

In this CCES course, we would also learn how to configure Sandblast Agent Anti-Bot, Threat Extraction, Threat Emulation and Anti-Exploit. In this CCES course, we would learn how to configure Full Disk Encryption, Media Encryption & Port Protection, OneCheck User Authentication, Capsule Docs (for protecting sensitive documents), Anti-Malware, Sandblast Anti-Ransomware, Behavioral Guard and Forensics.


We would also learn how to configure Endpoint Security using an on-premise Endpoint Security Management Server and the SmartEndpoint. In this CCES course, we would learn how to configure Checkpoint Endpoint Security using Harmony Endpoint (also called the cloud-based Infinity Portal). While our previously produced CCSA course shows how to protect the perimeter using a Next-Generation Firewall (NGFW), this Course, Checkpoint Certified Endpoint Specialist, shows how to proffer layered security by protecting the endpoints. Having an hybrid approach to network security entails having both perimeter and endpoint security solutions that protect assets and infrastructure anywhere i.e., both on-premise and off-premise.
