Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Fundamentals Of Symantec Endpoint Protection
Symantec Training Course duration

5 days

Symantec Training Course outline

Introduction
  • Course overview
  • The classroom lab environment
  • Why use Symantec Endpoint Protection?
  • Symantec Endpoint Protection technologies
  • Symantec Endpoint Protection services
  • Symantec Endpoint Protection components
  • Symantec Endpoint Protection policies and concepts
  • Symantec Endpoint Protection product tiers
Installing Symantec Endpoint Protection
  • Identifying system requirements
  • Preparing servers for installation
  • Installing and configuring the Symantec Endpoint Protection Manager
  • Describing Symantec Endpoint Protection migration and version compatibility
Configuring the Symantec Endpoint Protection Environment
  • Starting and navigating the SEPM
  • Describing policy types and components
  • Console authentication
  • Licensing the SEP environment
Deploying Clients
  • Client requirements and deployment methods
  • Preparing for client deployment
  • Client installation packages, settings, and features
  • Installing managed clients
  • Configuring an unmanaged detector
  • Upgrading Symantec Endpoint Protection clients
Client and Policy Management
  • Describing SEPM and client communications
  • Administering clients
  • Configuring groups
  • Configuring locations
  • Active Directory integration w ith SEP 12.1
  • Client configuration modes
  • Configuring domains
  • General client settings and Tamper Protection
Configuring Content Updates
  • Introducing LiveUpdate
  • Configuring the SEPM for LiveUpdate
  • Configuring the LiveUpdate Settings and Content policies
  • Configuring multiple group update providers (GUPs)
  • Manually updating virus definitions
Designing a Symantec Endpoint Environment
  • Architecture and sizing considerations
  • Designing the architecture
  • Determining client-to-SEPM ratios
  • Content distribution methods
  • SEPM and database sizing
  • Completing the deployment
Introducing Antivirus, Insight, and SONAR
  • Virus and spyware protection needs and solutions
  • Reputation and Insight
  • Administrator-defined scans
  • Auto-Protect
  • Download Insight
  • SONA R
  • Included Virus and Spyware Protection policies
Managing Virus and Spyware Protection Policies
  • Configuring administrator-defined scans
  • Configuring protection technology settings and scans
  • Configuring e-mail scans
  • Configuring advanced options
  • Configuring Mac client detection
  • Managing scanned clients
  • Configuring Mac Virus and Spyware Protection policy settings
Managing Exception Policies
  • Exceptions and exclusions
  • Configuring the Exceptions policy
Introducing Network Threat Protection and Application and Device Control
  • Network threat protection basics
  • The firewall
  • Intrusion prevention
  • Application access protection
Managing Firewall Policies
  • Firewall policy overview
  • Defining rule components
  • Modifying firewall rules
  • Configuring built-in rules
  • Configuring protection and stealth settings
  • Configuring Windows integration settings
Managing Intrusion Prevention Policies
  • Configuring intrusion prevention
  • Managing custom signatures
Managing Application and Device Control Policies
  • Creating application and device control policies
  • Defining application control
  • Modifying policy rules
  • Defining device control
Customizing Network Threat Protection and Application and Device Control
  • Tools for customizing network threat protection
  • Managing policy components
  • Configuring learned applications
  • Configuring system lockdown
Virtualization
  • Introducing virtualization features
  • Virtual image exception
  • Shared Insight Cache
  • Virtual client tagging
  • Offline image scanner
Configuring Replication and Failover and Load Balancing
  • About sites and replication
  • How replication works
  • Symantec Endpoint Protection replication scenarios
  • Configuring replication
  • Failover and load balancing
Performing Server and Database Management
  • Managing SEPM servers
  • Maintaining server security
  • Communicating with other servers
  • Managing administrators
  • Managing the database
  • Disaster recovery techniques
Advanced Monitoring and Reporting
  • Monitoring the Home and Monitors page
  • Analyzing and managing logs
  • Configuring and viewing notifications
  • Creating and reviewing reports
  • Introducing IT Analytics
Interfacing the SEPM with Protection Center
  • Describing Protection Center
  • Describing the Protection Center appliance
  • Configuring Protection Center

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved