KL002.12.1: Kaspersky Endpoint Security and Management - course RUB 39,990. from Specialist, training 24 ac. h., Date: December 10, 2023.
Miscellaneous / / December 06, 2023
Our course is an excellent opportunity to prepare for the design, implementation and maintenance of security systems networks built on Kaspersky Endpoint Security and centrally managed through Kaspersky Security Center.
Under the guidance of an experienced expert teacher, you will learn to ensure timely information security and respond to various information security threats.
As much as 80% of practice for the course is what we promise you.
The course prepares you for the design, implementation and maintenance of Windows network security systems built on Kaspersky Endpoint Security and centrally managed through Kaspersky Security Center. He talks about the products needed to protect a network of up to about 1,000 nodes concentrated in one location. By nodes, the course understands servers and workstations running Windows.
Theoretical material and laboratory work provide knowledge and skills that will enable the student to:
- describe the capabilities of Kaspersky Endroint Security for Windows and Kaspersky Security Center
- design and implement an optimal solution for protecting Windows networks, based on Kaspersky Endroint Security and managed through Kaspersky Security Senter
- carry out maintenance of the implemented system at all stages of operation.
At the end of the training, you will receive a certificate from a world-famous vendor, which will open up new career development opportunities for you.
You will learn:
- Describe and understand the capabilities of Kaspersky Endpoint Security, Kaspersky Security Center
- Design and implement optimal information system protection
- Maintain the implemented security system
- Manage the administration server from the new Web console
- Install Kaspersky Endpoint Security and Kaspersky Security Center for Business
- Ensure correct and effective protection of System Files
- Configure protection against network threats
- Configure protection against advanced threats and ransomware
- Monitor network connections
- Protect your computer outside the network
- Configure application launch control, device control and web control components
- Perform a set of actions to support protection: Set up a dashboard Set up maintenance tools Collect trace logs
- Set up a dashboard
- Set up maintenance tools
- Collect trace logs
5
coursesPractical teacher of courses on information security and Kapsersky Lab products with more than 14 years of experience in networks (of which more than 8 years in the field of information security). Certified Vendor Product Specialist Dr. Web and Kaspersky Lab, also has extensive experience working with products from vendors Checkpoint, Cisco, ViPNet.
Graduate of REU named after. G.V. Plekhanov (Applied computer science in economics). He is the author of 5 articles on information security in specialized journals, more than 50 projects on the implementation of information security tools and about 10 projects on the design and architecture of complexes of information security tools. Worked for various system integrators in the information security field as an engineer and architect. Participated in projects in a variety of companies, large state companies (e.g. Rosatom, SUEK), banks (SDM) and private structures. Currently he is an employee of Kaspersky Lab in the Technical Training Department and participates in the development of courses on LC products.
Anton Olegovich has good oratorical skills and knows how to captivate people with the topics covered in class. Students always feel comfortable in his classes; they especially note his ability to combine humor and a working atmosphere.
Module 1. Implementation (6 ac. h.)
Basics of Kaspersky Endpoint Security for Business
What is this course about?
What to install and in what order
How to organize the process
Administration server requirements
Installing the administration server
Installing Kaspersky Security Center Web Console
First Time Setup Wizard
Requirements for client computers
How to change the composition of KES components
How to create a new installation package
Kaspersky Security for Windows Server
How to create an installation package for Kaspersky Security for Windows Server
Installation Methods
How to remotely install Network Agent and Kaspersky Endpoint Security
How to make local installation easier
How to remotely install Network Agent via Active Directory
How to remove incompatible programs
How to understand that the implementation has ended
How the administration server searches for computers
How to create or import groups
How to automatically add computers to groups
Module 2. Security management (6 ac. h.)
How attackers attack computers
How Kaspersky Endpoint Security resists attacks
How Kaspersky Endpoint Security protects files
What and how to configure in File Threat Protection
What to do if File Threat Protection slows down your computer
How and why to check files on a schedule
What to do with false positives
File protection: summary
How network protection works
Protection against email threats
Web Threat Protection
How not to intercept all program traffic
Securing network connections: summary
How Kaspersky Endpoint Security protects against new threats
What detection technologies are used in Kaspersky Endpoint Security
What does Advanced Protection do?
How to exclude a program from monitoring
Protecting Against New and Advanced Threats: Summary
How Firewall protects against threats
How a firewall works in Kaspersky Endpoint Security
What firewall does with default settings
Why do you need protection against online threats?
Which local networks to trust
How to create a policy for computers outside the office
What settings to set for computers outside the office
Autonomous policies: summary
What it does and why self-defense is needed
How to protect Kaspersky Endpoint Security from the user
What other protection settings are there?
Module 3. Control (6 ac. h.)
Purpose of control components
Licenses and installation types
Installing Control Components
How Application Control Works
How to set program categories
How to create control rules
How will it work
Default Deny Mode
What can be blocked and how to do it
How to set trusted devices
How to customize the user experience
Device Control Monitoring
Blocking criteria
Configuring exceptions and trusted servers
Diagnostics and testing
Customizing the user experience
Web Control operation statistics
Web Control operation report
How to set up Adaptive Anomaly Control
Customizing the user experience
Performance statistics of Adaptive Anomaly Control
Reports on the operation of Adaptive Anomaly Control
Module 4. Service (6 ac. h.)
How to create a quick dashboard
How to receive reports in your mailbox
How to receive notifications in your inbox
What to do with malware
What to do if Kaspersky Endpoint Security is not working
What to do if the databases are out of date
How to check your computer's connection to the Server
How to contact support
How to install software updates
How to update your license
How to organize a backup
Accompaniment: resume