Check Point Jump Start: CloudGuard Posture Management
Offered By: Checkpoint via Coursera
Course Description
Overview
In this course, you will learn about what is Posture Management, why you need a Posture Management solution, and what makes Check Point CloudGuard Posture management solution the Global leader in Cloud Protection.
Lesson 1 - What is Posture Management?
Lesson 2 – What are the Cloud Security Challenges?
Lesson 3 - What is Check Point CloudGuard Posture Management?
Lesson 4 - How does CloudGuard Posture Management Work?
Lesson 5 – CloudGuard Posture Management Course Summary
Lesson 6 – Posture Management Demo Lab
Syllabus
- What is Posture Management?
- In this lesson we will learn what posture management is, why you would need a posture management solution, and how a posture management solution will be used to secure your assets in the cloud.
- What are the Cloud Security Challenges?
- In this lesson we will look at key cybersecurity challenges that customers face when they move their assets into the cloud and how a posture management solution can help address these challenges.
- What is Check Point CloudGuard Posture Management?
- In this lesson we are going to discuss the Check Point CloudGuard Posture Management solution and why it is the Global leader in cloud protection.
- How does CloudGuard Posture Management Work?
- In this lesson, we are going to break down how CloudGuard Posture Management works, how it functions and how to get started.
- CloudGuard Posture Management Course Summary
- In this lesson, we are going to summarize the CloudGuard training course
- Demonstrate the CloudGuard console
- This final lesson is a demonstration Lab. We are going to go over the CloudGuard Console interface and navigate through the main key topics discussed in the lecture videos.
Taught by
Jason Tugwell
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity