Endpoint Security Media Encryption
Starting dates and places
Description
Prerequisites:
General knowledge of TCP/IP, working knowledge of Windows and/or UNIX, working knowledge of network technology, working knowledge of the Internet.Course Description:
This course provides an understanding of basic concepts and skills necessary to configure and manage Endpoint Security Media Encryption. During this course, you will configure a Endpoint Security Media Encryption Server to manage client machines, and learn about managing and monitoring client media access.
Delegates attending this course will learn:
- Install and configure an Endpoint Security Server Create and apply client profiles
- Create user and computer groups using Microsoft Active Directory and/or local database…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Prerequisites:
General knowledge of TCP/IP, working knowledge of Windows and/or UNIX, working knowledge of network technology, working knowledge of the Internet.Course Description:
This course provides an understanding of basic concepts and skills necessary to configure and manage Endpoint Security Media Encryption. During this course, you will configure a Endpoint Security Media Encryption Server to manage client machines, and learn about managing and monitoring client media access.
Delegates attending this course will learn:
- Install and configure an Endpoint Security Server Create and apply client profiles
- Create user and computer groups using Microsoft Active Directory and/or local databases
- Install and deploy Endpoint Security - Media Encryption Client software to user machines on the network.
- Test the deployed profiles using USB drives by setting file restrictions and forcing encryption
- Add a new device to the administration console by evaluating log data
- Configure and execute reports based on Endpoint Security - Media Encryption audit events using pre-configured reports
- Encrypt, decrypt and verify removable media using the Encryption Policy Manager
- Use Endpoint Security - Media Encryption's internal logging and auditing functions to track and monitor user actions
This course includes the following modules:
Course Topics
- How to apply Endpoint Security - Media Encryption in a corporate environment where appropriate, based on use and methodology
- Given your corporate network's structure and security policies, how to select the Endpoint Security - Media Encryption components best suited to address security requirement
- Given corporate requirements, how to install and configure Endpoint Security - Media Encryption Server
- How to determine the most appropriate settings necessary to apply corporate requirements using the Endpoint Security - Media Encryption Management Console
- How to create and apply profile templates using Device Manager, Removable Media Manager, Encryption Policy Manager, and Program Security Guard
- How to create and apply users, computers, and user and computer groups for Endpoint Security - Media Encryption according to corporate Security Policy requirements
- How to install and deploy Endpoint Security - Media Encryption Client
- How to test the deployed profiles using pre-constructed security risks
- How to execute actions to initiate alerts for PSG, RMM and EPM
- How to add a new device using the Device Configuration Editor in the management console, and test the new device from the client
- How to encrypt, decrypt and verify removable media using the Encryption Policy Manager
- How to use Endpoint Security - Media Encryption's internal logging and auditing functions to track and monitor user actions
- How to configure and execute reports based on Endpoint Security - Media Encryption audit events using pre-configured reports
- By filtering audit events, how to identify a new device to add into Device Manager using the Device Configuration Editor in the administration console
For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.