- Seminar / Training
- Broadcom
- Symantec
- Broadcom Symantec Client Management Suite
- Broadcom Symantec Data Center Security: Server Advanced Administration
- Broadcom Symantec Data Loss Prevention
- Broadcom Symantec Deployment Solution
- Broadcom Symantec Endpoint Protection
- Broadcom Symantec Ghost Solution Suite
- Broadcom Symantec Messaging Gateway
- Broadcom Symantec Protection Suite Enterprise Edition
- Seminar / Training
- Broadcom
- Symantec
- Broadcom Symantec Client Management Suite
- Broadcom Symantec Data Center Security: Server Advanced Administration
- Broadcom Symantec Data Loss Prevention
- Broadcom Symantec Deployment Solution
- Broadcom Symantec Endpoint Protection
- Broadcom Symantec Ghost Solution Suite
- Broadcom Symantec Messaging Gateway
- Broadcom Symantec Protection Suite Enterprise Edition
Broadcom Symantec Endpoint Protection
Seminar / Training Broadcom Symantec Endpoint Protection
Installing Symantec Endpoint Protection
System requirements - Preparing the servers for installation - Installing and configuring Symantec Endpoint Protection
Symantec Endpoint Protection Migration and Version Compatibility
Configuring Symantec Endpoint Protection
Starting and navigating SEPM - Policy types and components - Console authentication - Licensing
Deploying Clients
Client requirements and deployment methods - Preparing for client deployment - Client installation packages, settings, and features - Installing managed clients - Configuring a managed detector - Upgrading Symantec Endpoint Protection clients
Client and Policy Management
Describing SEPM and client communications - Managing clients - Configuring groups - Configuring sites - Active Directory - Client configuration types - Configuring domains - General client settings and tamper protection
Configuring content updates
Introduction to Liveupdate - Configuring the SEPM for Liveupdate - Configuring Liveupdate Settings and Content
Policies
Configuring multiple Group Update Providers (GUPS) - Manually updating virus definitions
Designing a Symantec Endpoint Environment
Architecture and sizing - Designing the architecture - Client-to-SEPM connection types - Content distribution methods - SEPM and database sizing - Completing the deployment
Introduction to Antivirus, Insight and SONAR
Viruses and Spyware - Reputation and Insight - On demand Scans - Auto-Protect - Download Insight - SONAR
Managing virus and spyware protection policies in Symantec Endpoint Protection
Administrator Defined Scans - Settings - Email Scans - Advanced Options - Mac Client Detection - Managing Scanned Clients - Configuring Mac Virus and Spyware Policy Settings
Manage exception policies
Exceptions and exclusions - Configuring exceptions
Network Threat Protection and Application and Device Control
Network Protection Basics - Firewall - Intrusion Prevention - Application Access Protection
Firewall policy management
Firewall Overview - Defining and Changing Rules - Integrated Rules - Stealth Settings Windows Integration Settings
Managing Intrusion Prevention Policies
Configuring intrusion prevention - Managing individual signatures
Managing application and device control policies
Application and device control - Application control - Device control
Network Threat Protection and Application and Device Control
Tools - Policy components - Learned applications - System lockdown
Virtualization
Virtualization Features - Shared Insight Cache - Virtual Client Tagging - Offline Image Scanner
Replication and failover and load balancing
Sites and Replication - How Replication Works - Symantec Endpoint Protection Replication Scenarios - Configuring Replication - Failover and Load Balancing
Server and database management
Master SEPM server - Server security - Communicating with other servers - Managing administrators - Managing the database - Disaster recovery techniques
Monitoring and reporting
Monitoring startup and monitors side - Analyzing and managing logs - Notifications - Creating reports - Introduction to IT Analytics
Connecting SEPM to the Protection Center
Overview of Protection Center - Protection Center Appliance - Configuring Protection Center - Using Protection Center
Requirements
We conduct this seminar online for you. You can book the training as a public seminar or as a company seminar. The practical exercises are carried out in our Remotelab and make up 40-50 percent of the seminar.
Your contacts
-
Promise Akachukwu Kelechi
E-Mail: promise@computer-training.ng
Phone: +234 1 227 9218 -
Peter Chidiebere Ugochukuw
E-Mail: peter@computer-training.ng
Phone: +234 1 227 9218 -
Raphael Chukuwgozie Ndubuisi
E-Mail: raphael@computer-training.ng
Phone: +234 1 227 9218
- Implementation guarantee - Implementation guarantee for two or more participants
- Mobile classrooms - the ideal complement for company seminars
- Free support - for questions after the seminar
- Delivery on account - no prepayment required
- Interview with the trainer / quality assurance - get to know and assess the trainer in advance
- Clarify seminar requirements - review your knowledge with the trainer
- Assistance with travel costs - we cover part of the costs of hotel accommodation
- Meals - all day cold / hot drinks and a full lunch in the restaurant
- Location of training centres - always centrally located and easily accessible
- Discount - we have attractive prices, take advantage of our additional discounts
- Remotelabs - rent our Remotelabs for your own seminars or as a complement to your company seminars