Check Point Jump Start: Harmony Mobile

Instructor: Check Point Software Technologies, Ltd.

Skills you'll gain

  •   Threat Detection
  •   Microsoft Intune (Mobile Device Management Software)
  •   Endpoint Security
  •   iOS Development
  •   Apple iOS
  •   System Configuration
  •   Application Deployment
  •   Threat Management
  •   Event Monitoring
  •   Mobile Security
  •   Cyber Security Policies
  •   Network Security
  • There are 6 modules in this course

    This course includes these modules: 1. Course Introduction 2. Introduction to Harmony Mobile 3. Harmony Mobile architecture 4. Harmony Mobile deployment - with UEM (part1) 5. Harmony Mobile deployment - with UEM (part2) 6. Harmony Mobile direct deployment 7. Harmony Mobile Security Policy configuration 8. Harmony Mobile dashboard and forensics 9. Adding HM into Mobile Intune 10. Configure HM in Intune for IOS 11. Configure HM in Intune for Android 12. Adding compliance policies for the groups 13. Creating Groups for HM 14. Zero-touch deployment for Android devices 15. Zero-touch deployment for IOS devices 16. Adding HM certification into Intune This course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products. Check Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

    Architecture

    Deployment

    Policy

    Forensics

    Advanced UDM/MDM Integration

    Explore more from Computer Security and Networks

    ©2025  ementorhub.com. All rights reserved