Module 5: Provide a recommended response for evolving and emerging threats This module provides tools and methods to investigate and respond to attacks on the endpoint.This module covers the MITRE ATT&CK model and shows how SES provides security controls for each phase of the attack chain.Module 3: Protect endpoints against each phase of the attack chain The module also talks about how to maintain healthy endpoints once enrolled. This module details the tools and methods used to identify unmanaged endpoints and enroll them in the cloud management platform.Module 2: Maintain Security on all endpoints This module describes the benefits a SES customer achieves using a cloud-based solution for managing endpoint security.COURSE OUTLINE Module 1: Control endpoint protection from the cloud This course assumes that students have a basic understanding of advanced computer terminology, including TCP/IP networking and Internet terms, and an administrator-level knowledge of Microsoft Windows operating systems. The SES Planning, Implementation, and Administration course is intended for IT and system administration professionals who are charged with managing and monitoring Symantec Endpoint Protection endpoints. Enforce adaptive security compliance Who Should Attend.Respond to security threats using SEP monitoring and reporting.Control endpoint integrity and compliance.Secure endpoints against network, file based, and emerging threats.Describe the benefits of using a cloud-based environment for endpoint protection.Durationīy the completion of this course, you will be able to: Protection capabilities utilizing the new cloud management console. This course focuses on the SES enterprise workstation Systems administration professional in a Security Operations position tasked with the day-to-day operation of a SES cloud-based endpoint security environment. The Symantec Endpoint Security (SES) Planning, Implementation, and Administration course is designed for the network, IT security, and Symantec Endpoint Protection Security 15: Plan, Implement and Admin Course Outline COURSE DESCRIPTION Microsoft Technical Certification (Role-based).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |