King
Administrator
- Joined
- Jul 12, 2021
- Messages
- 25,005
- Reaction score
- 5
- Points
- 38
Published 11/2022
Created by Grezitech Company
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 8 Lectures ( 2h 11m ) | Size: 921 MB
Protecting networks from cyberattack
What you'll learn
Students would learn about Checkpoint Threat Prevention
Students would learn how to configure Content Awareness and Data Loss Prevention
Students would learn how to protect the network using Anti-Bot, Antivirus and IPS
Students would learn how to configure Threat Extraction, Threat Emulation and Infinity Threat Prevention
Requirements
Basic Networking Knowledge
Basic Cybersecurity Knowledge
Description
In this Checkpoint Threat Prevention course, we would learn how to protect the network using Checkpoint's Firewall. CheckPoint's Threat Prevention solution offers a multi-layered, pre-infection and post-infection defense approach and a consolidated platform that enables enterprise security to detect and block modern malware.In this course, we would learn how to configure the following blades: Application Control, URL Filtering, Anti-bot, Antivirus, IPS, Data Loss Prevention, Content Awareness, Threat Emulation, Threat Extraction and Infinity Threat Prevention. Topics Include: * Anti-bot * Antivirus * IPS * Threat Emulation * Threat Extraction * Infinity Threat Prevention * Data Loss Prevention* Content Awareness * Application Control * URL Filtering Each Software Blade gives unique network protections. When combined, they supply a strong Threat Prevention solution. Data from malicious attacks are shared between the Threat Prevention Software Blades and help to keep your network safe.IPS: A complete IPS cyber security solution, for comprehensive protection against malicious and unwanted network traffic, which focuses on application and server vulnerabilities, as well as in-the-wild attacks by...
Read more
Continue reading...