Check Point Software Technologies Ltd.
Check Point Jump Start: SMB Network Security
Check Point Software Technologies Ltd.

Check Point Jump Start: SMB Network Security

Check Point Software Technologies, Ltd.
Daniel Niazov

Instructors: Check Point Software Technologies, Ltd.

1,657 already enrolled

Gain insight into a topic and learn the fundamentals.
4.5

(11 reviews)

Intermediate level

Recommended experience

1 hour to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
4.5

(11 reviews)

Intermediate level

Recommended experience

1 hour to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • Understand the features of the current Small / Medium Business (SMB) product

  • Understand the steps necessary to install, update, configure, and manage the SMB product

  • Understand advanced features such as SSL Inspection, Threat emulation, and High Availability

  • Understand cloud-based features such as the Security Management Portal, Reach My Device, and the Watchtower mobile app

Skills you'll gain

Details to know

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

There are 18 modules in this course

Meet your instructor, Daniel Niazov of Check Point Software Technologies, Ltd

What's included

2 videos

Introducing the SMB appliance product, the embedded Gaia OS, and optional WiFi hotspot capabilities.

What's included

5 videos

Understand the procedures for installing, upgrading, and maintaining the embedded Gaia OS

What's included

2 videos

In this lesson we introduce the embedded Gaia logging facility

What's included

1 video

This presentation explains the major features and functionality available on the SMB Network Security product, including the User Awareness feature.

What's included

2 videos

Check Point's clustering support allows for high availability of network services.

What's included

1 video

Enabling URL filtering of HTTPS connections, and enabling SSL Interception to decrypt the SSL tunnel and expose the data within to security policy inspection.

What's included

1 video

Learn how to move the SMB from local management to central management

What's included

1 video

In this lesson, the threat emulation feature is explained.  This feature allows unknown, potentially malicious files to be executed in a virtual "sandbox" environment in the cloud, monitoring for malicious activity to detect previously unknown threats.

What's included

1 video

Learn how the cloud-based SMP service enables unified management and monitoring of multiple SMB appliances deployed for multiple customers among multiple sites.

What's included

1 video

This lecture will demonstrate two very useful SMB deployment management features.

What's included

2 videos

Learn how to configure and manage site to site VPN connections to enable secure connectivity between multiple locations, as well as remote access VPN connections to enable secure access to internal resources and services by users outside the office. In addition, learn how to use digitally signed certificates to securely authenticate site to site and remote access VPN connections.

What's included

2 videos

The Watchtower mobile app, available for iOS and Android, permits a security administrator to monitor and manage SMB deployments from their mobile devices.

What's included

1 video

Voice over IP (VoIP) permits the deployment of scalable voice telecommunications over the Internet.  The SMB appliance may be configured to examine VoIP communication and control traffic to enforce security policy.

What's included

2 videos

Distributed Denial of Service (DDoS) attacks are a popular tool among cyber-criminals to force a target web site off of the Internet.  Learn how to mitigate these attacks on the SMB appliance.

What's included

1 video

Check Point provides multiple cloud-based services for SMB customers, including upgrades, threat prevention, and more. In addition, Software-Defined Wide Area Networking (SD-WAN) allows the SMB administrator to define custom routing based on application and other criteria.

What's included

2 videos

The integrated Application Programming Interface (API) support on SMB appliances permits the busy security administrator to automate routine management and monitoring tasks, enabling complex orchestration of business workflows.

What's included

1 video

Procedures for troubleshooting and debugging issues with embedded Gaia OS are demonstrated.

What's included

1 video

Instructors

Instructor ratings
4.3 (5 ratings)
Check Point Software Technologies, Ltd.
Check Point Software Technologies Ltd.
10 Courses14,945 learners
Daniel Niazov
Check Point Software Technologies Ltd.
7 Courses14,458 learners

Offered by

Recommended if you're interested in Computer Security and Networks

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Computer Security and Networks? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions