Jump Start: Small/Medium Business

In this course, you will learn about the Check Point Small/Medium Business Network Security solution, a cost-effective way to implement the full suite of Check Point access control and zero-day threat prevention features to protect your business.

Jump Start: Small/Medium Business

There is one session available:

After a course session ends, it will be archived.
Estimated 5 weeks
5–15 hours per week
Self-paced
Progress at your own speed

About this course

Skip About this course

Small and medium businesses account for 58% of data breaches with an average loss of $200,000 per incident.

Don't allow your business to suffer catastrophic financial losses. Learn about Check Point's exclusive cost-effective network security solution for small and medium sized businesses in this course.

Become proficient in:

  • Initial configuration
  • Network deployment
  • Security Policy
  • Monitoring user and network activity
  • Identifying and mitigating security events

Check Point's Small and Medium Business (SMB) Appliances are high performance, integrated devices offering optional WiFi and LTE support. Standard Check Point Network Security features such as Firewall, VPN, Anti-Virus, Application Control, URL Filtering, Email Security, and SandBlast Zero-Day Protection are supported.

At a glance

  • Institution: CheckPoint
  • Subject: Computer Science
  • Level: Intermediate
  • Prerequisites:

    Familiarity with basic networking concepts such as

    • IP addressing
    • Subnetting
    • The TCP/IP protocol suites
  • Language: English

What you'll learn

Skip What you'll learn

This course includes these modules:

  1. Introductions
  2. What's new with the Small/Medium Business (SMB) solution
  3. Standalone deployment procedures
  4. Managing logging and monitoring
  5. SMB product features and functionality
  6. Clustering for high availability
  7. Deploying HTTPS-SSL inspection to secure Web transactions
  8. Implementing central management of SMB deployments
  9. Advanced zero-day malware protection using threat emulation
  10. Remote administration via the Security Management Portal (SMP)
  11. Simplify deployment and management using Zero Touch and Reach My Device
  12. Managing VPN connections and certificate authentication
  13. Using the Watchtower mobile app with your SMB deployment
  14. Enabling and securing VoIP communications
  15. Mitigating Distributed Denial of Service (DDOS) attacks
  16. Leveraging Check Point cloud services and SD-WAN
  17. Automation using the Application Programming Interface (API)
  18. How to diagnose and troubleshoot errors and other issues

About the instructors

Who can take this course?

Unfortunately, learners from one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.