McAfee 1 Day Encryption
Starting dates and places
Description
Overview
The McAfee Endpoint Encryption course has been created to assist security professionals in securing their mobile workforce and preventing data loss, unauthorised access and information leakage from their organisation.
Keeping up-to-date with the latest software versions is necessary to maintain the productivity and efficiency of an IT department. It also enables you to get the most from your security investment. This IT Security training course will enable you to maximise the performance of your solution.
Prerequisites
None
Delegates will learn how to
• Familiar with the product
• Understand which components perform what functions
• Able to deploy the product and create policies …
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Overview
The McAfee Endpoint Encryption course has been created to assist
security professionals in securing their mobile workforce and
preventing data loss, unauthorised access and information leakage
from their organisation.
Keeping up-to-date with the latest software versions is necessary
to maintain the productivity and efficiency of an IT department. It
also enables you to get the most from your security investment.
This IT Security training course will enable you to maximise the
performance of your solution.
Prerequisites
None
Delegates will learn how to
• Familiar with the product
• Understand which components perform what functions
• Able to deploy the product and create policies as
required
The training will be interspersed with scenarios and labs to
facilitate learning.
Course Outline.
• Introduce disk encryption and discuss its uses
• Highlight the product prerequisites
• Describe its concepts and roles
• Configure and integrate Endpoint Encryption into McAfee ePO
Central
Management Console
• Configure Product and User based policies
• Discuss and implement user association with systems
• Introduce the new pre-boot authentication user experience
• Discuss and implement user association with systems
• Discuss and implement deployment techniques
• Illustrate the reporting capabilities
• Introduce system and user based recovery techniques and full
disaster recovery
Certificate of course completion presented to delegates at the end of the course.
QA reserves the right to improve the specification and format of its courses for the benefit of its customers without notice to the customer.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.