Kursangebot
- Upcoming Events
- Garantietermine
- Neue Kurse
- iTLS Academy»
-
iTLS IT Workshops»
- IT-Training by iTLS
- Garantietermine
- Themen im Fokus
- Professional Services
- Hersteller im Fokus
- Amazon Web Services»
- Aruba»
- Barracuda
- Check Point
- Cisco»
- Ethical Hacking
- F5 Networks
- Fortinet»
- Google Cloud»
- ITIL® und Cobit
- Microsoft»
- NetApp»
- Palo Alto Networks»
- VMware»
- Weitere Hersteller»
- Themen/Technologien im Fokus
- Artificial Intelligence (AI)»
- Cloud Computing»
- Cyber Security»
- Data Center»
- Kubernetes / Container»
- Linux»
- Network Analysis / Wireshark»
- Projektmanagement
- Python»
- Software Development»
- Wireless & Mobility»
SY-SEPCP
Online Training
Dauer 3 Tage
Derzeit gibt es keine Online-Termine für diesen Kurs.
Classroom Training
Dauer 3 Tage
Preis (exkl. MwSt.)
-
Deutschland:
Country: DE1.990,- €
-
Schweiz:
Country: CHCHF 2.585,-
- Nespresso Kaffee, Tee, Säfte und Mineral
- Kuchen, frisches Obst und Snacks
- Mittagessen in einem der direkt erreichbaren Partnerrestaurants
Gilt nur bei Durchführung durch iTLS. Termine, die von unseren Partnern durchgeführt werden, beinhalten ggf. ein abweichendes Verpflegungsangebot.
Derzeit gibt es keine Klassenraum-Termine für diesen Kurs.
Termin anfragenSymantec Endpoint Protection 14.x: Configure and Protect (SEPCP)
Detaillierter Kursinhalt
Introduction
- Course environment
- Lab environment
Introducing Network Threats
- Describing how Symantec Endpoint Protection protects each layer of the network stack
- Discovering the tools and methods used by attackers
- Describing the stages of an attack
Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy
- Preventing network attacks
- Examining Firewall Policy elements
- Evaluating built-in rules
- Creating custom firewall rules
- Enforcing corporate security policy with firewall rules
- Blocking network attacks using protection and stealth settings
- Configuring advanced firewall feature
Blocking Threats with Intrusion Prevention
- Introducing Intrusion Prevention technologies
- Configuring the Intrusion Prevention policy
- Managing custom signatures
- Monitoring Intrusion Prevention events
Introducing File-Based Threats
- Describing threat types
- Discovering how attackers disguise their malicious applications
- Describing threat vectors
- Describing Advanced Persistent Threats and a typical attack scenario
- Following security best practices to reduce risks
Preventing Attacks with SEP Layered Security
- Virus and Spyware protection needs and solutions
- Describing how Symantec Endpoint Protection protects each layer of the network stack
- Examining file reputation scoring
- Describing how SEP protects against zero-day threats and threats downloaded through files and email
- Describing how endpoints are protected with the Intelligent Threat Cloud Service
- Describing how the emulator executes a file in a sandbox and the machine learning engine’s role and function
Securing Windows Clients
- Platform and Virus and Spyware Protection policy overview
- Tailoring scans to meet an environment’s needs
- Ensuring real-time protection for clients
- Detecting and remediating risks in downloaded files
- Identifying zero-day and unknown threats
- Preventing email from downloading malware
- Configuring advanced options
- Monitoring virus and spyware activity
Securing Mac Clients
- Touring the SEP for Mac client
- Securing Mac clients
- Monitoring Mac clients
Securing Linux Clients
- Navigating the Linux client
- Tailoring Virus and Spyware settings for Linux clients
- Monitoring Linux clients
Providing Granular Control with Host Integrity
- Ensuring client compliance with Host Integrity
- Configuring Host Integrity
- Troubleshooting Host Integrity
- Monitoring Host Integrity
Controlling Application and File Access
- Describing Application Control and concepts
- Creating application rulesets to restrict how applications run
- Monitoring Application Control events
Restricting Device Access for Windows and Mac Clients
- Describing Device Control features and concepts for Windows and Mac clients
- Enforcing access to hardware using Device Control
- Discovering hardware access policy violations with reports, logs, and notifications
Hardening Clients with System Lockdown
- What is System Lockdown?
- Determining to use System Lockdown in Whitelist or Blacklist mode
- Creating whitelists for blacklists
- Protecting clients by testing and Implementing System Lockdown.
Customizing Policies based on Location
- Creating locations to ensure the appropriate level of security when logging on remotely
- Determining the criteria and order of assessment before assigning policies
- Assigning policies to locations
- Monitoring locations on the SEPM and SEP client
Managing Security Exceptions
- Creating file and folder exceptions for different scan types
- Describing the automatic exclusion created during installation
- Managing Windows and Mac exclusions
- Monitoring security exceptions