Our Endpoint Security Administration course provides an in-depth introduction to the tasks crucial to set up and administer Endpoint Security. Endpoint Security combines Threat Prevention, Adaptive Threat Protection, Firewall, and Web Control to take immediate action against potentially dangerous applications, downloads, websites, and files.
This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the Endpoint Security user interface and policies, as well as detailed instructions for the integration of this solution.
Module 01: Course Welcome
Module 02: Endpoint Security – Solution Overview
Module 03: Planning the Endpoint Security Deployment
Module 04: ePolicy Orchestrator Overview
Module 05: Installing Endpoint Security Packages and Extensions
Module 06: Deploy the Endpoint Security Client to the Endpoints
Module 07: Using the Endpoint Security Client
Module 08: Endpoint Security Policy Management Overview
Module 09: Configuring Common Settings
Module 10: Threat Prevention – Configuring Access Protection
Module 11: Threat Prevention – Configuring Exploit Prevention
Module 12: Threat Prevention – Configuring On-Access Scan
Module 13: Threat Prevention – Configuring On-Demand Scans
Module 14: Threat Prevention – Configuring the Options Policy
Module 15: Configuring Adaptive Threat Protection
Module 16: Firewall Overview and Configuring Firewall Options
Module 17: Configuring Firewall Rules and Groups
Module 18: Configuring Web Control
Module 19: Monitoring and Reporting
Module 20: Endpoint Security for Servers
Module 21: Protection Workspace Overview
Day 1
Day 2
Day 3
Day 4
This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security.
Our Endpoint Security Administration course provides an in-depth introduction to the tasks crucial to set up and administer Endpoint Security. Endpoint Security combines Threat Prevention, Adaptive Threat Protection, Firewall, and Web Control to take immediate action against potentially dangerous applications, downloads, websites, and files.
This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the Endpoint Security user interface and policies, as well as detailed instructions for the integration of this solution.
Module 01: Course Welcome
Module 02: Endpoint Security – Solution Overview
Module 03: Planning the Endpoint Security Deployment
Module 04: ePolicy Orchestrator Overview
Module 05: Installing Endpoint Security Packages and Extensions
Module 06: Deploy the Endpoint Security Client to the Endpoints
Module 07: Using the Endpoint Security Client
Module 08: Endpoint Security Policy Management Overview
Module 09: Configuring Common Settings
Module 10: Threat Prevention – Configuring Access Protection
Module 11: Threat Prevention – Configuring Exploit Prevention
Module 12: Threat Prevention – Configuring On-Access Scan
Module 13: Threat Prevention – Configuring On-Demand Scans
Module 14: Threat Prevention – Configuring the Options Policy
Module 15: Configuring Adaptive Threat Protection
Module 16: Firewall Overview and Configuring Firewall Options
Module 17: Configuring Firewall Rules and Groups
Module 18: Configuring Web Control
Module 19: Monitoring and Reporting
Module 20: Endpoint Security for Servers
Module 21: Protection Workspace Overview
Day 1
Day 2
Day 3
Day 4
This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security.