Symantec Backup and Endpoint Training

Key Features

  • Symantec Endpoint Protection Product Solution
  • Installing Symantec Endpoint Protection
  • Configuring the Symantec Endpoint Protection Environment
  • Deploying Clients
  • Client and Policy Management
  • Configuring Content Updates
  • What you will learn Symantec

    ABOUT Symantec:

    The Symantec Endpoint Protection 12.1: Administration course is designed for the netw ork, IT security, and systems administration professional tasked w ith architecting, implementing, and monitoring virus and spyw are protection, zero-day protection, and netw ork threat protection solutions. This class covers how to design, deploy, install, configure, manage, and monitor Symantec Endpoint Protection 12.1 (SEP 12.1).

    Students learn how to create and implement the client firew all, intrusion prevention, application and device control, and behavioral protection policies that guard the enterprise from viruses and hackers. In addition, students learn how to perform server and database management, expand the management environment, use virtualization features for virtual clients, and interface the Symantec Endpoint Protection Manager w ith Protection Center.

    Who Should Attend

    This course is for netw ork managers, resellers, systems administrators, client security administrators, systems professionals, and consultants w ho are charged w ith the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of netw ork environments, and w ho are responsible for troubleshooting and tuning the performance of this product in the enterprise environment.

    Course Objectives By the completion of this course, you w ill be able to:
  • Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy.
  • Install and configure Symantec Endpoint Protection management and client components.
  • Deploy Symantec Endpoint Protection clients.
  • Manage the client user interface.
  • Manage product content updates.
  • Design a Symantec Endpoint Protection environment.
  • Manage Virus and Spyw are Protection policies.
  • Manage SONA R scans.
  • Manage Firew all and Intrusion Prevention policies.
  • Manage Application and Device Control policies.
  • Manage virtualized clients.
  • Configure replication and load balancing.
  • Monitor and maintain the Symantec Endpoint Protection environment.
  • Interface the Symantec Endpoint Protection Manager w ith Protection Center.
     Course overview
     The classroom lab environment

    Symantec Endpoint Protection Product Solution
     Why use Symantec Endpoint Protection?
     Symantec Endpoint Protection technologies
     Symantec Endpoint Protection services
     Symantec Endpoint Protection components
     Symantec Endpoint Protection policies and concepts
     Symantec Endpoint Protection product tiers

    Installing Symantec Endpoint Protection
     Identifying system requirements
     Preparing servers for installation
     Installing and configuring the Symantec Endpoint Protection

     Describing Symantec Endpoint Protection migration and version compatibility
    Configuring the Symantec Endpoint Protection

     Starting and navigating the SEPM
     Describing policy types and components
     Console authentication
     Licensing the SEP environment

    Deploying Clients
     Client requirements and deployment methods
     Preparing for client deployment
     Client installation packages, settings and features
     Installing managed clients
     Configuring an unmanaged detector
     Upgrading Symantec Endpoint Protection clients

    Client and Policy Management
     Describing SEPM and client communications
     Administering clients
     Configuring groups
     Configuring locations
     Active Directory integration w ith SEP 12.1
     Client configuration modes
     Configuring domains
     General client settings and Tamper Protection

    Configuring Content Updates
     Introducing LiveUpdate
     Configuring the SEPM for LiveUpdate
     Configuring the LiveUpdate Settings and Content

     Configuring multiple group update providers (GUPs)
     Manually updating virus definitions

    Designing a Symantec Endpoint Environment
     Architecture and sizing considerations
     Designing the architecture
     Determining client-to-SEPM ratios
     Content distribution methods
     SEPM and database sizing
     Completing the deployment

    Introducing Antivirus, Insight, and SONAR
     Virus and spyw are protection needs and solutions
     Reputation and Insight
     Administrator-defined scans
     Auto-Protect
     Dow nload Insight
     SONA R
     Included Virus and Spyw are Protection policies

    Managing Virus and Spyware Protection Policies
     Configuring administrator-defined scans
     Configuring protection technology settings and scans
     Configuring e-mail scans
     Configuring advanced options
     Configuring Mac client detection
     Managing scanned clients
     Configuring Mac Virus and Spyw are Protection

    policy settings
    Managing Exception Policies
     Exceptions and exclusions
     Configuring the Exceptions policy
    Introducing Network Threat Protection and Application and Device Control
     Netw ork threat protection basics
     The firew all
     Intrusion prevention
     Application access protection

    Managing Firewall Policies
     Firew all policy overview
     Defining rule components
     Modifying firew all rules
     Configuring built-in rules
     Configuring protection and stealth settings
     Configuring Windows integration settings

    Managing Intrusion Prevention Policies
     Configuring intrusion prevention
     Managing custom signatures

    Managing Application and Device Control Policies
     Creating application and device control policies
     Defining application control
     Modifying policy rules
     Defining device control

    Customizing Network Threat Protection and Application and Device Control
     Tools for customizing netw ork threat protection
     Managing policy components
     Configuring learned applications
     Configuring system lockdown

     Introducing virtualization features
     Virtual image exception
     Shared Insight Cache
     Virtual client tagging
     Offline image scanner

    Configuring Replication and Failover and Load Balancing
     About sites and replication
     How replication w orks
     Symantec Endpoint Protection replication scenarios
     Configuring replication
     Failover and load balancing

    Performing Server and Database Management
     Managing SEPM servers
     Maintaining server security
     Communicating w ith other servers
     Managing administrators
     Managing the database
     Disaster recovery techniques

    Advanced Monitoring and Reporting
     Monitoring the Home and Monitors page
     Analyzing and managing logs
     Configuring and view ing notifications
     Creating and review ing reports
     Introducing IT Analytics

    Interfacing the SEPM with Protection Center
     Describing Protection Center
     Describing the Protection Center appliance
     Configuring Protection Center
     Using Protection Center

    RIZE Trainings offers wide range of courses belonging to business, IT, students, developers, data and working professionals, freshers etc; We regulate training about your expected courses and help you to advance your career. RIZE come up with numerous courses and offer training throughout the world like France, United states, China, India, Singapore, Germany, Australia, Canada etc; by using interface like webex and GoToMeeting.

    RIZE trainers assist in developing Real time experience of the required course and also improving interview skills, knowledge, communication, content of the course, innovative project ideas, future scope etc,. This makes our students are becoming future experts and working as professionals in top rated companies.

    The course begins in a few days, and I still do not have my login information. What do I do?
    Once your registration for a course is completed, we will send activation link to start your sessions.

    What happens if I miss my training date, do I have any options?
    In case you miss training date, we will send recorded sessions to you. Otherwise, we assign for next live batch.

    How does the online training work?
    All of our online courses are live instructor led online courses. You will have the ability to interact directly with the trainer. Once registered for a class you will receive detailed instructions on how to access your class.

    How do I receive the course materials?
    You receive a link to download the course materials when you register. Our trainers assist you in your assessments, case studies, sample projects, interview skills etc;

    Will I be able to view the sessions again at a later time?
    Yes, We provide recorded sessions.

    Who are your trainers?
    All our trainers are working professionals from the Industry and have at least 10-12 yrs of relevant experience in various domains. They are subject matter experts. So that participants get a great learning experience.

    Can I get the same in-class experience at home or work?
    Yes. You can attend courses anywhere that has an Internet connection. If you choose to participate from your home or workplace, you must validate your own equipment to ensure it meets the required specifications.

    What should I bring to class?
    You need to have your course materials, Internet, computer headset and the Link to your Rizetrainings classroom e-mail, which contains the link and LOGIN credentials you need to take your course.

    Where can I get more information?
    If you need more information, please call us at +91-970 39 767 53 or send mail to . Rize Trainings Advisors will be happy to assist you.

    Do you offer placements?
    We help our customers for preparing their resumes, work on sample live projects and provide assistance for interview preparation. We don't offer any placements however if you go through the course diligently and complete the project you will have a very good hands on experience to work on a Live project.

    What happens if I have technical problems during my class?
    If you have technical difficulties, you call us at +91-970 39 767 53 . Our support team will resolve any issues you might encounter.

    Back to top