Check Point Jump Start: SMB Appliance Network Security

2

Check Point Jump Start: SMB Appliance Network Security, Enforcing Network Security Policy using Check Point Small and Medium Business (SMB) Appliance – Remastered Audio.

Course Description

Check Point’s Small and Medium Business (SMB) Appliances are high performance, integrated devices offering optional WiFi and LTE support. Standard Check Point Network Security features such as Firewall, VPN, Anti-Virus, Application Control, URL Filtering, Email Security, and SandBlast Zero-Day Protection are supported.

This course includes these modules:

  1. Introduction
  2. What’s New
  3. Standalone Deployment
  4. Logging and Monitoring
  5. Features and Functionality
  6. Clustering
  7. HTTPS-SSL Inspection
  8. Central Management
  9. Threat Emulation
  10. Security Management Portal
  11. Zero Touch and Reach My Device
  12. VPN and Certificates
  13. Watchtower Mobile App
  14. VoIP
  15. DDOS
  16. Cloud Services and SD-WAN
  17. API
  18. Troubleshooting

This course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.

This course will prepare you for the SMB Jump Start exam, #156-413, at Pearson Vue.

Check Point Company Overview

Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

With Check Point Infinity, the only consolidated cyber security solution across cloud, networks, endpoints, mobile and IoT, we are continuously pioneering cyber security innovation with the most advanced AI-based threat Intelligence and prevention technologies, unified security management, and cloud security automation to help protect organizations from 6th generation of cyber attacks.

With over 3,500 security experts, a world-acclaimed research and intelligence unit, and the broadest ecosystem of business and technology partners, we protect over 100,000 organizations of all sizes across all industry verticals in 88 countries to allow better experiences in a safer digital world.


We will be happy to hear your thoughts

Leave a reply

Online Courses
Logo
Register New Account
Compare items
  • Total (0)
Compare
0