Blog

Check Point Blades Training

Check Point Blades Training
Event on 2017-07-20 09:00:00
WHO SHOULD ATTEND? Technical persons who support, install, deploy or administer Check Point Security solutions should attend this course. This includes: • System Administrators and Engineers • Support Analysts • Network Engineers • Channel Partners (Contingent upon Availability) COURSE OBJECTIVES • Identify the Application Control Software Blade as part of a total   security management solution. • Identify and address Web 2.0 application access issues including   malware threats, bandwidth impact issues and productivity  loss • Identify important aspects of Application Awareness blade   management including how to detect and control application   usage and educate users • Monitor all Facebook and Facebook Application traffic in your  organization • Block YouTube and other streaming media applications • Update your local Application Database with the most recently   added data and applications • View all current activity occurring in the Application Control Rule Base • Identify the IPS Software Blade as part of a total security management  solution • Identify and address strategies for implementing the Check   Point Intrusion Prevention software blade including sandbox   mode, status at a glance and unified management • Identify important aspects of IPS software blade management   including testing and deployment and activation of protections • Enable Identity Awareness on a gateway together with Application Control to create policy rules • Discuss the Threat landscape • Understand the anatomy of a Bot • Discuss how Bots are used in an attack • Learn how Bots infect your computer • Explain how the Antivirus Software Blade stops incoming malicious   files • Describe Check Point’s data mining process • Know how to leverage the ThreatWiki • Discuss the challenges and benefits of log management • Describe how SmartLog transforms data into security intelligenc LAB EXERCISES INCLUDE • Investigating Threats in Threat Wiki • Applying IPS Protections • Reviewing Anti-Bot & Anti-Virus Protections • Configuring User Directory • Protecting your Network from Threats on the Web • Using SmartEvent to Develop a Corporate Web and Application   Profile

at Lenoir-Rhyne College
625 7th Avenue Ne
Hickory, United States

no comment

Leave a Reply