What Does MVP Stand For? It’s Not What You Think.
October 7, 2024
Article
Instructors: Check Point Software Technologies, Ltd.
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
1,730 already enrolled
(11 reviews)
Recommended experience
Intermediate level
Familiarity with basic networking concepts (e.g. TCP/IP, subnetting) is helpful but not required.
(11 reviews)
Recommended experience
Intermediate level
Familiarity with basic networking concepts (e.g. TCP/IP, subnetting) is helpful but not required.
Understand the features of the current Small / Medium Business (SMB) product
Understand the steps necessary to install, update, configure, and manage the SMB product
Understand advanced features such as SSL Inspection, Threat emulation, and High Availability
Understand cloud-based features such as the Security Management Portal, Reach My Device, and the Watchtower mobile app
This course introduces you to Check Point's Small and Medium Business (SMB) network security appliances.
You will learn how to deploy, configure, manage, and monitor network security policy on the SMB appliance platform. When you complete this course, you will understand the features and functionality of the current Small / Medium Business (SMB) product, as well as the procedures for installing, upgrading, and maintaining the SMB appliance. In addition, this course will teach you how to configure and view network traffic and threat prevention log data, as well as how to monitor your SMB deployment. Other important concepts are covered, such as configuring clustering for high availability, enabling SSL inspection, and the process for enabling Virtual Private Networks for remote users and remote sites. Upon completion of this course, you will be prepared to deploy, configure, and administrate a Check Point Small/Medium Business Network Security appliance.
Meet your instructor, Daniel Niazov of Check Point Software Technologies, Ltd
2 videos
Introducing the SMB appliance product, the embedded Gaia OS, and optional WiFi hotspot capabilities.
5 videos
Understand the procedures for installing, upgrading, and maintaining the embedded Gaia OS
2 videos
In this lesson we introduce the embedded Gaia logging facility
1 video
This presentation explains the major features and functionality available on the SMB Network Security product, including the User Awareness feature.
2 videos
Check Point's clustering support allows for high availability of network services.
1 video
Enabling URL filtering of HTTPS connections, and enabling SSL Interception to decrypt the SSL tunnel and expose the data within to security policy inspection.
1 video
Learn how to move the SMB from local management to central management
In this lesson, the threat emulation feature is explained. This feature allows unknown, potentially malicious files to be executed in a virtual "sandbox" environment in the cloud, monitoring for malicious activity to detect previously unknown threats.
1 video
Learn how the cloud-based SMP service enables unified management and monitoring of multiple SMB appliances deployed for multiple customers among multiple sites.
1 video
This lecture will demonstrate two very useful SMB deployment management features.
2 videos
Learn how to configure and manage site to site VPN connections to enable secure connectivity between multiple locations, as well as remote access VPN connections to enable secure access to internal resources and services by users outside the office. In addition, learn how to use digitally signed certificates to securely authenticate site to site and remote access VPN connections.
2 videos
The Watchtower mobile app, available for iOS and Android, permits a security administrator to monitor and manage SMB deployments from their mobile devices.
1 video
Voice over IP (VoIP) permits the deployment of scalable voice telecommunications over the Internet. The SMB appliance may be configured to examine VoIP communication and control traffic to enforce security policy.
2 videos
Distributed Denial of Service (DDoS) attacks are a popular tool among cyber-criminals to force a target web site off of the Internet. Learn how to mitigate these attacks on the SMB appliance.
1 video
Check Point provides multiple cloud-based services for SMB customers, including upgrades, threat prevention, and more. In addition, Software-Defined Wide Area Networking (SD-WAN) allows the SMB administrator to define custom routing based on application and other criteria.
2 videos
The integrated Application Programming Interface (API) support on SMB appliances permits the busy security administrator to automate routine management and monitoring tasks, enabling complex orchestration of business workflows.
1 video
Procedures for troubleshooting and debugging issues with embedded Gaia OS are demonstrated.
1 video
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
Check Point Software Technologies Ltd.
Course
LearnQuest
Course
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.
The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.