Course Duration – 18 hours
Our System Security training program will provide in-depth learning of protecting endpoint systems (desktop, laptop & server) with McAfee Endpoint security software from malware attacks.
This course provides an in-depth understanding of the tasks crucial to set up and administer McAfee Endpoint Security with McAfee ePolicy Orchestrator (ePO) software. McAfee Endpoint Security comprises multiple modules such as Threat Prevention, Host Firewall, Web Control, and Adaptive Threat Protection—to help you take immediate action against potentially dangerous applications, downloads, websites, and files.
Participants must have prior knowledge of following areas —
- Windows administration & network communication, Windows Active Directory & DNS fundamentals.
- Basic understanding of computer security, command line syntax, type of malwares and its impact.
Content Coverage
This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction on following topics.
- Solution Overview – McAfee Endpoint Security & ePO software purpose & capabilities along its key features and benefits.
- Installation Prerequisites – Understand hardware, operating system & database requirement for the deployment of McAfee Endpoint Software components.
- Planning & Design Deployment Architecture – Plan centralized McAfee Endpoint Security deployment across wide spread network nodes including deployment architecture.
- McAfee ePO Installation & Configuration – We will perform hands-on to learn installation of McAfee ePolicy Orchestrator centralized management software. After the installation we will walk through different configuration options in the ePO interface.
- Centralized deployment of McAfee Endpoint Security – We will perform & learn centralized installation of McAfee Endpoint Security software via ePO
- Strengthening System Security with Policy Configuration – We must strengthen security of the endpoint system with appropriate recommended configuration. You will learn to perform configuration of McAfee Endpoint Security components such as Threat Prevention, Host Firewall, Web Control, and Adaptive Threat Protection. You will learn & perform hands-on of following configurations –
- Configuring Common Settings – Logging, Proxy server for McAfee Global Threat Intelligence reputation, and Update configuration.
- Threat Prevention: Configuring Access Protection, Exploit Prevention, On-Access with On-Demand Scanners, setup exclusions and Potentially Unwanted Program (PUP) Detection features.
- Host Firewall Overview and Configuring Firewall Options
- Configuring Web Control to implement web site access restrictions.
- Monitoring and Reporting – Learn using dashboards, queries, reports, and threat event detail.
Related Training
Information Security Management System (ISMS)
Implementer Professional for BS ISO/ IEC 27001:2013 Information Security Management System (ISMS)The International Organization for Standardization (ISO) is a global body that collects and manages various standards for different disciplines. The ISO 27001 standard is designed to function as a ...
Read More
Read More
Penetration Testing and Ethical Hacking
Course Overview Ethical hacking involves penetration testing where trained or experienced professionals attempt to penetrate a IT network or computer system as a service to the owner of the system to find security vulnerabilities which a hacker may be able ...
Read More
Read More
Network Security With Checkpoint Firewall
Course Overview We live in an age where technology is constantly changing and cyber threats are becoming harder to detect. Today unknown attacks too are rising in the count of thousands everyday and attacking every size of the organization. Organizations ...
Read More
Read More
System Protection From Malwares
Course Duration - 18 hoursOur System Security training program will provide in-depth learning of protecting endpoint systems (desktop, laptop & server) with McAfee Endpoint security software from malware attacks.This course provides an in-depth understanding of the tasks crucial to set ...
Read More
Read More
Security Analyst
Cybersecurity Analyst is one of the high demand job roles by the reputed organizations for their security positions.Course OverviewA security analyst is a member of network security operations team and is responsible to monitor as well as perform cyber incident ...
Read More
Read More
Network Access Control
Organizations and individuals today are surrounded by devices from laptops, smartphones and tablets to servers, virtual instances, IoT devices and industrial systems of all kinds. Unknown, Unprotected and Vulnerable systems as well as devices significantly expand your attack surface. Organizations today ...
Read More
Read More
Data Protection
Course OverviewThis course provides in-depth training to design, implement,configure, and use Endpoint Data Loss Prevention in order to protect business confidential data from intentional or unintentional leakage. We will discuss and explain how to monitor day-to-day end-user data transfer actions, ...
Read More
Read More
IT and Cybersecurity Fundamentals
Course Overview This course helps to learn information technology fundamentals which are outlined below and creates a broader understanding of IT concepts making it ideal for non-technical professionals such as beginners in this domain whether passed from school or graduated ...
Read More
Read More