Conducted successfully with the following key learning areas.
* Evolution in Threat Landscape* Check Point Approach to Prevent, Detect & Respond Threats* Harmony End Point User Cases* Competitive Differentiators