Sunteți pe pagina 1din 5

AGENDA

Threat Prevention Training

(revised: October 25, 2016)

Click for Latest Document Set

©2016 Check Point Software Technologies Ltd. [Confidential] For designated groups and individuals 1
Day One
Session Content
09:00 – 10:00 Security 101 Gaia Instructor Presentation
10:00 – 10:30 Security 101 Gaia Gaia Lab
Break
10:45 – 11:00 Controlling Shadow IT Instructor Presentation
11:00 – 11:30 HTTPS, IA HTTPS, IA Lab
Break
01:00 – 01:15 SmartLog Instructor Presentation
01:15 – 01:45 Log Management SmartLog Lab
01:45 – 02:15 SmartEvent SmartEvent Lab
Break
02:30 – 03:00 Safe Internet Use App Control, URLF Lab
02:45 – 03:15 DLP DLP Lab

©2016 Check Point Software Technologies Ltd. [Confidential] For designated groups and individuals 2
Day Two
Session Content
09:00 – 09:15 Threat Prevention Instructor Presentation
09:15 – 09:45 IPS IPS Lab
09:45 – 10:15 Anti-bot & Antivirus AV & AB Lab
Break
10:30 - 11:00 Sandbox; TE & TEX TE & TEX Lab
11:00 – 11:15 Endpoint Overview Instructor Presentation
11:15 – 12:00 SandBlast Agent Endpoint Lab
Break
01:00 – 1:15 Mobile Threats Instructor Presentation
01:15 – 1:30
Break
01:45 – 02:00 R80 Management Instructor Presentation
02:00 – 3:00 R80 Management R80 Lab
©2016 Check Point Software Technologies Ltd. [Confidential] For designated groups and individuals 3
What’s Covered, What’s Not
Introduction to Check Point
• Integrated network security and management, except for;
̶ IPsec VPN
̶ Remote and Mobile Access (SSL VPN, Capsule Workspace for iOS and Android)
̶ Large scale management (Multi-Domain Management, Security Management Portal)
̶ Virtual Systems
̶ Compliance

• Threat prevention, except for;


̶ DDoS Protector (dedicated appliances)
̶ SandBlast Cloud (Office 365TM)

• Endpoint security, except for;


̶ Desktop Firewall, Application Control and Compliance
̶ Full Disk Encryption, Media Encryption and Port Control

• Platforms, except for;


̶ Public and Private Cloud Security (Azure, AWS, VMware NSX, OpenStack, Cisco ACI)
̶ SaaS (Capsule Cloud)

• Data security, except for;


̶ Document Security (Capsule Docs)

©2016 Check Point Software Technologies Ltd. [Confidential] For designated groups and individuals 4
Thirdly….
…the code is more what you'd call
"guidelines" than actual rules. Welcome
aboard.

©2016 Check Point Software Technologies Ltd. [Confidential] For designated groups and individuals 5

S-ar putea să vă placă și