- Overview
- Prerequisites
- Schedules
- Objectives
- Why ProbotLearning
- Curriculum
CCES Check Point Certified Endpoint Specialist Training
CCES Check Point Certified Endpoint Specialist Training aims at offering a proficient live online training program for tech-based professionals. They want to deploy and manage Endpoint Security with a dedicated security environment.
Category : Checkpoint
Course Price : $2154 Per Participant
Course Details
- Certification: YES
- Skill Level: Intermediate
- Enrolled: 1581
- Duration: 5 Days
500+
Courses
20+
Years of Experience
95k+
Global Learners
Course Description
CCES Check Point Certified Endpoint Specialist Training aims to offer a proficient live online training program for tech-based professionals.
They want to deploy and manage Endpoint Security with a dedicated security environment. We suggest getting Check Point CCSA and CCSE certification before attending this Endpoint specialist training course.
Primary enrollers for this course would include security engineers, developers, and CheckPoint resellers who require knowledge of deploying and managing Endpoint Security.
Aspirants who wish to retrieve CCES certification can also polish their skill set with our integrated modules.
Course objectives for CCES Check Point Certified Endpoint Specialist Training include an introduction to Endpoint security, endpoint security management, deploying endpoint security, data security protection, additional Endpoint server configurations, and advanced threat protection.
Reporting and troubleshooting problems and errors is also a part of this comprehensive CCES training course.
Our primary vision in designing this course is to impart a technical skill set to an understanding of Check Point Endpoint Security and deploy it to the corporate network environment.
What You Learn at Probot Learning:
- Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices.
- Identify and describe key elements of the SmartEndpoint Management console.
- Explain how to create and assign security policies for Endpoint clients using Endpoint Security.
- Identify the different ways to install and configure Endpoint clients.
- Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
- Recognize the different types of data security protections available to deploy on end user machines.
- Understand how to secure removable media devices.
- Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management.
- Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console.
- Understand deployment methods and server considerations for Endpoint Security Management installation.
- Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources.
- Describe additional server configurations that are available to help manage Endpoint clients.
- Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
- Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues.
Prerequisites
Prior to taking this course, it is recommended that learners possess the following:
- Check Point CCSA and CCSE Certification
Who should attend this course?
- This training is suitable for technical professionals who necessitate managing and deploying Endpoint Security within environments.
What You Receive at Probot Learning:
Certified Instructor-led training
Industry Best Trainers
Official Training Course Student Handbook
Pre and Post assessments/evaluations
Collaboration with classmates (not available for a self-paced course)
Real-world knowledge activities and scenarios
Exam scheduling support*
Learn and earn program*
Practice Tests
Knowledge acquisition and exam-oriented
Learning Modules
Introduction to Endpoint Security
This module describes the structure and capabilities of a SharePoint environment, and the major changes for IT professionals in SharePoint 2016. This module also describes the options available for deploying SharePoint 2016.
- Key components of a SharePoint deployment
- New features in SharePoint 2016
- SharePoint 2016 deployment options
After completing this module, students will be able to:
- Identify the architecture and capabilities of SharePoint 2016.
- Identify new and deprecated features in SharePoint 2016.
- Identify deployment options for SharePoint 2016.
Endpoint Security Management
This module describes how to gather business requirements, and the key elements of a successful information architecture project. This module also explains how to structure information within a SharePoint 2016 deployment and make it easy to find and retrieve.
- Identifying business requirements
- Understanding business requirements
- Organizing information in SharePoint 2016
- Planning for discoverability
Lab: Designing an information architecture – Part one
- Identifying site columns and content types
Lab: Creating an information architecture – Part two
- Designing a business taxonomy
After completing this module, students will be able to:
- Explain how understanding business requirements drives the design of an organizational information architecture.
- Describe the key components available in SharePoint 2016 to deploy an information architecture.
- Plan for discoverability as part of an information architecture deployment.
Deploying Endpoint Security
This module explains how to approach a logical architecture design and how to document it.
- Overview of the SharePoint 2016 logical architecture
- Documenting your logical architecture
Lab: Designing a logical architecture
- Planning a logical architecture
- Producing a logical architecture diagram
After completing this module, students will be able to:
- Map business requirements to SharePoint 2016 architecture components.
- Explain the importance of documentation and describe the options for documenting the logical architecture.
Additional Endpoint Server Configurations
This module describes the physical design requirements for SharePoint 2016, and the physical components necessary to fulfill the physical architecture design. It also explains the SharePoint farm topologies, and describes how to map a logical architecture design to a physical architecture design.
- Designing physical components for SharePoint deployments
- Designing supporting components for SharePoint deployments
- SharePoint farm topologies
- Mapping a logical architecture design to a physical architecture design
Lab: Designing a physical architecture
- Designing a physical architecture
- Developing a physical architecture design diagram
After completing this module, students will be able to:
- Describe the requirements for the physical components that are needed for a SharePoint 2016 deployment.
- Describe the requirements for the supporting components that are needed for a successful SharePoint 2016 deployment.
- Identify SharePoint farm topologies.
- Map a logical architecture design to a physical architecture design.
Data Security Protection
This module explains how to install SharePoint 2016 in different topologies, script the installation, and configure a SharePoint 2016 environment. This module also explains how to configure the core farm-level settings in a SharePoint 2016 deployment.
- Installing SharePoint 2016
- Scripting installation and configuration of SharePoint
- Configuring SharePoint 2016 farm settings
Lab: Deploying and configuring SharePoint 2016 – Part one
- Provisioning a SharePoint 2016 farm
Lab: Deploying and configuring SharePoint 2016 – Part two
- Configuring incoming email
- Configuring outgoing email
- Configuring integration with Office Online Server
After completing this module, students will be able to:
- Install SharePoint 2016.
- Deploy and configure SharePoint 2016.
- Script the installation and configuration of SharePoint 2016.
- Configure SharePoint 2016 farm settings.
Advanced Threat Prevention
This module explains how to create web applications in SharePoint 2016 and how to configure these applications. It also explains how to create and configure site collections in SharePoint 2016 and SharePoint Online.
- Creating web applications
- Configuring web applications
- Creating and configuring site collections
Lab: Creating and configuring web applications
- Creating a web application
- Configuring a web application
Lab: Creating and configuring site collections
- Creating and configuring site collections
- Creating a site collection in a new content database
- Using Fast Site Collection Creation
After completing this module, students will be able to:
- Create web applications.
- Configure web applications.
- Create and configure site collections.
Reporting and Troubleshooting
This module describes the service application architecture in SharePoint 2016, and how to provision and manage service applications.
- Introduction to the service application architecture
- Creating and configuring service applications
Lab: Planning and configuring service applications
- Provisioning a Managed Metadata Service application with Central Administration
- Provisioning a Managed Metadata Service application with Windows PowerShell
- Configuring the Word Automation Services service application for document conversion
- Configuring service application proxy groups
After completing this module, students will be able to:
- Explain the key components and topologies for a SharePoint 2016 service application architecture.
- Plan for service accounts and service application dependencies.
- Understand the purpose of mapping service applications to business requirements.
- Describe how to provision and manage SharePoint 2016 service applications
Lab Exercises Include:
This module explains how to configure authorization in SharePoint 2016. It also explains how to configure site collection security in SharePoint 2016.
- Configuring authorization in SharePoint 2016
- Managing access to content
Lab: Managing users and groups
- Creating a web-application policy
- Creating and managing SharePoint groups
- Creating custom permission levels
Lab: Securing content in SharePoint sites
- Managing permissions and inheritance
- Managing site-collection security
- Enabling anonymous access to a site
After completing this module, students will be able to:
- Manage users and permissions in SharePoint 2016.
- Manage access to content in SharePoint 2016.