Checkpoint - CPIS (Check Point Integrity)

Rooman Technologies Pvt. Ltd.
In Bangalore

Price on request
You can also call the Study Centre
80231... More

Important information

  • Course
  • Bangalore
Description

Important information
Venues

Where and when

Starts Location
On request
Bangalore
H.O: # 130, 1st Floor, Dr. Rajkumar Road, 1st Block, Rajajinagar, , 560010, Karnataka, India
See map

Course programme

Checkpoint - CPIS (Check Point Integrity)

Course Contents :

Check Point Integrity Integrity Architecture:

* Integrity Overview.
* Integrity Architecture.
* Web-based Management.
* Management-Server Platform.
* Integrity Client.
* Integrity Licensing.
* Integrity Administrator Console.
* Installing Integrity Advanced Server.
* Integrity Advanced Server Installation Process.
* Synchronizing User Catalogs.
* Administrator Role Assignments.
* Integrity Client Executables.
* The Control Center.
* Auto-Updating a Client Package.

Policy Management:

* Integrity Security Policies.
* Enterprise Policies.
* Personal Policy.
* The Default Policy.
* Policy Arbitration.
* Policy Rules Overview.
* Classic Firewall Rules.
* Zone Rules and Program Rules.
* Enforcement Rules.
* Rule Evaluation and Precedence.
* How Traffic Is Evaluated.
* Policy Creation.
* Preconfigured Policy Templates.

Enterprise Policies:

* Understanding Firewall Rules.
* Zone Rules.
* Defining Zones.
* How Zone Rules Work.
* Workflow for Zone-Based Security.
* Managing Access Zones.
* Configuring the Trusted Zone.
* Choosing Security Levels.
* Program Control.
* Understanding Program Control.
* Workflow for Program Control.
* Observing Program Activity.
* Creating Program Rules.
* Program Rule Types.
* Program Permissions.
* SmartDefense Program Advisor.
* SmartDefense Program Advisor Process.
* Integrity Advanced Server Program Advisor Process.

Non-secure Endpoints:

* Understanding Enforcement Rules.
* How Enforcement Rules Work.
* What the Restricted User Experiences.
* Enforcement-Rule Workflow.
* Cooperative Enforcement.

Content Inspection:

* Anti-Spyware.
* Understanding Integrity.

Anti-Spyware:

* Configuring Anti-Spyware.
* Setting Up Regular Anti-Spyware Scans.
* Enforcing Anti-Spyware Scans and Treatments.
* Anti-Spyware Updates.
* Preventing E-mail Attacks.
* Understanding Inbound e-mail Protection.
* What the User Experiences.
* Limitations of MailSafe e-mail Protection.
* Understanding Outbound Protection.
* Protecting Instant Messaging.

Monitoring Client Security:

* Monitoring Integrity Endpoint Security.
* Overview of Endpoint Connectivity.
* Tracking Enforcement-Rule Compliance.
* Current Client Compliance Status Report.
* Tracking Client-Security Events.
* Tracking and Observing Programs.