Questions? Feedback? powered by Olark live chat software

Symantec Endpoint Protection 14.x: Configure and Protect Newly Released

Symantec Endpoint Protection 14.x: Configure and Protect Course Description

Duration: 3.00 days (24 hours)

The Symantec Endpoint Protection 14.x: Configure and Protect course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. This course brings context and examples of attacks and tools used by cybercriminals.

Next Class Dates

Feb 27, 2017 – Mar 1, 2017
10:00 AM – 5:00 PM ET

View More Schedules »

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this Symantec Endpoint Protection 14.x: Configure and Protect Course

  • » Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14

Back to Top

Course Prerequisites for Symantec Endpoint Protection 14.x: Configure and Protect

  • » You must have a working knowledge of advanced computer terminology, including TCP/IP networking terms, Internet terms, and an administrator-level knowledge of Microsoft Windows operating systems

Back to Top

Symantec Endpoint Protection 14.x: Configure and Protect Course Objectives

  • » Secure endpoints against network and file-based threats
  • » Control endpoint integrity and compliance
  • » Enforce adaptive security posture

Back to Top

Symantec Endpoint Protection 14.x: Configure and Protect Course Outline

      1. Introduction
        1. Course environment
        2. Lab environment
      2. Securing Endpoints against Network-Based Attacks (Introducing Network Threats)
        1. Describing how Symantec Endpoint Protection protects each layer of the network stack
        2. Discovering the tools and methods used by attackers
        3. Describing the stages of an attack
      3. Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy
        1. Preventing network attacks
        2. Examining Firewall Policy elements
        3. Evaluating built-in rules
        4. Creating custom firewall rules
        5. Enforcing corporate security policy with firewall rules
        6. Blocking network attacks using protection and stealth settings
        7. Configuring advanced firewall feature
      4. Blocking Threats with Intrusion Prevention
        1. Introducing Intrusion Prevention technologies
        2. Configuring the Intrusion Prevention policy
        3. Managing custom signatures
        4. Monitoring Intrusion Prevention events
      5. Securing Endpoints against File-Based Threats (Introducing File-Based Threats)
        1. Describing threat types
        2. Discovering how attackers disguise their malicious applications
        3. Describing threat vectors
        4. Describing Advanced Persistent Threats and a typical attack scenario
        5. Following security best practices to reduce risks
      6. Preventing Attacks with SEP Layered Security
        1. Virus and Spyware protection needs and solutions
        2. Describing how Symantec Endpoint Protection protects each layer of the network stack
        3. Examining file reputation scoring
        4. Describing how SEP protects against zero-day threats and threats downloaded through files and email
        5. Describing how endpoints are protected with the Intelligent Threat Cloud Service
        6. Describing how the emulator executes a file in a sandbox and the machine learning engine’s role and function
      7. Securing Windows Clients
        1. Platform and Virus and Spyware Protection policy overview
        2. Tailoring scans to meet an environment’s needs
        3. Ensuring real-time protection for clients
        4. Detecting and remediating risks in downloaded files
        5. Identifying zero-day and unknown threats
        6. Preventing email from downloading malware
        7. Configuring advanced options
        8. Monitoring virus and spyware activity
      8. Securing Mac Clients
        1. Touring the SEP for Mac client
        2. Securing Mac clients
        3. Monitoring Mac clients
      9. Securing Linux Clients
        1. Navigating the Linux client
        2. Tailoring Virus and Spyware settings for Linux clients
        3. Monitoring Linux clients
      10. Controlling endpoint integrity and compliance (Providing Granular Control with Host Integrity)
        1. Ensuring client compliance with Host Integrity
        2. Configuring Host Integrity
        3. Troubleshooting Host Integrity
        4. Monitoring Host Integrity
      11. Controlling Application and File Access
        1. Describing Application Control and concepts
        2. Creating application rulesets to restrict how applications run
        3. Monitoring Application Control events
      12. Restricting Device Access for Windows and Mac Clients
        1. Describing Device Control features and concepts for Windows and Mac clients
        2. Enforcing access to hardware using Device Control
        3. Discovering hardware access policy violations with reports, logs, and notifications
      13. Hardening Clients with System Lockdown
        1. What is System Lockdown?
        2. Determining to use System Lockdown in Whitelist or Blacklist mode
        3. Creating whitelists for blacklists
        4. Protecting clients by testing and Implementing System Lockdown.
      14. Enforcing Adaptive Security Posture (Customizing Policies based on Location)
        1. Creating locations to ensure the appropriate level of security when logging on remotely
        2. Determining the criteria and order of assessment before assigning policies
        3. Assigning policies to locations
        4. Monitoring locations on the SEPM and SEP client
      15. Managing Security Exceptions
        1. Creating file and folder exceptions for different scan types
        2. Describing the automatic exclusion created during installation
        3. Managing Windows and Mac exclusions
        4. Monitoring security exceptions

Back to Top

Do you have the right background for Symantec Endpoint Protection 14.x: Configure and Protect?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Our instructors are passionate at teaching and are experts in their respective fields. Our average NetCom instructor has many, many years of real-world experience and impart their priceless, valuable knowledge to our students every single day. See our world-class instructors.   See more instructors...

Back to Top

Recent Client Testimonials & Reviews

Instructor was knowledgeable and helpful.

- Andrew B.
Course(s) Taken

» Symantec Enterprise Vault 10x for Exchange: Maintain and Troubleshoot - Retired

  More testimonials »  

Back to Top

Ways to contact us

Back to Top