Check Point Threat Prevention
Learn how to stop targeted attacks and zero-day threats
This hands-on course teaches how Check Point’s Threat Prevention enables companies to control access to millions of websites while applying real-time protections that block attacks, botnets, Advanced Persistent Threats (APTs) and zero-day threats.
Who should attend?
This course is designed for Check Point Security Professionals, who need to add and manage a secure web gateway solution to their security strategy.
This could include the following:
- System Administrators
- Support Analysts
- Network Engineers
All Courses Idea
- Describe how ThreatCloud gathers real-time security intelligence
- Understand how Antivirus identifies and blocks malware
- Describe how Anti-bot detects and prevents bot damage
- Discuss how IPS proactively prevents intrusions
- Define URL Filtering to prevent access to websites spreading malware
- Define granular policies for user and groups with Identity Awareness
- Create a Unified Security Policy to cover all web, applications, users and machines
- Proactively analyze data
- Detect infected hosts, identify bot outbreaks and blockbot communication
- Configure the IPS demonstration tool
- Know how to disable anit-spoofing on your security gateway
- Describe what happens when a bot takes over a computer
- How to update your malware database
- Filter the Anti-Bot and Antivirus information for fast monitoring
- Customize settings to meet the needs of your company
- Configure Threat Emulation to inspect incoming traffic
- Build custom queries and views
- Configure SmartDashboard to Interface with Active Directory
- Investigate Suspected Threats in Threat Wiki
- Apply, configure and troubleshoot IPS protections
- Troubleshoot IPS settings
- Deploy Geo IPS protection
- Review Threat Prevention settings
- Install Anti-Bot and Antivirus protections
- Deploy Threat Emulation
- Use SmartLog to research vulnerabilities
This course helps prepare for the Threat Prevention Exam # 156-727.77 available at VUE test centers.
Successful completion of this course depends on knowledge of network-security activities including UNIX and Windows operating systems, Certificate management and networking (TCP/IP) and CCSA.