Most popular programs
Trending now
Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.
With remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding.
Check Point Harmony is the industry’s first unified security solution for users' devices and access.
It protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.
The course modules are:
Introduction
Architecture
Architecture-the Flow
Architecture-Accessing the Endpoint Server
Deployment
Deployment-Installing the Client on Windows
Deployment-Installing the Client on Linux
Deployment-Visibility
Deployment-Change Policy
Deployment-Upgrade
Deployment-Remove a client
Communication
Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.
With remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding.
Check Point Harmony is the industry’s first unified security solution for users' devices and access.
It protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.
The course modules are:
Introduction
Architecture
Architecture-the Flow
Architecture-Accessing the Endpoint Server
Deployment
Deployment-Installing the Client on Windows
Deployment-Installing the Client on Linux
Deployment-Visibility
Deployment-Change Policy
Deployment-Upgrade
Deployment-Remove a client
Communication
Check Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
Learn how to use Check Point Harmony Endpoint security solution to prevent, protect, and quickly respond to advanced attacks on Endpoint devices.
Who can take this course?
Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.
Who can take this course?
Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.