opkshowcase.blogg.se

Symantec endpoint protection 14.2
Symantec endpoint protection 14.2













symantec endpoint protection 14.2

  • Virus and Spyware protection needs and solutions.
  • Following security best practices to reduce risks Module 5: Preventing Attacks with SEP Layered Security.
  • Describing Advanced Persistent Threats and a typical attack scenario.
  • Discovering how attackers disguise their malicious applications.
  • Monitoring Intrusion Prevention events Module 4: Introducing File-Based Threats.
  • Configuring the Intrusion Prevention policy.
  • Configuring the Memory Exploit Mitigation policy.
  • Introducing Intrusion Prevention technologies.
  • Configuring advanced firewall feature Module 3: Blocking Threats with Intrusion Prevention.
  • Enforcing corporate security policy with firewall rules.
  • Describing the stages of an attack Module 2: Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy.
  • symantec endpoint protection 14.2

    Discovering the tools and methods used by attackers.Describing how Symantec Endpoint Protection protects each layer of the network stack.COURSE OUTLINE Module 1: Introducing Network Threats This course includes practical hands-on exercises and demonstrations that enable you to test your new skills and begin to use those skills in a working environment. You must have a working knowledge of advanced computer terminology, including TCP/IP networking terms, Internet terms, and an administrator-level knowledge of Microsoft Windows operating systems. Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection. Enforce adaptive security posture Who Should Attend.Control endpoint integrity and compliance.Secure endpoints against network and file-based threats.Delivery Methodīy the completion of this course, you will be able to: This class brings context and examples of attacks and tools used by cybercriminals.

    symantec endpoint protection 14.2 symantec endpoint protection 14.2

    The Symantec Endpoint Protection 14.2: Configure and Protect course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection. Symantec Endpoint Protection 14.2: Configure and Protect Course Outline COURSE DESCRIPTION Microsoft Technical Certification (Role-based).















    Symantec endpoint protection 14.2