Free Online

Checkpoint Courses

Show filters

Level

Duration

Subject

Language

Jump Start: Maestro Hyperscale Network Security

Jump Start: Maestro Hyperscale Network Security

0

In this course brought to you by industry leader Check Point, we will cover the innovative Maestro Hyperscale Network Security solution from Check Point Software Technologies.Traditional firewall solutions have proven to be difficult and cumbersome to dynamically scale up to meet unpredictable traffic patterns, as seen with Denial of Service attacks, new product launches, breaking news, or other sudden increase in demand for firewall processing capabilities.The Maestro solution allows a network administrator to leverage existing Check Point security gateway appliances, eliminating the expense of abandoning existing infrastructure. As need arises, additional security gateway appliances may be seamlessly added to the Maestro deployment, at which time existing traffic flows will be transparently reallocated as needed to include the newly-added resources to enforce your network security policies. Active/standby clusters are utilized to provide high availability, and traffic flows are distributed to all available security gateway resources to share the processing load. This course is designed for those familiar with the Check Point Network Security solution, and will introduce the Maestro Orchestrator appliance. You will learn how to physically deploy the Orchestrator on your network, how to configure the appliance, and how to use the standard SmartConsole application to implement your security policies for your networks.This course will also discuss how to monitor and troubleshoot a Maestro deployment, as well as explain some of the "behind the scenes" details of how the Orchestrator manages network traffic, how it communicates with security gateway appliances, and how to ensure continuous network availability by deploying redundant Orchestrator appliances.This course provides a thorough introduction and demonstrations of the Maestro product to prepare you for the Check Point Accrediation exam, #156-412 at PearsonVUE.

edX
6 weeks long, 1-6 hours a week
selfpaced
view all
Check Point Jump Start: SMB Network Security

Check Point Jump Start: SMB Network Security

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course introduces you to Check Point's Small and Medium Business (SMB) network security appliances.You will learn how to deploy, configure, manage, and monitor network security policy on the SMB appliance platform.When you complete this course, you will understand the features and functionality of the current Small / Medium Business (SMB) product, as well as the procedures for installing, upgrading, and maintaining the SMB appliance.In addition, this course will teach you how to configure and view network traffic and threat prevention log data, as well as how to monitor your SMB deployment.Other important concepts are covered, such as configuring clustering for high availability, enabling SSL inspection, and the process for enabling Virtual Private Networks for remote users and remote sites.Upon completion of this course, you will be prepared to deploy, configure, and administrate a Check Point Small/Medium Business Network Security appliance.

Coursera
18 weeks long, 1-2 hours worth of material
upcoming
view all
Jump Start: Product Deployment

Jump Start: Product Deployment

0

By the end of this course you will be able to Describe the methods and tools used for Check Point product deploymentPerform common deployments with various deployment tools

edX
1 week long, 1-2 hours a week
selfpaced
view all
Check Point Jump Start: CloudGuard Posture Management

Check Point Jump Start: CloudGuard Posture Management

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeIn this course, you will learn about what is Posture Management, why you need a Posture Management solution, and what makes Check Point CloudGuard Posture management solution the Global leader in Cloud Protection.Lesson 1 - What is Posture Management?Lesson 2 – What are the Cloud Security Challenges?Lesson 3 - What is Check Point CloudGuard Posture Management?Lesson 4 - How does CloudGuard Posture Management Work?Lesson 5 – CloudGuard Posture Management Course SummaryLesson 6 – Posture Management Demo Lab

Coursera
6 weeks long, 1-2 hours worth of material
past
view all
Check Point Jump Start - CloudGuard Workload Protection

