Symantec Endpoint Protection Training Course Symantec Endpoint Protection Training Course

Symantec Endpoint protection

Symantec Endpoint Protection Training

The Symantec Endpoint Protection course version 12.1 Administration from Innovative Technology Solutions imparts skills to security professionals for designing, installing, deploying, configuring, managing and monitoring Symantec Endpoint Protection 12.1. Students get to learn how to protect and safeguard enterprise systems by implementing intrusion prevention systems, firewalls, application and device security controls, and behavioral protection policies.

Objectives

By the completion of this course, you w ill be able to:
  • Describe Symantec Endpoint Protection products,components, dependencies, and system hierarchy.
  • Install and configure Sy mantec Endpoint Protection management and client components.
  • Deploy Sy mantec Endpoint Protection clients.
  • Manage the client user interface
  • Manage product content updates.
  • Design a Symantec Endpoint Protection environment
  • Manage Virus and Spyw are Protectionpolicies.
  • Manage SONAR scans.
  • Manage Fire wall and Intrusion Prevention policies.
  • Manage Application and Device Controlpolicies.
  • Manage virtualized clients.
  • Configure replication and load balancing.
  • Monitor and maintainthe Symantec Endpoint Protection environment.
  • Interface the Symantec Endpoint Protection Manager w ith Protection Center

Innovative Technology Solutions offers Symantec Endpoint Protection Training in 9 different locations in India – Bangalore, Chennai, Delhi, Gurgaon, Hyderabad, Kolkata, Mumbai, Noida & Pune.

Intended Audience

This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants w ho are charged with the installation, configuration, and day today management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment

Prerequisites

You must have w orking know ledge of advanced computer terminology, including TCP/IP networking terms and Internet terms, and an administrator level knowledge of Microsoft Window s 2000/XP/2003 operating systems

Course Outline

  1. Introduction
    • Course overview
    • The classroom lab environment
  2. Symantec Endpoint Protection Product Solution
    • Why use Symantec Endpoint Protect ion?
    • Symantec Endpoint Protection technologies
    • Symantec Endpoint Protection services
    • Symantec Endpoint Protection components
    • Symantec Endpoint Protection policies and concepts
    • Symantec Endpoint Protection product t iers
  3. Installing Symantec Endpoint Protection
    • Ident ifying system requirements
    • Preparing servers for installat ion
    • Installing and conf iguring the Symantec Endpoint Protection Manager
    • Describing Symantec Endpoint Protection migration and version compat ibility
  4. Configuring the Symantec Endpoint Protection Environment
    • Starting and navigat ing the SEPM
    • Describing policy types and components
    • Console authenticat ion
    • Licensing the SEP environment
  5. Deploying Clients
    • Client requirements and deployment methods
    • Preparing for client deployment
    • Client installat ion packages, settings, and features
    • Installing managed clients
    • Conf iguring an unmanaged detector
    • Upgrading Symantec Endpoint Protection c lients
  6. Client and Policy Management
    • Describing SEPM and client communicat ions
    • Administer ing clients
    • Conf iguring groups
    • Conf iguring locat ions
    • Active Directory integrat ion w ith SEP 12.1
    • Client conf igurat ion modes
    • Conf iguring domains
    • General client settings and Tamper Protection
  7. Configuring Content Updates
    • Introducing LiveUpdate
    • Conf iguring the SEPM for LiveUpdate
    • Conf iguring the LiveUpdate Sett ings and Content policies
    • Conf iguring multiple group update providers (GUPs)
    • Manually updat ing v irus def init ions
  8. Designing a Symantec Endpoint Environment
    • Architecture and sizing considerations
    • Des igning the architecture
    • Determining client-to-SEPM rat ios
    • Content distribution methods
    • SEPM and database siz ing
    • Completing the deployment
  9. Introducing Antivirus, Insight, and SONAR
    • Virus and spyw are protection needs and solutions
    • Reputat ion and Insight
    • Administrator-def ined scans
    • Auto-Protect
    • Dow nload Insight
    • SONAR
    • Inc luded Virus and Spyw are Protection polic ies
  10. Managing Virus and Spyware Protection Policies
    • Conf iguring administrator-def ined scans
    • Conf iguring protect ion technology settings and scans
    • Conf iguring e-mail scans
    • Conf iguring advanced opt ions
    • Conf iguring Mac client detect ion
    • Managing scanned clients
    • Conf iguring Mac Virus and Spyw are Protect ion policy settings
  11. Managing Exception Policies
    • Except ions and exclusions
    • Conf iguring the Exceptions policy
  12. Introducing Network Threat Protection and Application and Device Control
    • Netw ork threat protection basics
    • The f irew all
    • Intrusion prevention
    • Applicat ion access protection
  13. Managing Firewall Policies
    • Firew all policy overview
    • Def ining rule components
    • Modifying f irew all rules
    • Conf iguring built- in rules
    • Conf iguring protect ion and stealth sett ings
    • Conf iguring Windows integration sett ings
  14. Managing Intrusion Prevention Policies
    • Conf iguring intrusion prevention
    • Managing custom signatures
  15. Managing Application and Device Control Policies
    • Creating applicat ion and device control policies
    • Def ining applicat ion control
    • Modifying policy rules
    • Def ining device control
  16. Customizing Network Threat Protection and Application and Device Control
    • Tools for customizing netw ork threat protect ion
    • Managing policy components
    • Conf iguring learned applicat ions
    • Conf iguring system lockdow n
  17. Virtualization
    • Introducing virtualizat ion features
    • Virtual image exception
    • Shared Insight Cache
    • Virtual client tagging
    • Of f line image scanner
  18. Configuring Replication and Failover and Load Balancing
    • About sites and replication
    • How replication w orks
    • Symantec Endpoint Protection replication scenarios
    • Conf iguring replication
    • Failover and load balancing
  19. Performing Server and Database Management
    • Managing SEPM servers
    • Maintaining server security
    • Communicat ing w ith other servers
    • Managing administrators
    • Managing the database
    • Disaster recovery techniques
For More info contact us