Course code: ESE8« Back

Check Point Endpoint Security R80

The Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities in a single console. This 3-day course teaches how to monitor, manage and enforce policy, from an at-a-glance dashboard down to user and machine details, all with a few clicks.

No terms found, contact our client service.

AffiliateDurationCatalogue priceHandbook priceITB
Praha2 25 000 CZK - 0
Bratislava2 960,00 EUR - 0

Who is the course for

Technical persons who support, install, deploy or administer Check Point Software Blades and manage corporate Endpoint security requirements should attend this course. This could include the following:

  • System Administrators
  • System Engineers 
  • Security Managers
  • Network Engineers
  • Anyone seeking Check Point certification

What we teach you

  • Endpoint Security Overview
  • The case for Endpoint Security
  • The Check Point solution to Endpoint Security
  • Deploying Endpoint Security
  • Endpoint Security Management Console overview

Certification information

This course helps prepare for CCEPE E80 exam # 156-715.80.

It contains 90 multiple-choice, scenario-based questions. A passing score is 70% or higher in 120 minutes. The exam is based on 80% course materials and 20% hands-on experience with Check Point products. Students should have at least 6 months experience with Check Point products before challenging it.

Required skills

Persons attending this course should have basic networking skills and knowledge of Windows Server, TCP/IP, the Internet and Active Directory.

Teaching methods

Professional explanation with practical samples and examples.

Teaching materials

Check Point guide book for this course.

Course outline

 Understand Check Point Endpoint technology
• Deploy Clients and software blades
• Manage users and provide access to protected resources
• Build a strategy for implementing Endpoint Security across an existing corporate infrastructure
• Install and deploy Endpoint Security E80 in a corporate environment suitable to company infrastructure requirements
• Perform multiple client installations on local and remote sites all at once
• Design a standard endpoint policy for users based on departmental requirements
• Verify client functionality based on the defined policy
• Adjust maintenance cycles according to needs assessments and provide updates to users seamlessly company-wide
• Monitor, track and update users based on feedback from users in the field and logged information about network traffic
• Report findings of network activity for specific departments, or across the corporate infrastructure to determine needs and value assessments


• Install Endpoint Security E80 Server
• Security Gateway Configuration
• Microsoft .Net Framework Installation (optional)
• Configure Endpoint Security Management
• Configure the directory scanner
• Deploy the initial client package
• Managing and applying software blades in Policies
• One Check User settings
• Full Disk Encryption
• Media Encryption and Port Protection
• Firewall Rules
• Application Control
• Access Zones Definitions
• Malware Protection
• Creating the Organizational Unit Policy
• Accessing the User Node
• MIS OU Requirements
• Exception for users
• Auditing and Reporting standards
• Monitoring and Reporting with Endpoint Security E80
• Guidelines for Troubleshooting
• Installation Issues
• Client Debugging
• Management Debugging
• Important Files locations

Previous courses

no preceding courses

Next courses

no following course
No data.
The prices are without VAT.