- Level Foundation
- المدة 1 ساعات hours
- الطبع بواسطة Check Point Software Technologies Ltd.
-
Offered by
عن
Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. With remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding. Check Point Harmony is the industry’s first unified security solution for users' devices and access.It protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications. The course modules are: Introduction Architecture Architecture-the Flow Architecture-Accessing the Endpoint Server Deployment Deployment-Installing the Client on Windows Deployment-Installing the Client on Linux Deployment-Visibility Deployment-Change Policy Deployment-Upgrade Deployment-Remove a client Communication Communication-Port, Services, and URLs Exclusions Summary Check Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.الوحدات
Introduction
1
Videos
- Introduction
Architecture-The Flow
1
Videos
- Architecture-The Flow
Architecture-Accessing the Endpoint Server
1
Videos
- Architecture-Accessing the Endpoint Server
Deployment-Installing the Client on Windows
1
Videos
- Deployment-Installing the Client on Windows
Deployment-Installing the Client on Linux
1
Videos
- Deployment-Installing the Client on Linux
Deployment-Visibility
1
Videos
- Deployment-Visibility
Deployment-Change Policy
1
Videos
- Deployment-Change Policy
Deployment-Upgrade
1
Videos
- Deployment-Upgrade
Deployment-Remove a client
1
Videos
- Deployment-Remove a client
Communication-Port, Services and URLs
1
Videos
- Communication-Port, Services and URLs
Exclusions
1
Videos
- Exclusions
Summary
1
Videos
- Summary
Auto Summary
**Course Overview: Check Point Jump Start: Harmony Endpoint Security** **Focus**: This course is dedicated to equipping learners with robust knowledge and skills to protect remote workforces using Check Point Harmony Endpoint Security. It emphasizes safeguarding against sophisticated threats like ransomware, phishing, and drive-by malware, while ensuring minimal breach impact with autonomous detection and response. **Domain**: IT & Computer Science, with a particular focus on cybersecurity for remote access and endpoint protection. **Instructor**: Provided by Coursera, leveraging Check Point Software Technologies Ltd.'s expertise, a global leader in cybersecurity. **Content**: The curriculum covers comprehensive modules including Introduction, Architecture, Deployment, Communication, Exclusions, and a final Summary. Detailed topics include endpoint server access, client installation on different operating systems, visibility, policy changes, upgrades, and client removal, as well as communication protocols and services. **Duration**: The course is designed to be completed in approximately 1 hour, making it a concise yet thorough educational experience. **Subscription Options**: Available under the "Starter" subscription plan, providing foundational access to the course materials. **Target Audience**: Ideal for IT professionals, cybersecurity enthusiasts, and corporate teams tasked with protecting organizational data across remote work environments. This foundational course is perfect for those looking to enhance their understanding of endpoint security and seek to implement zero-trust access policies for secure corporate application usage. Engage in this course to fortify your organization's cybersecurity defenses and stay ahead in the ever-evolving threat landscape.
Daniel Niazov

Check Point Software Technologies, Ltd.