Check Point Endpoint Security Full Disk Encryption

Level:
Costs:
Total time:
Provider rating: 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)
Logo Perpetual Solutions

Tip: Receive more information about the programme, starting dates & price. Or request a proposal from multiple providers for in-house training.

Overview

Your experience of this course?

Did you attend the course Check Point Endpoint Security Full Disk Encryption at Perpetual Solutions? Help other people by submitting your review at Springest!

Springest will donate £1.- to the Edukans Foundation as a thank you for each review

 
Schedule:
Daytime
Run time:
1 Day
Location type:
Open

completion, maximum participants, and starting dateplaces are unknown for this course.

Prerequisites:

Working knowledge of TCP/IP, Windows and/UNIX, network technology, and the Internet.

Course Description:

This course teaches you how to configure and manage an Endpoint Security FDE protected device using the Endpoint Security FDE Management Console. You will learn the details of hard-disk encryption, and how best to deploy Endpoint Security FDE in your organization.

Delegates attending this course will learn:

  • Given Privileged Permissions and Permissions Settings as defined in Endpoint Security FDE, define the role of users and administrators in your organization.
  • Considering Endpoint Security FDE 's encryption technology, choose the most suitable method for authenticating each u…

Read the complete description

Description

Prerequisites:

Working knowledge of TCP/IP, Windows and/UNIX, network technology, and the Internet.

Course Description:

This course teaches you how to configure and manage an Endpoint Security FDE protected device using the Endpoint Security FDE Management Console. You will learn the details of hard-disk encryption, and how best to deploy Endpoint Security FDE in your organization.

Delegates attending this course will learn:

  • Given Privileged Permissions and Permissions Settings as defined in Endpoint Security FDE, define the role of users and administrators in your organization.
  • Considering Endpoint Security FDE 's encryption technology, choose the most suitable method for authenticating each user type.
  • Install and confirm the installation of Endpoint Security FDE for the administrator with the installation CDs.
  • Determine access levels for Endpoint Security FDE users and create user profiles.
  • Select the suitable authentication method for a given deployment.
  • Prepare a strategy to deploy Endpoint Security FDE to all company endpoints.
  • Install Endpoint Security FDE on a user's machine to initiate encryption and observe the installation process from the user's perspective.
  • Perform basic profile maintenance procedures such as updating and upgrading profiles from client computers, and using Remote Help to re-permit locked-out users access to their systems.
  • Configure Service Accounts for handling recovery files, update profiles, and upgrade packages.
  • View and use the Local Event Database for monitoring an Endpoint Security FDE audit.
  • View and transfer the local log file to the central log file.
  • Create and deploy an uninstall profile from client computers.
  • Develop a plan for recovering encrypted information from a hard disk.
  • Customize the pre-boot environment.
  • Troubleshoot a failed installation and repair corrupted boot sectors.
  • Install and configure SmartCenter for Endpoint Security -WebRH for Web-based remote help.
  • Manage Organizational Units to control user access and permissions.
  • Provide remote help to Endpoint Security clients using SmartCenter for Endpoint Security -WebRH.

This course includes the following modules:

Course Topics

  • Installing Endpoint Security FDE
  • Creating configuration sets and profiles
  • Deploying Endpoint Security FDE Removing user profiles
  • Using Remote Help Uninstalling from removable media
  • Upgrading Pointsec PC 6.3 to an Endpoint Security FDE R70 installation

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

Reviews

There are no reviews yet. Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

More courses within this subject:

Compare 36,003 training courses in subjects like Check Point

Subscribe to our newsletter?

Receive news, tips, articles, interviews and education on personal development each month.

Sign up to create your own Learning Lists.

Not for humans