GB
/
GBP
/
EN

Shaping the future of IT skills

Maximising IT performance through learning

Symantec Endpoint Protection 14.x: Configure and Protect - ENDPOINT-CP

WGAC-SYM-ENDPOINT-CP

Broadcom Symantec

Description

Show Tabs
Introduction

By the completion of this course, you will be able
to:
• Secure endpoints against network and filebased
threats
• Control endpoint integrity and compliance
• Enforce adaptive security posture

Network, IT security, and systems administration
professionals in a Security Operations position who
are tasked with configuring optimum security
settings for endpoints protected by Symantec
Endpoint Protection 14

This course includes practical hands-on exercises
and demonstrations that enable you to test your
new skills and begin to use those skills in a working
environment.

Prerequisites & Audience

You must have a working knowledge of advanced
computer terminology, including TCP/IP
networking terms, Internet terms, and an
administrator-level knowledge of Microsoft
Windows operating systems.

Course Benefits
Course Topics

Introduction
• Course environment
• Lab environment
Securing Endpoints against Network-Based
Attacks
Introducing Network Threats
 Describing how Symantec Endpoint Protection
protects each layer of the network stack
 Discovering the tools and methods used by
attackers
 Describing the stages of an attack
Protecting against Network Attacks and Enforcing
Corporate Policies using the Firewall Policy
 Preventing network attacks
 Examining Firewall Policy elements
 Evaluating built-in rules
 Creating custom firewall rules
 Enforcing corporate security policy with firewall
rules
 Blocking network attacks using protection and
stealth settings
 Configuring advanced firewall feature
Blocking Threats with Intrusion Prevention
 Introducing Intrusion Prevention technologies
 Configuring the Intrusion Prevention policy
 Managing custom signatures
 Monitoring Intrusion Prevention events
Page 2 of 3
Securing Endpoints against File-Based
Threats
Introducing File-Based Threats
 Describing threat types
 Discovering how attackers disguise their
malicious applications
 Describing threat vectors
 Describing Advanced Persistent Threats and a
typical attack scenario
 Following security best practices to reduce risks
Preventing Attacks with SEP Layered Security
 Virus and Spyware protection needs and
solutions
 Describing how Symantec Endpoint Protection
protects each layer of the network stack
 Examining file reputation scoring
 Describing how SEP protects against zero-day
threats and threats downloaded through files
and email
 Describing how endpoints are protected with
the Intelligent Threat Cloud Service
 Describing how the emulator executes a file in
a sandbox and the machine learning engine’s
role and function
Securing Windows Clients
 Platform and Virus and Spyware Protection
policy overview
 Tailoring scans to meet an environment’s needs
 Ensuring real-time protection for clients
 Detecting and remediating risks in downloaded
files
 Identifying zero-day and unknown threats
 Preventing email from downloading malware
 Configuring advanced options
 Monitoring virus and spyware activity
Securing Mac Clients
 Touring the SEP for Mac client
 Securing Mac clients
 Monitoring Mac clients
Securing Linux Clients
 Navigating the Linux client
 Tailoring Virus and Spyware settings for Linux
clients
 Monitoring Linux clients
Controlling endpoint integrity and
compliance
Providing Granular Control with Host Integrity
 Ensuring client compliance with Host Integrity
 Configuring Host Integrity
 Troubleshooting Host Integrity
 Monitoring Host Integrity
Controlling Application and File Access
 Describing Application Control and concepts
 Creating application rulesets to restrict how
applications run
 Monitoring Application Control events
Restricting Device Access for Windows and Mac
Clients
 Describing Device Control features and
concepts for Windows and Mac clients
 Enforcing access to hardware using Device
Control
 Discovering hardware access policy violations
with reports, logs, and notifications
Hardening Clients with System Lockdown
 What is System Lockdown?
 Determining to use System Lockdown in
Whitelist or Blacklist mode
 Creating whitelists for blacklists
 Protecting clients by testing and Implementing
System Lockdown.
Enforcing Adaptive Security Posture
Customizing Policies based on Location
 Creating locations to ensure the appropriate
level of security when logging on remotely
 Determining the criteria and order of
assessment before assigning policies
 Assigning policies to locations
Page 3 of 3
 Monitoring locations on the SEPM and SEP
client
Managing Security Exceptions
 Creating file and folder exceptions for different
scan types
 Describing the automatic exclusion created
during installation
 Managing Windows and Mac exclusions
 Monitoring security exceptions

Broadcom Symantec courses


SSL Visibility 5.0 Administration - SSLV
CODE: WGAC-SYM-SSLV
Symantec Security Analytics 7.x: Professional - SSA-PROF
CODE: WGAC-SYM-SSA-PROF
Symantec Security Analytics 8 Administrator - SSA-ADMIN
CODE: WGAC-SYM-SSA-ADMIN
Symantec Messaging Gateway 10.6: Administration - SMG-ADMIN
CODE: WGAC-SYM-SMG-ADMIN
Symantec IT Management Suite 8.0: Administrators - SITS-ADMIN
CODE: WGAC-SYM-SITS-ADMIN
Symantec Deployment Solution 7.5: Administration - SDS-ADMIN
CODE: WGAC-SYM-SDS-ADMIN
Symantec Cyber Security Services R1 - SCSS-R1
CODE: WGAC-SYM-SCSS-R1
Symantec Endpoint Protection 14.x: Plan and Implement - ENDPOINT-PI
CODE: WGAC-SYM-ENDPOINT-PI
Symantec Endpoint Protection 14x Maintain and Troubleshoot - ENDPOINT-MT
CODE: WGAC-SYM-ENDPOINT-MT
Symantec Endpoint Protection 14.x: Manage and Administer - ENDPOINT-MA
CODE: WGAC-SYM-ENDPOINT-MA
Symantec Endpoint Protection 14.x: Configure and Protect - ENDPOINT-CP
CODE: WGAC-SYM-ENDPOINT-CP
Symantec Encryption Management Server 3.3 and Desktop 10.3: Administration - EMSD-ADMIN
CODE: WGAC-SYM-EMSD-ADMIN
Symantec Data Loss Prevention 15.x: Administration - DLP
CODE: WGAC-SYM-DLP
Symantec Data Center Security: Server Advanced 6.7 Administration - DCSSA-ADMIN
CODE: WGAC-SYM-DCSSA-ADMIN
Symantec Client Management Suite 7.6: Implementation - CMS-IMPL
CODE: WGAC-SYM-CMS-IMPL
Symantec Client Management Suite 7.6: Administration - CMS-ADMIN
CODE: WGAC-SYM-CMS-ADMIN
Symantec Cloud SOC R1 - CLD-SOC-R1
CODE: WGAC-SYM-CLD-SOC-R1
Symantec Control Compliance Suite Vulnerability Manager 12.x Foundations - CCSVM-FOUNDATION
CODE: WGAC-SYM-CCSVM-FOUNDATION
Symantec Control Compliance Suite CCS 11.0 Module Course - CCS-MODUL
CODE: WGAC-SYM-CCS-MODUL
Symantec Control Compliance Suite 11.0: Administration - CCS-ADMIN
CODE: WGAC-SYM-CCS-ADMIN
Symantec Content Analysis 2.x: Administration - CAS
CODE: WGAC-SYM-CAS
Symantec Advanced Threat Protection 2.x: Incident Response - ATP-IR
CODE: WGAC-SYM-ATP-IR
ProxySG 7.3 Administration with Secure Web Gateway
CODE: WGAC-BRO-PROXYADM
ProxySG 6.7 Diagnostics and Troubleshooting
CODE: WGAC-BRO-PROXYDT
We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.