Welcome to ONLC Training Centers

Symantec Endpoint Detection and Response 4.2 Administration

Microsoft Gold Partner
Class Dates
(click date for class times)
(click Enroll for locations)

Fee:  $1800
Need a price quote?

Follow the link to our self-service price quote form to generate an email with a price quote.

Need a class for a group?

We can deliver this class for your group. Follow the link to request more information.

Email Alert

Receive an email when this class is available as "Ready to Run" or "Early Notice" status.

Train from your home or office

If you have high-speed internet and a computer you can likely take this class from your home or office.


Symantec Endpoint Detection and Response 4.2 Administration Course Outline

COURSE DESCRIPTION
The Endpoint Detection and Response 4.2 Administration course is designed for the IT security professional in a Security Operations role. This class covers how to detect, investigate, remediate, and recover from an incident using Symantec Endpoint Detection and Response.

Duration 2 days

Course Objectives
By the completion of this course, you will be able to:
Identify evidence of suspicious and malicious activity
Searching for Indicators of Compromise
Block, Isolate, and Remove threats in the Environment
Collect Forensic Information

Who Should Attend
The Endpoint Detection and Response 4.2 Administration course is intended for students who wish to perform Incident Response activities with Symantec Endpoint Detection and Response.

Prerequisites
This course assumes that students familiar with Endpoint Detection & Response methodology and who are familiar with Symantec Endpoint Protection.

COURSE OUTLINE

Module 1: Evolving Threat Landscape
Challenges of Endpoint Detection and Response in the environment
How Symantec Endpoint Detection and Response meets those challenges

Module 2: Increase the visibility of suspicious and malicious activity in the environment
Understanding Suspicious & Malicious Activity
Prerequisite SEDR configuration or considerations
Identifying evidence of suspicious/malicious activity with SEDR
Proactive Security Incident Notification with SEDR
Understanding Indicators of Compromise
Searching for Indicators of Compromise with SEDR

Module 3: Decreasing Security Risk by Responding to Threats in the Environment
Prerequisite configuration or considerations
Methods used to Isolate threats
Isolating threats using SEDR
Methods Used to Block threats
Blocking threats using SEDR
Methods used to remove threats
Removing threats using SEDR

Module 4: Collecting and Reporting forensic data for further investigation of security incidents
Prerequisite configuration or considerations
Information Collected by SEDR
Collecting forensic information using SEDR
Creating reports with SEDR

View outline in Word

N34556

Attend hands-on, instructor-led Symantec Endpoint Detection and Response 4.2 Administration training classes at ONLC's more than 300 locations. Not near one of our locations? Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.

For additional training options, check out our list of Symantec Courses and select the one that's right for you.

GENERAL INFO

Class Format
Class Policies
Student Reviews

Bookmark and Share


HAVE QUESTIONS?
First Name

Last Name

Company

Phone

Email

Location

Question/Comment



ONLC TRAINING CENTERS
800-288-8221
www.onlc.com