Checkpoint - CPIS (Check Point Integrity)

Rooman Technologies Pvt. Ltd.
In Bangalore

Price on request
You can also call the Study Centre
80231... More
Want to speak to an Advisor about this course?

Important information

Typology Course
Start Bangalore
  • Course
  • Bangalore
Description

Important information
Venues

Where and when

Starts Location
On request
Bangalore
H.O: # 130, 1st Floor, Dr. Rajkumar Road, 1st Block, Rajajinagar, , 560010, Karnataka, India
See map
Starts On request
Location
Bangalore
H.O: # 130, 1st Floor, Dr. Rajkumar Road, 1st Block, Rajajinagar, , 560010, Karnataka, India
See map

Course programme

Checkpoint - CPIS (Check Point Integrity)

Course Contents :

Check Point Integrity Integrity Architecture:

* Integrity Overview.
* Integrity Architecture.
* Web-based Management.
* Management-Server Platform.
* Integrity Client.
* Integrity Licensing.
* Integrity Administrator Console.
* Installing Integrity Advanced Server.
* Integrity Advanced Server Installation Process.
* Synchronizing User Catalogs.
* Administrator Role Assignments.
* Integrity Client Executables.
* The Control Center.
* Auto-Updating a Client Package.

Policy Management:

* Integrity Security Policies.
* Enterprise Policies.
* Personal Policy.
* The Default Policy.
* Policy Arbitration.
* Policy Rules Overview.
* Classic Firewall Rules.
* Zone Rules and Program Rules.
* Enforcement Rules.
* Rule Evaluation and Precedence.
* How Traffic Is Evaluated.
* Policy Creation.
* Preconfigured Policy Templates.

Enterprise Policies:

* Understanding Firewall Rules.
* Zone Rules.
* Defining Zones.
* How Zone Rules Work.
* Workflow for Zone-Based Security.
* Managing Access Zones.
* Configuring the Trusted Zone.
* Choosing Security Levels.
* Program Control.
* Understanding Program Control.
* Workflow for Program Control.
* Observing Program Activity.
* Creating Program Rules.
* Program Rule Types.
* Program Permissions.
* SmartDefense Program Advisor.
* SmartDefense Program Advisor Process.
* Integrity Advanced Server Program Advisor Process.

Non-secure Endpoints:

* Understanding Enforcement Rules.
* How Enforcement Rules Work.
* What the Restricted User Experiences.
* Enforcement-Rule Workflow.
* Cooperative Enforcement.

Content Inspection:

* Anti-Spyware.
* Understanding Integrity.

Anti-Spyware:

* Configuring Anti-Spyware.
* Setting Up Regular Anti-Spyware Scans.
* Enforcing Anti-Spyware Scans and Treatments.
* Anti-Spyware Updates.
* Preventing E-mail Attacks.
* Understanding Inbound e-mail Protection.
* What the User Experiences.
* Limitations of MailSafe e-mail Protection.
* Understanding Outbound Protection.
* Protecting Instant Messaging.

Monitoring Client Security:

* Monitoring Integrity Endpoint Security.
* Overview of Endpoint Connectivity.
* Tracking Enforcement-Rule Compliance.
* Current Client Compliance Status Report.
* Tracking Client-Security Events.
* Tracking and Observing Programs.

Achievements for this centre