• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online

  • 3 days

  • All levels

Description

Duration

3 Days

18 CPD hours

This course is intended for

This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment.

Overview

At the completion of the course, you will be able to:
Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy.
Install and configure Symantec Endpoint Protection management and client components.
Deploy Symantec Endpoint Protection Windows, Windows Embedded, Mac and Linux clients.
Manage the client user interface.
Manage content updates for Windows, Mac, and Linux.
Perform server and database management.
Configure replication and load balancing.
Design a Symantec Endpoint Protection environment.

This course is designed for the network, IT security, and systems administration professional tasked with architecting and implementing Symantec Endpoint Protection.

Introduction

  • Course overview
    The classroom lab environment

Symantec Endpoint Protection Product Solution

  • Why use Symantec Endpoint Protection?
    Symantec Endpoint Protection technologies
    Symantec Endpoint Protection services
    Symantec Endpoint Protection components
    Symantec Endpoint Protection policies and concepts
    Extending Symantec Endpoint Protection

Installing the Symantec Endpoint Protection Manager

  • Identifying system requirements
    Preparing servers for installation
    Installing and configuring the Symantec Endpoint Protection Manager
    Describing Symantec Endpoint Protection upgrades and version compatibility

Configuring the Symantec Endpoint Protection Environment

  • Starting and navigating the SEPM
    Describing policy types and components
    Console authentication
    Licensing the SEP environment

Deploying Windows and Windows Embedded Clients

  • Planning the client deployment
    Configuring client deployment package
    Deploying packages to clients
    Maintaining the client environment
    Upgrading Symantec Endpoint Protection clients

Deploying Mac and Linux Clients

  • Linux prerequisites
    Linux deployment
    Mac prerequisites
    Mac deployment

Client and Policy Management

  • Describing SEPM and client communications
    Administering clients
    Configuring groups
    Configuring locations
    Active Directory integration with SEP 12.1
    Client configuration modes
    Configuring domains
    General client settings and Tamper Protection

Configuring Content Updates for Windows Clients

  • Introducing LiveUpdate
    Configuring the SEPM for LiveUpdate
    Configuring the LiveUpdate Settings and Content policies
    Configuring multiple group update providers (GUPs)
    Manually updating virus definitions

Configuring Content Updates for Mac and Linux Clients

  • Describing content update methods
    Configuring the LiveUpdate policy
    Configuring the SEPM as a reverse proxy
    Monitoring updates

Performing Server and Database Management

  • Managing SEPM servers
    Maintaining server security
    Communicating with other servers
    Managing administrators
    Managing the database
    Disaster recovery techniques

Configuring Replication and Failover and Load Balancing

  • About sites and replication
    How replication works
    Symantec Endpoint Protection replication scenarios
    Configuring replication
    Failover and load balancing

Designing a Symantec Endpoint Environment

  • Architecture components
    Architecture constraints
    Component placement
    Content delivery
    Determining client to SEPM ratios
    SEPM and database sizing best practices

About The Provider

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK....

Read more about Nexus Human

Tags

Reviews