CODE: SYM_000286
LENGTH: 32 Hours (4 days)
PRICE: €4 000,00
The Symantec Endpoint Protection 14.x Administration R2 course is designed for the network, IT security, and systems administration professional in a Security Operations position tasked with the day-to-day operation of the SEPM on-premise management console and with configuring optimum security settings for endpoints protected by Endpoint Protection.
Hands-On
This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment.
By the completion of this course, you will be able to:
▪ Describe how the Endpoint Protection Manager (SEPM) communicates with clients and make appropriate changes as necessary.
▪ Design and create Endpoint Protection group structures to meet the needs of your organization.
▪ Respond to threats using SEPM monitoring and reporting.
▪ Analyze the content delivery system (LiveUpdate).
▪ Configure Group Update Providers.
▪ Create location aware updates.
▪ Secure endpoints against network and file-based threats
▪ Enforce an adaptive security posture
This course assumes that students have a basic understanding of advanced computer terminology, including TCP/IP networking and Internet terms, and an administrator-level knowledge of Microsoft Windows operating systems.
Module 1: Introduction
▪ The Evolving Threat Landscape
▪ Challenges of Endpoint Detection and Response in the environment
▪ How Symantec Endpoint Detection and Response meets objectives
▪ Components of Symantec Endpoint Detection and
▪ Response
▪ Shared Technologies
▪ Symantec Endpoint Detection and Response AddOns and Integrations
Module 2: Architecture and Sizing
▪ Architecture and Sizing Overview
▪ Architecture
▪ Sizing
Module 3: Implementation
▪ System Requirements
▪ Installing and Bootstrapping
▪ Setup Wizard
▪ Management Console Overview
▪ Managing Certificates
▪ User Accounts and Roles
▪ Symantec Endpoint Protection Integration
Module 4: Detecting Threats
▪ Understanding Suspicious & Malicious Activity
▪ Prerequisite configuration or considerations
▪ Identifying evidence of suspicious/malicious activity with Symantec EDR
Module 5: Investigating Threats
▪ General Stages of an Advanced Attack
▪ Understanding Indicators of Compromise
▪ Searching for Indicators of Compromise
▪ Analyzing Endpoint Activity Recorder Data
▪ Additional Investigation Tools
Module 6: Responding to Threats
▪ Cybersecurity Framework
▪ Isolating Threats in The Environment
▪ Blocking Threats in The Environment
▪ Removing Threats in The Environment
▪ Tuning the Environment
Module 7: Reporting on Threats
▪ Recovery Overview
▪ Notifications and Reporting
▪ Collecting forensic data for further investigation of security incidents
▪ Using Symantec EDR to create a Post Incident Report
Module 8: Managing System Settings
▪ Managing Certificates
▪ Importing and Exporting Incident Rules State
▪ Event and Incident Forwarding
▪ Splunk Integration
Students interested in Administration of Symantec endpoints utilizing the cloud management interface available, as part of Symantec Endpoint Security
Complete should take the following course:
▪ Symantec Endpoint Security Complete Administration R1.4
50-580 Endpoint Security Complete - R2 Technical Specialist