Endpoint Security Media Encryption

Level
Total time

Endpoint Security Media Encryption

Perpetual Solutions
Logo Perpetual Solutions
Provider rating: starstarstarstarstar 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

Description

Prerequisites:

General knowledge of TCP/IP, working knowledge of Windows and/or UNIX, working knowledge of network technology, working knowledge of the Internet.

Course Description:

This course provides an understanding of basic concepts and skills necessary to configure and manage Endpoint Security Media Encryption. During this course, you will configure a Endpoint Security Media Encryption Server to manage client machines, and learn about managing and monitoring client media access.

Delegates attending this course will learn:

  • Install and configure an Endpoint Security Server Create and apply client profiles
  • Create user and computer groups using Microsoft Active Directory and/or local database…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Prerequisites:

General knowledge of TCP/IP, working knowledge of Windows and/or UNIX, working knowledge of network technology, working knowledge of the Internet.

Course Description:

This course provides an understanding of basic concepts and skills necessary to configure and manage Endpoint Security Media Encryption. During this course, you will configure a Endpoint Security Media Encryption Server to manage client machines, and learn about managing and monitoring client media access.

Delegates attending this course will learn:

  • Install and configure an Endpoint Security Server Create and apply client profiles
  • Create user and computer groups using Microsoft Active Directory and/or local databases
  • Install and deploy Endpoint Security - Media Encryption Client software to user machines on the network.
  • Test the deployed profiles using USB drives by setting file restrictions and forcing encryption
  • Add a new device to the administration console by evaluating log data
  • Configure and execute reports based on Endpoint Security - Media Encryption audit events using pre-configured reports
  • Encrypt, decrypt and verify removable media using the Encryption Policy Manager
  • Use Endpoint Security - Media Encryption's internal logging and auditing functions to track and monitor user actions

This course includes the following modules:

Course Topics

  • How to apply Endpoint Security - Media Encryption in a corporate environment where appropriate, based on use and methodology
  • Given your corporate network's structure and security policies, how to select the Endpoint Security - Media Encryption components best suited to address security requirement
  • Given corporate requirements, how to install and configure Endpoint Security - Media Encryption Server
  • How to determine the most appropriate settings necessary to apply corporate requirements using the Endpoint Security - Media Encryption Management Console
  • How to create and apply profile templates using Device Manager, Removable Media Manager, Encryption Policy Manager, and Program Security Guard
  • How to create and apply users, computers, and user and computer groups for Endpoint Security - Media Encryption according to corporate Security Policy requirements
  • How to install and deploy Endpoint Security - Media Encryption Client
  • How to test the deployed profiles using pre-constructed security risks
  • How to execute actions to initiate alerts for PSG, RMM and EPM
  • How to add a new device using the Device Configuration Editor in the management console, and test the new device from the client
  • How to encrypt, decrypt and verify removable media using the Encryption Policy Manager
  • How to use Endpoint Security - Media Encryption's internal logging and auditing functions to track and monitor user actions
  • How to configure and execute reports based on Endpoint Security - Media Encryption audit events using pre-configured reports
  • By filtering audit events, how to identify a new device to add into Device Manager using the Device Configuration Editor in the administration console

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.