
COURSE OUTLINE Module 1: Introducing Network Threats This course includes practical hands-on exercises and demonstrations that enable you to test your new skills and begin to use those skills in a working environment. You must have a working knowledge of advanced computer terminology, including TCP/IP networking terms, Internet terms, and an administrator-level knowledge of Microsoft Windows operating systems. Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection. Enforce adaptive security posture Who Should Attend.Control endpoint integrity and compliance.Secure endpoints against network and file-based threats.Delivery Methodīy the completion of this course, you will be able to: This class brings context and examples of attacks and tools used by cybercriminals.

The Symantec Endpoint Protection 14.2: Configure and Protect course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection. Symantec Endpoint Protection 14.2: Configure and Protect Course Outline COURSE DESCRIPTION

Microsoft Technical Certification (Role-based).
