Udemy

Check Point Jump Start: Product Deployment

An overview of the methods and tools used for deployment of Check Point products
Free tutorial
Rating: 4.5 out of 5 (90 ratings)
1,783 students
46min of on-demand video
English
English [Auto]

Deploying Check Point Network Security solutions

Requirements

  • Basic familiarity with TCP/IP. Basic familiarity with Linux commands and familiarity with Check Point CLISH commands.

Description

In this course, you will learn the concept of software deployment and the methods and tools used for deployment of Check Point products. And, we will drill down into each deployment tool, providing an overview of how to use it given a common use case.


  • Lesson 1 – Introduction

  • Lesson 2 – Deployment 101

    • In this lesson we will briefly discuss what deployment is, the types and methods of deploying Check Point software, and we’ll go over a high level overview of the Check Point deployment tools.

  • Lesson 3 – CPUSE

    • In this lesson you will learn about when and how you should use CPUSE in a relevant deployment, and you’ll learn some basic troubleshooting during the deployment process.

  • Lesson 4 – CDT

    • In this lesson you will learn about when and how you should use CDT in a relevant deployment, troubleshooting in the deployment process, and using CDT’s RMA mode.

  • Lesson 5 – Central Deployment in SmartConsole

    • In this lesson you will learn about when and how you should use Central Deployment in SmartConsole in a relevant deployment.

  • Lesson 6 – Zero Touch

    • In this lesson you will learn about when and how you should use Zero Touch in a relevant deployment.

  • Lesson 7 – Course summary

Who this course is for:

  • New Check Point customers

Instructor

Check Point Software Technologies, Ltd.
Check Point Software Technologies, Ltd.
  • 4.5 Instructor Rating
  • 3,946 Reviews
  • 28,478 Students
  • 11 Courses

Founded in 1993, Check Point Software Technologies is the worldwide leader in securing the Internet. Making Internet communications and critical data secure, reliable and available everywhere has been and continues to be our ongoing vision. We are committed to staying focused on real customer needs and to developing new and innovative security solutions that redefine the security landscape.

Check Point’s products and services are sold to enterprises, service providers, small- and medium-sized businesses and consumers. We secure more than 100,000 businesses and millions of users worldwide.

Top companies trust Udemy

Get your team access to Udemy's top 19,000+ courses