![]() ![]() In this CCES course, we would learn how to configure Full Disk Encryption, Media Encryption & Port Protection, OneCheck User Authentication, Capsule Docs (for protecting sensitive documents), Anti-Malware, Sandblast Anti-Ransomware, Behavioral Guard and Forensics. We would also learn how to configure Endpoint Security using an on-premise Endpoint Security Management Server and the SmartEndpoint. In this CCES course, we would learn how to configure Checkpoint Endpoint Security using Harmony Endpoint (also called the cloud-based Infinity Portal). While our previously produced CCSA course shows how to protect the perimeter using a Next-Generation Firewall (NGFW), this Course, Checkpoint Certified Endpoint Specialist, shows how to proffer layered security by protecting the endpoints. ![]() ![]() Having an hybrid approach to network security entails having both perimeter and endpoint security solutions that protect assets and infrastructure anywhere i.e., both on-premise and off-premise. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |