Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Check Point Jump Start: Harmony Endpoint Security

via Cybrary

Description

Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. Check Point Harmony is the industry’s first unified security solution for users' devices and access.

It protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.

The course modules are:

  • Introduction
  • Architecture
    • Architecture-the Flow
    • Architecture-Accessing the Endpoint Server
  • Deployment
    • Deployment-Installing the Client on Windows
    • Deployment-Installing the Client on Linux
    • Deployment-Visibility
    • Deployment-Change Policy
    • Deployment-Upgrade
    • Deployment-Remove a client
  • Communication
    • Communication-Port, Services, and URLs
  • Exclusions
  • Summary

Tags

Syllabus

  • Endpoint Security
    • Introduction
    • Architecture - The Flow
    • Architecture - Accessing the Endpoint Server
    • Deployment - Installing the Client on Windows
    • Deployment - Installing the Client on Linux
    • Deployment - Visibility
    • Deployment - Change Policy
    • Deployment - Upgrade
    • Deployment - Remove a Client
    • Communication - Port, Services, and URLs
    • Exlclusions
    • Summary

Online Course


Check Point Jump Start: Harmony Endpoint Security

via Cybrary
Affiliate notice

Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. Check Point Harmony is the industry’s first unified security solution for users' devices and access.

It protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.

The course modules are:

  • Introduction
  • Architecture
    • Architecture-the Flow
    • Architecture-Accessing the Endpoint Server
  • Deployment
    • Deployment-Installing the Client on Windows
    • Deployment-Installing the Client on Linux
    • Deployment-Visibility
    • Deployment-Change Policy
    • Deployment-Upgrade
    • Deployment-Remove a client
  • Communication
    • Communication-Port, Services, and URLs
  • Exclusions
  • Summary

  • Endpoint Security
    • Introduction
    • Architecture - The Flow
    • Architecture - Accessing the Endpoint Server
    • Deployment - Installing the Client on Windows
    • Deployment - Installing the Client on Linux
    • Deployment - Visibility
    • Deployment - Change Policy
    • Deployment - Upgrade
    • Deployment - Remove a Client
    • Communication - Port, Services, and URLs
    • Exlclusions
    • Summary

Tags