Cybersecurity training program
Faced with the risks that can paralyze a company's business if its information system becomes inoperable, it's vital to know how to secure it.
The course is designed for IT and security administrators, and is divided into theoretical and practical sessions.
On completion of the course you will be able to :
1) Describe the IT threats to which a company may be exposed
2) Description of the KASPERSKY KESB solution
3) Deploying the KSC server and endpoint protection
4) Deploying the server with EDR
5) Dealing with detection and investigation
6) strategy management
7)Maintenance Training participants will install, configure and optimize a deployment of the KASPERSKY Endpoint client server solution.
A l’achèvement de la formation vous serez capable :
1.Décrire les menaces informatiques
que peut subir une entreprise
2.Description de la solution KESB de KASPERSKY
3.Déployer le serveur de la KSC et la protection sur les Endpoint
4.Déployer le serveur avec l’EDR
5.Faire face à une détection avec investigation
6.Gestion des stratégies
7.Maintenance Les participants à formation auront à installer, configurer et optimiser un déploiement de la solution KASPERSKY Endpoint client server .
Training prerequisites?
Knowledge of Windows and Windows Server operating systems Basic network skills
Training plan
-
Introduction to the world of cyber security
-
Computer threats
Kaspersky Endpoint Security for Business solution components
Licensing features and model 3.KASPERSKY server deployment
. Prerequisites
. Server installation with the Kaspersky Security Center console
. Installing the new Kaspersky Security Center Web console
. Discovering the network
. Creating computer groups
. Creating strategies
. Deploying Kaspersky Endpoint Security protection
Lab: deployment of Kaspersky Security Center
PC protection deployment
. Prerequisites
. Optimizing the Kaspersky Endpoint Security agent
. Creating an installation package
. Installation method
. Remote installation
. Installation with Active directory
. Lab KES agent installation on PC
Organizing computers into groups
Configuring protection against file-based threats
. How to configure the file threat protection module
. Module optimization
. Scheduled scan configuration
Configuring network threat protection
. Network threat protection components
. Protection against threats from the mail stream
. Protection against webstream threats
Lab. Protection against advanced attacks
. Protection against new threats
. Advanced threat protection module
. Optimization
Lab . Check network connections
. Firewall module in Kaspersky Endpoint
. Configuration
Protection for mobile PCs
. Definition
. Creation of the company's out-of-bounds protection policy
Lab: protection for mobile PCs
. Web filtering
. Module implementation and configuration
. Tests
. Statistics and Reporting
Lab: web filtering
. Application control
. Configuring application control categories
Lab: application control
. Peripheral control
Lab: device control
. Creating a board
. Email reporting
. Managing infections
. Database maintenance
. Checking connectivity between KES and KSC
. Backup configuration
. Mise à niveau du serveur Kaspersky Security Centre
. Définition de l’EDR (Endpoint Détection and Response)
. Installation des fonctionnalités de l’EDR Optimum
. Gestion des stratégies
. Configuration des rapports de détection
. Traitement d’un incident de sécurité
. Lab : simulation d’une attaque et réponse
.Préparation du serveur Kaspersky pour la protection des mobiles
. Génération du paquet de protection
.Gestion des stratégies
. Reporting
. Lab
Sophos is a British firm specializing in IT security applications and appliances, including solutions for EndPoint protection, encryption, network security, email security, mobile security and Sophos UTM (Unified Threat Management). Sophos also offers a free antivirus for the general public called Sophos Home.
In this Sophos XG Firewall training course, you'll learn about the features and configuration steps of this UTM in the context of an AML.
Sign upTraining prerequisites?
Basic knowledge of networks Knowledge of computer security Good knowledge of Windows Server and Active Directory
Training plan
- IT security threats and how SOPHOS firewall protects against them
- Introduction to the SOPHOS firewall
- SOPHOS Firewall VM installation, activation and registration - Network protection management
- Intrusion prevention system strategy
- VPN client and VPN site-to-site
- Identity-based firewall
- Web protection and application control
- Web proxy settings
- Email protection
- Wifi management
- Local and centralized reporting SD-WAn management
- Troubleshooting
Pour avoir du succès, votre contenu doit être utile à vos lecteurs.
Commencez par le client: trouvez ce qu'il veut et donner-le lui.