Checkpoint - CPIS (Check Point Integrity)

Course

In Bangalore

Price on request

Description

  • Type

    Course

  • Location

    Bangalore

Facilities

Location

Start date

Bangalore (Karnātaka)
See map
H.O: # 130, 1st Floor, Dr. Rajkumar Road, 1st Block, Rajajinagar, , 560010

Start date

On request

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Checkpoint - CPIS (Check Point Integrity)

Course Contents :

Check Point Integrity Integrity Architecture:

* Integrity Overview.
* Integrity Architecture.
* Web-based Management.
* Management-Server Platform.
* Integrity Client.
* Integrity Licensing.
* Integrity Administrator Console.
* Installing Integrity Advanced Server.
* Integrity Advanced Server Installation Process.
* Synchronizing User Catalogs.
* Administrator Role Assignments.
* Integrity Client Executables.
* The Control Center.
* Auto-Updating a Client Package.

Policy Management:

* Integrity Security Policies.
* Enterprise Policies.
* Personal Policy.
* The Default Policy.
* Policy Arbitration.
* Policy Rules Overview.
* Classic Firewall Rules.
* Zone Rules and Program Rules.
* Enforcement Rules.
* Rule Evaluation and Precedence.
* How Traffic Is Evaluated.
* Policy Creation.
* Preconfigured Policy Templates.

Enterprise Policies:

* Understanding Firewall Rules.
* Zone Rules.
* Defining Zones.
* How Zone Rules Work.
* Workflow for Zone-Based Security.
* Managing Access Zones.
* Configuring the Trusted Zone.
* Choosing Security Levels.
* Program Control.
* Understanding Program Control.
* Workflow for Program Control.
* Observing Program Activity.
* Creating Program Rules.
* Program Rule Types.
* Program Permissions.
* SmartDefense Program Advisor.
* SmartDefense Program Advisor Process.
* Integrity Advanced Server Program Advisor Process.

Non-secure Endpoints:

* Understanding Enforcement Rules.
* How Enforcement Rules Work.
* What the Restricted User Experiences.
* Enforcement-Rule Workflow.
* Cooperative Enforcement.

Content Inspection:

* Anti-Spyware.
* Understanding Integrity.

Anti-Spyware:

* Configuring Anti-Spyware.
* Setting Up Regular Anti-Spyware Scans.
* Enforcing Anti-Spyware Scans and Treatments.
* Anti-Spyware Updates.
* Preventing E-mail Attacks.
* Understanding Inbound e-mail Protection.
* What the User Experiences.
* Limitations of MailSafe e-mail Protection.
* Understanding Outbound Protection.
* Protecting Instant Messaging.

Monitoring Client Security:

* Monitoring Integrity Endpoint Security.
* Overview of Endpoint Connectivity.
* Tracking Enforcement-Rule Compliance.
* Current Client Compliance Status Report.
* Tracking Client-Security Events.
* Tracking and Observing Programs.

Checkpoint - CPIS (Check Point Integrity)

Price on request