Check Point Jump Start - CloudGuard Workload Protection

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThe purpose of this program is to give you an insight into the security challenges involving workload protection and application security in the cloud, and Check Point’s solutions for those challenges. The program will also enable you to perform a basic deployment and configuration of the various solutions under the CloudGuard umbrella.Chapter 1 - Program introductionChapter 2 – Introduction to Workload protection and application securityLesson 1: Introduction to cybersecurity in the cloudLesson 2: Security challenges of cloud workloadsLesson 3: CloudGuard Workload ProtectionChapter 3 - CloudGuard Workload Protection - Container SecurityLesson 1: RecapLesson 2: Runtime ProtectionLesson 3: Image AssuranceLesson 4: Admission ControlLesson 5: Threat IntelligenceLesson 6: Posture ManagementLesson 7: DeploymentLesson 8: Deployment troubleshootingChapter 4 - Shifting protection to the left with CloudGuard ShiftLeftLesson 1: Introduction to shifting security to the leftLesson 2: DeploymentChapter 5 – CloudGuard Workload protection - Serverless SecurityLesson 1: Serverless securityLesson 2: CloudGuard Serverless Security for AWS LambdaLesson 3: DeploymentChapter 6 – CloudGuard Application Security and API ProtectionLesson 1: Introduction to application security and API protectionLesson 2: The CloudGuard AppSec solutionLesson 3: Architecture and deployment considerationsLesson 4: Deployment processLesson 5: DeploymentLesson 6: Setting up API protectionLesson 7: Data and customization of AppSec policyChapter 7 – Program summaryCheck Point CloudGuard provides unified cloud-native security for all your assets and workloads, giving you the confidence to automate security, prevent threats, and manage posture – everywhere – across your multi-cloud environment.

Coursera
7 weeks long, 1-2 hours worth of material
upcoming
view all
Check Point Jump Start: Maestro Hyperscale Network Security

Check Point Jump Start: Maestro Hyperscale Network Security

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeIn this course brought to you by industry leader Check Point, they will cover the Maestro Orchestrator initial installation, creation and configuration of security group via the web user interface and SmartConsole features. This course provides a demonstration of the Maestro product. Course will prepare you for their exam, #156-412, at PearsonVUE.

Coursera
4 weeks long, 3-4 hours worth of material
upcoming
view all
Jump Start: Network Security

Jump Start: Network Security

0

In this course, you will be shown how to configure, manage, and monitor your Check Point security environment.This free training is intended for customers new to the Check Point security solution.The modules are:Introduction to the Check Point SolutionDeploying Check Point Security ManagementDeploying Check Point Security GatewaysCreating a Security PolicyLogs and MonitoringSupport, Documentation, and TrainingThere is a Check Point accreditation exam available for this course at PearsonVue, exam #156-411.

edX
4 weeks long, 1-40 hours a week
selfpaced
view all
Check Point Jump Start: Network Security

Check Point Jump Start: Network Security

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeIn this course brought to you by industry leader Check Point, they will cover cybersecurity threats and elements of Check Point's Security Management architecture. This course will prepare you for the exam, #156-412, at PearsonVUE.(https://home.pearsonvue.com/checkpoint)

Coursera
6 weeks long, 4-5 hours worth of material
upcoming
view all
Check Point Jump Start: CloudGuard Posture Management

Check Point Jump Start: CloudGuard Posture Management

0

In this course, you will learn about what is Posture Management, why you need a Posture Management solution, and what makes Check Point CloudGuard Posture management solution the Global leader in Cloud Protection.Lesson 1 - What is Posture Management? In this lesson we will learn what posture management is, why you would need a posture management solution, and how a posture management solution will be used to secure your assets in the cloud.Lesson 2 – What are the Cloud Security Challenges? In this lesson we will look at key cybersecurity challenges that customers face when they move their assets into the cloud and how a posture management solution can help address these challenges.Lesson 3 - What is Check Point CloudGuard Posture Management? In this lesson we are going to discuss the Check Point CloudGuard Posture Management solution and why it is the Global leader in cloud protection.Lesson 4 - How does CloudGuard Posture Management Work? In this lesson we are going to break down how CloudGuard Posture Management works, how it functions and how to get started.Lesson 5 – CloudGuard Posture Management Course Summary In this lesson we are going to summarize the CloudGuard training courseLesson 6 – Posture Management Demo Lab This final lesson is a demonstration Lab. We are going to go over the CloudGuard Console interface and navigate through the main key topics discussed in the lecture videos.

edX
1 week long, 1-2 hours a week
selfpaced
view all
Jump Start: Cloud Security

Jump Start: Cloud Security

5

In this course you willLearn about Cloud security challenges and what different Check Point CloudGuard product line can be used to protect your cloud environmentAnalyze how CloudGuard Network Security product solution is used to security your cloud postureLearn how to deploy a CloudGuard Network Security solution in the Azure Cloud

edX
1 week long, 1-2 hours a week
selfpaced
view all
Check Point Jump Start: Cloud Security

