Checkpoint - CPIS (Check Point Integrity)
Course
In Bangalore
Description
-
Type
Course
-
Location
Bangalore
Facilities
Location
Start date
Start date
Reviews
Course programme
Checkpoint - CPIS (Check Point Integrity)
Course Contents :
Check Point Integrity Integrity Architecture:
* Integrity Overview.
* Integrity Architecture.
* Web-based Management.
* Management-Server Platform.
* Integrity Client.
* Integrity Licensing.
* Integrity Administrator Console.
* Installing Integrity Advanced Server.
* Integrity Advanced Server Installation Process.
* Synchronizing User Catalogs.
* Administrator Role Assignments.
* Integrity Client Executables.
* The Control Center.
* Auto-Updating a Client Package.
Policy Management:
* Integrity Security Policies.
* Enterprise Policies.
* Personal Policy.
* The Default Policy.
* Policy Arbitration.
* Policy Rules Overview.
* Classic Firewall Rules.
* Zone Rules and Program Rules.
* Enforcement Rules.
* Rule Evaluation and Precedence.
* How Traffic Is Evaluated.
* Policy Creation.
* Preconfigured Policy Templates.
Enterprise Policies:
* Understanding Firewall Rules.
* Zone Rules.
* Defining Zones.
* How Zone Rules Work.
* Workflow for Zone-Based Security.
* Managing Access Zones.
* Configuring the Trusted Zone.
* Choosing Security Levels.
* Program Control.
* Understanding Program Control.
* Workflow for Program Control.
* Observing Program Activity.
* Creating Program Rules.
* Program Rule Types.
* Program Permissions.
* SmartDefense Program Advisor.
* SmartDefense Program Advisor Process.
* Integrity Advanced Server Program Advisor Process.
Non-secure Endpoints:
* Understanding Enforcement Rules.
* How Enforcement Rules Work.
* What the Restricted User Experiences.
* Enforcement-Rule Workflow.
* Cooperative Enforcement.
Content Inspection:
* Anti-Spyware.
* Understanding Integrity.
Anti-Spyware:
* Configuring Anti-Spyware.
* Setting Up Regular Anti-Spyware Scans.
* Enforcing Anti-Spyware Scans and Treatments.
* Anti-Spyware Updates.
* Preventing E-mail Attacks.
* Understanding Inbound e-mail Protection.
* What the User Experiences.
* Limitations of MailSafe e-mail Protection.
* Understanding Outbound Protection.
* Protecting Instant Messaging.
Monitoring Client Security:
* Monitoring Integrity Endpoint Security.
* Overview of Endpoint Connectivity.
* Tracking Enforcement-Rule Compliance.
* Current Client Compliance Status Report.
* Tracking Client-Security Events.
* Tracking and Observing Programs.
Checkpoint - CPIS (Check Point Integrity)