Download Check Point Endpoint Security with Pointsec

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

SIP extensions for the IP Multimedia Subsystem wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Wireless security wikipedia , lookup

Remote Desktop Services wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Computer security wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Last.fm wikipedia , lookup

Transcript
Check Point Endpoint Security with Pointsec
Objectives
Format:
Duration:
Classroom
2 Days
Description
NOTE: This course covers Pointsec PC 6.1 and Pointsec Protector 4.81 in
a single book. The Pointsec PC 6.1 information has been superceded by
the Check Point Endpoint Security Full Disk Encryption (Pointsec PC)
class.
The Endpoint Security with Pointsec course teaches students how to
identify inherent risks of data storage on mobile computing devices, and
how to identify the Pointsec endpoint-security product that alleviates
specific risks.
Audience
Delegates attending this course will be able to:
•
•
•
•
•
•
Prerequisites
•
•
•
•
•
•
Delegates should have a Working knowledge of TCP/IP, Windows
and/UNIX, network technology, and the Internet
•
Certification
•
This course meets the requirements for the Check Certified Specialist –
Pointsec Certification. A separate examination is available for those
delegates who wish to have a formal qualification.
•
This course is designed for systems administrators, security managers, or
network engineers who manage Pointsec deployments and want to earn
the Check Point Certified Specialist – Pointsec certification.
Please note:
Prior to taking Check Point examinations, Check Point recommend
delegates attend the authorised training course(s), study the official
manual (provided only on authorised courses) and have 6 months
experience using the technology.
DNS Arrow is the World’s largest authorised Check Point
training provider.
•
Install Pointsec with a Pointsec Master (Administrative)
installation.
Use each Pointsec management-console subsection for its
designed tasks. Classify the different profile types in
Pointsec.
Classify levels of access for Pointsec users, and create user
profiles.
Select the suitable authentication method for a given
deployment.
Select an installation type and method for Pointsec,
depending on user access level.
Prepare a strategy to deploy Pointsec to all company
endpoints.
Uninstall Pointsec.
Troubleshoot user-login problems with Remote Help.
Troubleshoot Pointsec issues using Pointsec tools.
Install and configure SmartCenter for Device Protector.
Install and configure Device Protector.
Select the appropriate section of SmartCenter for Device
Protector to configure a specific function in Device
Protector.
Select the appropriate Device Protector component, and
configure it correctly for a specific function.
Create and apply profiles, users, computers, and user and
computer groups for Device Protector.
Create advanced configurations of profiles, users,
computers, and user and computer groups.
Use Device Protector’s internal logging and auditing
functions to track user actions.
Topics covered
•
•
•
•
•
•
•
•
•
•
•
•
•
Installing Pointsec
Creating configuration sets and profiles
Deploying Pointsec
Removing user profiles
Using Remote Help
Upgrading Pointsec
Uninstalling from removable media
SmartCenter for Pointsec Protector installation
Working with the Pointsec Protector Administration Console
Pointsec Protector client installation
Pointsec Protector client functionality
Program Security Guard
Working with Pointsec Protector logs