FAQ

Check Point Certified Endpoint Specialist (CCES) Course Overview

Check Point Certified Endpoint Specialist (CCES) Course Overview

The Check Point Certified Endpoint Specialist (CCES) course is designed to equip IT professionals with the skills necessary to manage and deploy Check Point Endpoint Security solutions. This certification ensures that learners gain in-depth knowledge and expertise in protecting organizations from advanced threats with Check Point's comprehensive endpoint protection.

Module 1: Introduction to Endpoint Security
- Fundamentals of endpoint security
- Overview of Check Point's endpoint solutions

Module 2: Endpoint Security Management
- Centralized management platform
- Policy configuration and deployment

Module 3: Deploying Endpoint Security
- Installation and client connectivity
- Best practices for rollout

Module 4: Additional Endpoint Server Configurations
- Server settings and optimization
- User access controls

Module 5: Data Security Protection
- Data loss prevention (DLP)
- Encryption and port protection

Module 6: Advanced Threat Prevention
- Zero-day threat identification
- SandBlast Agent protection mechanisms

Module 7: Reporting and Troubleshooting
- Generating reports
- Effective troubleshooting techniques

Obtaining the CCES certification signifies proficiency in securing endpoints against complex threats. The course will help learners become proficient Check Point Certified Endpoint Specialists, ready to enhance the security posture of their organizations.

Purchase This Course

Fee On Request

  • Live Training (Duration : 16 Hours)
  • Per Participant
  • Guaranteed-to-Run (GTR)
  • Classroom Training fee on request
  • Select Date
    date-img
  • CST(united states) date-img

Select Time


♱ Excluding VAT/GST

You can request classroom training in any city on any date by Requesting More Information

Inclusions in Koenig's Learning Stack may vary as per policies of OEMs

  • Live Training (Duration : 16 Hours)
Koeing Learning Stack

Koenig Learning Stack

Free Pre-requisite Training

Join a free session to assess your readiness for the course. This session will help you understand the course structure and evaluate your current knowledge level to start with confidence.

Assessments (Qubits)

Take assessments to measure your progress clearly. Koenig's Qubits assessments identify your strengths and areas for improvement, helping you focus effectively on your learning goals.

Post Training Reports

Receive comprehensive post-training reports summarizing your performance. These reports offer clear feedback and recommendations to help you confidently take the next steps in your learning journey.

Class Recordings

Get access to class recordings anytime. These recordings let you revisit key concepts and ensure you never miss important details, supporting your learning even after class ends.

Free Lab Extensions

Extend your lab time at no extra cost. With free lab extensions, you get additional practice to sharpen your skills, ensuring thorough understanding and mastery of practical tasks.

Free Revision Classes

Join our free revision classes to reinforce your learning. These classes revisit important topics, clarify doubts, and help solidify your understanding for better training outcomes.

Inclusions in Koenig's Learning Stack may vary as per policies of OEMs

Scroll to view more course dates

♱ Excluding VAT/GST

You can request classroom training in any city on any date by Requesting More Information

Inclusions in Koenig's Learning Stack may vary as per policies of OEMs

Request More Information

Email:  WhatsApp:

Course Prerequisites

To ensure that participants can successfully engage with and benefit from the Check Point Certified Endpoint Specialist (CCES) course, the following minimum prerequisites are recommended:


  • Basic understanding of networking concepts, including LANs, WANs, and IP networking.
  • Familiarity with Windows and/or UNIX operating systems.
  • Knowledge of Internet and networking technologies such as TCP/IP, DNS, and HTTP/HTTPS.
  • Prior experience or understanding of firewall technologies.
  • An understanding of security concepts and policies.

These prerequisites provide the foundational knowledge necessary for participants to grasp the course material effectively. However, individuals with a strong desire to learn and a commitment to engage with the course content may also find success, even if they do not meet all the above criteria.


Exam-Format Table
Exam ComponentDetails
Exam NameCheck Point Certified Endpoint Specialist (CCES)
Exam TypeMultiple Choice Questions (MCQs), Simulations
Total QuestionsVaries; typically around 50-70 (Hypothetical)
Passing Score70% (Hypothetical)
Exam Duration90-120 minutes (Hypothetical)
LanguageEnglish, possibly others depending on region and test provider
Exam ProviderCheck Point Software Technologies Authorized Training Providers
Exam RegistrationThrough Check Point's official certification website or testing centers
Certification Validity2 years (Hypothetical)
Recommended TrainingCheck Point Certified Endpoint Specialist Training Course

Target Audience for Check Point Certified Endpoint Specialist (CCES)

The Check Point Certified Endpoint Specialist course equips IT professionals with the skills to manage and deploy endpoint security solutions.


Target audience for the Check Point Certified Endpoint Specialist (CCES) course includes:


  • Network Engineers
  • Security Administrators
  • System Administrators
  • Security Analysts
  • Security Consultants
  • IT Security Officers
  • Infrastructure Architects
  • Technical Support Staff
  • Check Point Endpoint Security Users
  • Cybersecurity Professionals looking to specialize in endpoint protection


Learning Objectives - What you will Learn in this Check Point Certified Endpoint Specialist (CCES)?

  1. The Check Point Certified Endpoint Specialist (CCES) course equips students with skills to manage, deploy, and troubleshoot Check Point Endpoint Security solutions effectively.

  2. Learning Objectives and Outcomes:

  • Understand the fundamentals of Check Point Endpoint Security and its components.
  • Gain proficiency in managing Endpoint Security through the Endpoint Security Management Console.
  • Learn to deploy Endpoint Security clients and configure them for various environments.
  • Acquire skills for additional Endpoint Server configurations to optimize performance and security.
  • Explore data security protection techniques, including encryption and data loss prevention.
  • Delve into advanced threat prevention to protect against sophisticated malware and zero-day threats.
  • Develop the ability to configure VPN clients and remote access to the Endpoint Security system.
  • Understand how to use compliance verification in endpoint security.
  • Gain knowledge of troubleshooting and resolving common issues in Endpoint Security.
  • Learn to generate reports, analyze security incidents, and interpret logs for informed decision-making.

Suggested Courses

What other information would you like to see on this page?
USD