Check Point Jump Start: Cloud Security

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeCheck Point CloudGuard, a comprehensive cloud security portfolio, is designed to prevent the latest fifth generation (Gen V), multi-vector cyberattacks targeting enterprise cloud servicesSection 1: Overview of CloudGuard Product lineIn this course you will learn about cloud security challenges and what different Check Point CloudGuard product line can be used to protect your cloud environment.How to Secure your Cloud EnvironmentCloud ChallengesSecurity in the CloudWhat is CloudGuardSecurity with CloudGuardSection 2: CloudGuard Network security solutionIn this course we will analyze how CloudGuard Network Security product solution is used to security your cloud posture.Understanding Cloud Security FundamentalsCloudGuard SolutionsCloudGuard ComponentsCloudGuard SegmentationSection 3: CloudGuard Network Security Product LabsIn this course we will learn how to deploy a CloudGuard Network Security solution in the Azure Cloud.Deploying a CloudGuard Network Security SolutionBuilding an Azure Private Cloud EnvironmentDeploy Check Point R80.40 Management ServerDeploy CloudGuard GatewayDeploy a Web Server Part1Deploy a Web Server Part2Connecting CloudGuard ControllerCheck Point Company Overview Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.With Check Point Infinity, the only consolidated cyber security solution across cloud, networks, endpoints, mobile and IoT, we are continuously pioneering cyber security innovation with the most advanced AI-based threat Intelligence and prevention technologies, unified security management, and cloud security automation to help protect organizations from 6th generation of cyber attacks.With over 3,500 security experts, a world-acclaimed research and intelligence unit, and the broadest ecosystem of business and technology partners, we protect over 100,000 organizations of all sizes across all industry verticals in 88 countries to achieve allow better experiences for in a safer digital world.Overview of CloudGuard Product LineIn this course you will learn about cloud security challenges and what different Check Point CloudGuard Product line can be used to protect your cloud environment.Understanding Cloud Security FundamentalsIn this course we will analyze how CloudGuard Network Security product solution is used to security your cloud posture.CloudGuard Network Security Product LabIn this course we will learn how to deploy a CloudGuard Network Security solution in the Azure Cloud.

Coursera
3 weeks long, 2-3 hours worth of material
upcoming
view all
Check Point Jump Start: Harmony Endpoint Security

Check Point Jump Start: Harmony Endpoint Security

0

Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.With remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding.Check Point Harmony is the industry’s first unified security solution for users' devices and access.It protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.The course modules are:IntroductionArchitectureArchitecture-the FlowArchitecture-Accessing the Endpoint ServerDeploymentDeployment-Installing the Client on WindowsDeployment-Installing the Client on LinuxDeployment-VisibilityDeployment-Change PolicyDeployment-UpgradeDeployment-Remove a clientCommunicationCommunication-Port, Services, and URLsExclusionsSummaryCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

edX
1 week long, 1-2 hours a week
selfpaced
view all
Check Point Jump Start: Harmony Endpoint Security

Check Point Jump Start: Harmony Endpoint Security

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeHarmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.With remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding.Check Point Harmony is the industry’s first unified security solution for users' devices and access.It protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.The course modules are:Introduction ArchitectureArchitecture-the FlowArchitecture-Accessing the Endpoint ServerDeploymentDeployment-Installing the Client on WindowsDeployment-Installing the Client on LinuxDeployment-VisibilityDeployment-Change PolicyDeployment-UpgradeDeployment-Remove a clientCommunicationCommunication-Port, Services, and URLsExclusionsSummaryCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Coursera
6 weeks long
upcoming
view all
Jump Start: Small/Medium Business

Jump Start: Small/Medium Business

0

Small and medium businesses account for 58% of data breaches with an average loss of $200,000 per incident.Don't allow your business to suffer catastrophic financial losses. Learn about Check Point's exclusive cost-effective network security solution for small and medium sized businesses in this course.Become proficient in:Initial configurationNetwork deploymentSecurity PolicyMonitoring user and network activityIdentifying and mitigating security eventsCheck Point's Small and Medium Business (SMB) Appliances are high performance, integrated devices offering optional WiFi and LTE support. Standard Check Point Network Security features such as Firewall, VPN, Anti-Virus, Application Control, URL Filtering, Email Security, and SandBlast Zero-Day Protection are supported.

edX
5 weeks long, 5-15 hours a week
selfpaced
view all
Load more

Level

Duration

Language