Check Point Jump Start: Product Deployment

An overview of the methods and tools used for deployment of Check Point products
Rating: 4.7 out of 5 (36 ratings)
1,090 students
English
English [Auto]

Deploying Check Point Network Security solutions

Requirements

  • Basic familiarity with TCP/IP. Basic familiarity with Linux commands and familiarity with Check Point CLISH commands.

Description

In this course, you will learn the concept of software deployment and the methods and tools used for deployment of Check Point products. And, we will drill down into each deployment tool, providing an overview of how to use it given a common use case.


  • Lesson 1 – Introduction

  • Lesson 2 – Deployment 101

    • In this lesson we will briefly discuss what deployment is, the types and methods of deploying Check Point software, and we’ll go over a high level overview of the Check Point deployment tools.

  • Lesson 3 – CPUSE

    • In this lesson you will learn about when and how you should use CPUSE in a relevant deployment, and you’ll learn some basic troubleshooting during the deployment process.

  • Lesson 4 – CDT

    • In this lesson you will learn about when and how you should use CDT in a relevant deployment, troubleshooting in the deployment process, and using CDT’s RMA mode.

  • Lesson 5 – Central Deployment in SmartConsole

    • In this lesson you will learn about when and how you should use Central Deployment in SmartConsole in a relevant deployment.

  • Lesson 6 – Zero Touch

    • In this lesson you will learn about when and how you should use Zero Touch in a relevant deployment.

  • Lesson 7 – Course summary

Who this course is for:

  • New Check Point customers

Course content

7 sections7 lectures45m total length
  • Introduction
    01:20

Instructors

Check Point Software Technologies, Ltd.
Check Point Software Technologies, Ltd.
  • 4.6 Instructor Rating
  • 2,591 Reviews
  • 22,748 Students
  • 10 Courses

Founded in 1993, Check Point Software Technologies is the worldwide leader in securing the Internet. Making Internet communications and critical data secure, reliable and available everywhere has been and continues to be our ongoing vision. We are committed to staying focused on real customer needs and to developing new and innovative security solutions that redefine the security landscape.

Check Point’s products and services are sold to enterprises, service providers, small- and medium-sized businesses and consumers. We secure more than 100,000 businesses and millions of users worldwide.

DN
  • 4.6 Instructor Rating
  • 2,591 Reviews
  • 22,748 Students
  • 10 Courses
Leading provider of cyber security solutions
Check Point Software Technologies LTD
  • 4.6 Instructor Rating
  • 2,436 Reviews
  • 21,884 Students
  • 7 Courses

Check Point is a multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management. As of 2019 the company has approximately 5,000 employees worldwide.