Symantec Endpoint Protection 14.2: Plan and Implement Course Outline
COURSE DESCRIPTION
The Symantec Endpoint Protection 14.2: Plan and Implement course is designed for the network, IT security, and systems administration professional in a Security Operations position tasked with planning and implementing a Symantec Endpoint Protection environment.
Duration
Two-day
Course Objectives
By the completion of this course, you will be able to:
• Architect a Symantec Endpoint Protection Environment
• Prepare and deliver a successful Symantec Endpoint Installation
• Build a Disaster plan to ensure successful SEPM backups and restores
• Manage failover and replication
• Deploy endpoint clients
Who Should Attend
This course is for IT and system administration professionals who are charged with planning, installing, and upgrading a Symantec Endpoint Protection environment.
Prerequisites
You must have a working knowledge of advanced computer terminology, including TCP/IP networking terms and Internet terms, and an administrator-level knowledge of Microsoft Windows operating systems.
COURSE OUTLINE
Module 1: Architecting and Sizing the SEP Implementation
• Architecture components
• Architecture constraints
• Component placement
• Determining client-to-SEPM ratios
• Content delivery
• SEPM and database sizing best practices
Module 2: Installing the Symantec Endpoint Protection Manager
• Identifying system requirements
• Preparing servers for installation
• Installing and configuring the Symantec Endpoint Protection Manager
• Validating the installation
Module 3: Benefiting from a SEPM Disaster Recovery Plan
• SEPM Disaster Recovery Recommendations
• Running on-demand and scheduled backups
• Backing up and storing system files
• Restoring a failed SEPM
Module 4: Managing Replication and Failover
• About sites and replication
• How replication works
• Replication scenarios
• Configuring and scheduling replication
• Load balancing and failover
Module 5: Implementing the Best Method to Deploy Windows Clients
• Describing client installation packages
• Planning the client deployment for standard and dark clients
• Configuring the client installation package
• Deploying client packages
• Configuring an unmanaged detector
Module 6: Implementing the Best Method to Deploy Linux Clients
• Identifying Linux prerequisites
• Deploying Linux clients
Module 7: Implementing the Best Method to Deploy Mac Clients
• Identifying Mac prerequisites
• Deploying Mac clients
Module 8: Migrating to Symantec Endpoint Protection 14
• Describing end of life (EOL) software and components
• Migrating the Symantec Endpoint Protection Manager
• Migrating Symantec Endpoint Protection clients
View outline in Word
N34816