Symantec Endpoint Protection 14.x Manage and Configure

 

Length  – 5 days

Overview
The Symantec Endpoint Protection 14.x: Manage and Administer course is designedfor the network, IT security, and systems administration professional in a Security Operations position tasked with the day – to – day operation of the SEPM management console. The class covers configuring sever – client communication, domains, groups, and locations and Active Directory integration. You also learn how Symantec Endpoint Protection uses LiveUpdate servers and Group Update Providers to deliver content to clients. In addition, you learn how to respond to incidents using monitoring and reporting.
The Symantec Endpoint Protection 14.x: Configure and Protect course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. This class brings context and examples of attacks and tools used by cybercriminals.

Prerequisites
You must have working knowledge of advanced computer terminology, including TCP/IP networking terms and Internet terms, and an administrator – level knowledge of Microsoft Windows operating systems.

Audience
This course is for IT and system administration professionals who are charged with managing and monitoring Symantec Endpoint Protection endpoints.

 

Objectives
By the completion of this course, you will be able to:

Describe how the Symantec Endpoint Protection Manager (SEPM) communicates with clients and make appropriate changes as necessary.
Design and create Symantec Endpoint Protection group structures to meet the needs of your organization.
Respond to threats using SEPM monitoring and reporting.
Analyze the content delivery system (LiveUpdate).
Reduce bandwidth consumption using the best method to deliver content updates to clients.

Configure Group Update Providers.
Create location aware content updates.
Use Rapid Release definitions to remediate a virus outbreak.

Secure endpoints against network and file – based threats.
Control endpoint integrity and compliance.
Enforce adaptive security posturę.