Skill Up Card - Course Bundles

Save up to €4,145 per delegate.

skill up card image - Nexus Human

Symantec Endpoint Protection 14.X - Configure And Protect

4.6 out of 5 rating Last updated 25/06/2024   English

Jump to outline

Find out more about this course

Interested in alternative dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.

Duration

3 Days

18 CPD hours

Overview

At the completion of the course, you will be able to:
Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy.
Blocking Threats with Intrusion Prevention.
Introducing File-Based Threats.
Preventing Attacks with SEP.
Layered Security. Securing Windows Clients.
Secure Mac Clients. Secure Linux Clients.
Controlling Application and File Access.
Restricting Device Access for Windows and Mac Clients.
Hardening Clients with System Lockdown.
Customizing Policies based on Location.
Managing Security Exceptions.

Description

This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14.

Introduction
  • Course environment
    Lab environment
Introducing Network Threats
  • Describing how Symantec Endpoint Protection protects each layer of the network stack
    Discovering the tools and methods used by attackers
    Describing the stages of an attack
Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy
  • Preventing network attacks
    Examining Firewall Policy elements
    Evaluating built-in rules
    Creating custom firewall rules
    Enforcing corporate security policy with firewall rules
    Blocking network attacks using protection and stealth settings
    Configuring advanced firewall feature
Blocking Threats with Intrusion Prevention
  • Introducing Intrusion Prevention technologies
    Configuring the Intrusion Prevention policy
    Managing custom signatures
    Monitoring Intrusion Prevention events
Introducing File-Based Threats
  • Describing threat types
    Discovering how attackers disguise their malicious applications
    Describing threat vectors
    Describing Advanced Persistent Threats and a typical attack scenario
    Following security best practices to reduce risks
Preventing Attacks with SEP Layered Security
  • Virus and Spyware protection needs and solutions
    Describing how Symantec Endpoint Protection protects each layer of the network stack
    Examining file reputation scoring
    Describing how SEP protects against zero-day threats and threats downloaded through files and email
    Describing how endpoints are protected with the Intelligent Threat Cloud Service
    Describing how the emulator executes a file in a sandbox and the machine learning engines role and function
Securing Windows Clients
  • Platform and Virus and Spyware Protection policy overview
    Tailoring scans to meet an environments needs
    Ensuring real-time protection for clients
    Detecting and remediating risks in downloaded files
    Identifying zero-day and unknown threats
    Preventing email from downloading malware
    Configuring advanced options
    Monitoring virus and spyware activity
Securing Mac Clients
  • Touring the SEP for Mac client
    Securing Mac clients
    Monitoring Mac clients
Securing Linux Clients
  • Navigating the Linux client
    Tailoring Virus and Spyware settings for Linux clients
    Monitoring Linux clients
Providing Granular Control with Host Integrity
  • Ensuring client compliance with Host Integrity
    Configuring Host Integrity
    Troubleshooting Host Integrity
    Monitoring Host Integrity
Controlling Application and File Access
  • Describing Application Control and concepts
    Creating application rulesets to restrict how applications run
    Monitoring Application Control events
Restricting Device Access for Windows and Mac Clients
  • Describing Device Control features and concepts for Windows and Mac clients
    Enforcing access to hardware using Device Control
    Discovering hardware access policy violations with reports, logs, and notifications
Hardening Clients with System Lockdown
  • What is System Lockdown
    Determining to use System Lockdown in Whitelist or Blacklist mode
    Creating whitelists for blacklists
    Protecting clients by testing and Implementing System Lockdown
Customizing Policies based on Location
  • Creating locations to ensure the appropriate level of security when logging on remotely
    Determining the criteria and order of assessment before assigning policies
    Assigning policies to locations
    Monitoring locations on the SEPM and SEP client
Managing Security Exceptions
  • Creating file and folder exceptions for different scan types
    Describing the automatic exclusion created during installation
    Managing Windows and Mac exclusions
    Monitoring security exceptions
Additional course details:

Nexus Humans Symantec Endpoint Protection 14.X - Configure And Protect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward.

This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts.

Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success.

While we feel this is the best course for the Symantec Endpoint Protection 14.X - Configure And Protect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you.

Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

FAQ for the Symantec Endpoint Protection 14.X - Configure And Protect Course

Available Delivery Options for the Symantec Endpoint Protection 14.X - Configure And Protect training.
  • Live Instructor Led Classroom Online (Live Online)
  • Traditional Instructor Led Classroom (TILT/ILT)
  • Delivery at your offices in London or anywhere in the UK
  • Private dedicated course as works for your staff.
How many CPD hours does the Symantec Endpoint Protection 14.X - Configure And Protect training provide?

The 3 day. Symantec Endpoint Protection 14.X - Configure And Protect training course give you up to 18 CPD hours/structured learning hours. If you need a letter or certificate in a particular format for your association, organisation or professional body please just ask.

What is the correct audience for the Symantec Endpoint Protection 14.X - Configure And Protect training?

This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14.

Do you provide training for the Symantec Endpoint Protection 14.X - Configure And Protect.

Yes we provide corporate training, dedicated training and closed classes for the Symantec Endpoint Protection 14.X - Configure And Protect. This can take place anywhere in Ireland including, Dublin, Cork, Galway, Northern Ireland or live online allowing you to have your teams from across Ireland or further afield to attend a single training event saving travel and delivery expenses.

What is the duration of the Symantec Endpoint Protection 14.X - Configure And Protect program.

The Symantec Endpoint Protection 14.X - Configure And Protect training takes place over 3 day(s), with each day lasting approximately 8 hours including small and lunch breaks to ensure that the delegates get the most out of the day.

Why are Nexus Human the best provider for the Symantec Endpoint Protection 14.X - Configure And Protect?
Nexus Human are recognised as one of the best training companies as they and their trainers have won and hold many awards and titles including having previously won the Small Firms Best Trainer award, national training partner of the year for Ireland on multiple occasions, having trainers in the global top 30 instructor awards in 2012, 2019 and 2021. Nexus Human has also been nominated for the Tech Excellence awards multiple times. Learning Performance institute (LPI) external training provider sponsor 2024.
Is there a discount code for the Symantec Endpoint Protection 14.X - Configure And Protect training.

Yes, the discount code PENPAL5 is currently available for the Symantec Endpoint Protection 14.X - Configure And Protect training. Other discount codes may also be available but only one discount code or special offer can be used for each booking. This discount code is available for companies and individuals.

Jump to dates

Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Top