22,748 Students
  • 10 Courses