![]() ![]() Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets.Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.Discuss Check Point Capsule components and how they protect mobile devices and business documents.Recognize Check Point Remote Access solutions.Understand Mobile Access deployment options.Discuss the Mobile Access Software Blace and how it secures communication and data.Understand how SmartEvent can assist in detecting, remediating, and preventing security threats. ![]() Discuss the SmartEvent process that determines which network activities may lead to security issues.Identify the SmartEvent components that store network activity logs and identify events.Understand how CoreXL acceleration technology is used to enhance and improve performance.Undersand how SecureXL acceleration technology is used to enhance and improve performance.Describe VRRP network redundancy advantages.Recognize how Check Point’s flexible API architecture supports automation and orchestration.Describe advanced methods of gathering important gateway data using CPView and CPInfo.Describe the Check Point Firewall infrastructure.Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |