McAfee 1 Day Device Control
Starting dates and places
Description
Overview
The McAfee Device Control course has been created to assist security professionals in securing their mobile workforce and preventing data loss, unauthorised access and information leakage from their organisation.
Keeping up-to-date with the latest software versions is necessary to maintain the productivity and efficiency of an IT department. It also enables you to get the most from your security investment. This IT Security training course will enable you to maximise the performance of your solution.
Prerequisites
None
Delegates will learn how to
The training will be interspersed with scenarios and labs to facilitate learning.
By the end of the course, candidates will be:-
- Fam…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Overview
The McAfee Device Control course has been created to assist
security professionals in securing their mobile workforce and
preventing data loss, unauthorised access and information leakage
from their organisation.
Keeping up-to-date with the latest software versions is necessary
to maintain the productivity and efficiency of an IT department. It
also enables you to get the most from your security investment.
This IT Security training course will enable you to maximise the
performance of your solution.
Prerequisites
None
Delegates will learn how to
The training will be interspersed with scenarios and labs to facilitate learning.
By the end of the course, candidates will be:-
- Familiar with the product
- Understand which components perform what functions
- Able to deploy the product and create policies as required
Course Outline.
- Introduce Device Control and discuss its use
- Highlight the product prerequisites
- Describe its concepts and roles
- Configure and integrate Device Control into McAfee ePO Central
- Configure device monitoring and management
- Configure device classification and management
- Introduce analysis of discovered devices and classified data
- Configure device management and data leakage rules
- Discuss and implement deployment techniques
Certificate of course completion presented to delegates at the
end of the course
QA reserves the right to improve the specification and format of its courses for the benefit of its customers without notice to the customer.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.