System Protection - Abhiraksha.com
System Protection
Course Duration – 18 hours
Our System Security training program will provide in-depth learning of protecting endpoint systems (desktop, laptop & server) with McAfee Endpoint security software from malware attacks.

This course provides an in-depth understanding of the tasks crucial to set up and administer McAfee Endpoint Security with McAfee ePolicy Orchestrator (ePO) software. McAfee Endpoint Security comprises multiple modules such as Threat Prevention, Host Firewall, Web Control, and Adaptive Threat Protection—to help you take immediate action against potentially dangerous applications, downloads, websites, and files. 

Participants must have prior knowledge of following areas —

  • Windows administration & network communication,  Windows Active Directory & DNS fundamentals.
  • Basic understanding of computer security, command line syntax, type of  malwares and its impact. 

Content Coverage

This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction on following topics.

  1. Solution Overview – McAfee Endpoint Security & ePO software purpose & capabilities along its key features and benefits.
  2. Installation Prerequisites – Understand hardware, operating system & database requirement for the deployment of McAfee Endpoint Software components. 
  3. Planning & Design Deployment Architecture – Plan centralized McAfee Endpoint Security deployment across wide spread network nodes including deployment architecture.
  4. McAfee ePO Installation & Configuration – We will perform hands-on to learn installation of McAfee ePolicy Orchestrator centralized management software. After the installation we will  walk through different configuration options in the ePO interface.
  5. Centralized deployment of McAfee Endpoint Security – We will perform & learn centralized installation of McAfee Endpoint Security software via ePO
  6. Strengthening System Security with Policy Configuration – We must strengthen security of the endpoint system with appropriate recommended configuration. You will learn to perform configuration of McAfee Endpoint Security components such as Threat Prevention, Host Firewall, Web Control, and Adaptive Threat Protection. You will learn & perform hands-on of following  configurations –
  • Configuring Common Settings – Logging, Proxy server for McAfee Global Threat Intelligence reputation, and Update configuration.
  • Threat Prevention: Configuring Access Protection, Exploit Prevention, On-Access with On-Demand Scanners, setup exclusions and Potentially Unwanted Program (PUP) Detection features.
  • Host Firewall Overview and Configuring Firewall Options 
  • Configuring Web Control to implement web site access restrictions.
  • Monitoring and Reporting – Learn using dashboards, queries, reports, and threat event detail.
Related Training

Information Security Management System ISMS

Information Security Management System (ISMS)

Implementer Professional for BS ISO/ IEC 27001:2013 Information Security Management System (ISMS)The International Organization for Standardization (ISO) is a global body that collects and manages various standards for different disciplines. The ISO 27001 standard is designed to function as a ...
Read More
Ethical-Hacking

Penetration Testing and Ethical Hacking

Course Overview Ethical hacking involves penetration testing where trained or experienced professionals attempt to penetrate a IT network or computer system as a service to the owner of the system to find security vulnerabilities which a hacker may be able ...
Read More
Network-Security-Abhiraksha.com

Network Security With Checkpoint Firewall

Course Overview We live in an age where technology is constantly changing and cyber threats are becoming harder to detect. Today unknown attacks too are rising in the count of thousands everyday and attacking every size of the organization. Organizations ...
Read More
System Protection - Abhiraksha.com

System Protection From Malwares

Course Duration - 18 hoursOur System Security training program will provide in-depth learning of protecting endpoint systems (desktop, laptop & server) with McAfee Endpoint security software from malware attacks.This course provides an in-depth understanding of the tasks crucial to set ...
Read More
Security Analyst - Abhiraksha.com

Security Analyst

Cybersecurity Analyst is one of the high demand job roles by the reputed organizations for their security positions.Course OverviewA security analyst is a member of network security operations team  and is responsible to monitor as well as perform cyber incident  ...
Read More

Network Access Control

Organizations and individuals today are surrounded by devices from laptops, smartphones and tablets to servers, virtual instances, IoT devices and industrial systems of all kinds. Unknown, Unprotected and Vulnerable systems as well as devices significantly expand your attack surface. Organizations today ...
Read More
Data Protection - Abhiraksha.com

Data Protection

Course OverviewThis course provides in-depth training to design, implement,configure, and use Endpoint Data Loss Prevention in order to protect business confidential data from intentional or unintentional leakage. We will discuss and explain how to monitor day-to-day end-user data transfer actions, ...
Read More

IT and Cybersecurity Fundamentals

Course Overview This course helps to learn information technology fundamentals which are outlined below and creates a broader understanding of IT concepts making it ideal for non-technical professionals such as beginners in this domain whether passed from school or graduated ...
Read More