Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
SIP extensions for the IP Multimedia Subsystem wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Wireless security wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer security wikipedia , lookup
Check Point Endpoint Security with Pointsec Objectives Format: Duration: Classroom 2 Days Description NOTE: This course covers Pointsec PC 6.1 and Pointsec Protector 4.81 in a single book. The Pointsec PC 6.1 information has been superceded by the Check Point Endpoint Security Full Disk Encryption (Pointsec PC) class. The Endpoint Security with Pointsec course teaches students how to identify inherent risks of data storage on mobile computing devices, and how to identify the Pointsec endpoint-security product that alleviates specific risks. Audience Delegates attending this course will be able to: • • • • • • Prerequisites • • • • • • Delegates should have a Working knowledge of TCP/IP, Windows and/UNIX, network technology, and the Internet • Certification • This course meets the requirements for the Check Certified Specialist – Pointsec Certification. A separate examination is available for those delegates who wish to have a formal qualification. • This course is designed for systems administrators, security managers, or network engineers who manage Pointsec deployments and want to earn the Check Point Certified Specialist – Pointsec certification. Please note: Prior to taking Check Point examinations, Check Point recommend delegates attend the authorised training course(s), study the official manual (provided only on authorised courses) and have 6 months experience using the technology. DNS Arrow is the World’s largest authorised Check Point training provider. • Install Pointsec with a Pointsec Master (Administrative) installation. Use each Pointsec management-console subsection for its designed tasks. Classify the different profile types in Pointsec. Classify levels of access for Pointsec users, and create user profiles. Select the suitable authentication method for a given deployment. Select an installation type and method for Pointsec, depending on user access level. Prepare a strategy to deploy Pointsec to all company endpoints. Uninstall Pointsec. Troubleshoot user-login problems with Remote Help. Troubleshoot Pointsec issues using Pointsec tools. Install and configure SmartCenter for Device Protector. Install and configure Device Protector. Select the appropriate section of SmartCenter for Device Protector to configure a specific function in Device Protector. Select the appropriate Device Protector component, and configure it correctly for a specific function. Create and apply profiles, users, computers, and user and computer groups for Device Protector. Create advanced configurations of profiles, users, computers, and user and computer groups. Use Device Protector’s internal logging and auditing functions to track user actions. Topics covered • • • • • • • • • • • • • Installing Pointsec Creating configuration sets and profiles Deploying Pointsec Removing user profiles Using Remote Help Upgrading Pointsec Uninstalling from removable media SmartCenter for Pointsec Protector installation Working with the Pointsec Protector Administration Console Pointsec Protector client installation Pointsec Protector client functionality Program Security Guard Working with Pointsec Protector logs