Corporate Endpoint Security Training [Kaspersky]

914 views

Published on

Information Security Architects developed training manual for endpoint security training with reference to kaspersky lab solution. This file can be adopted to fit other endpoint security solution brands.

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
914
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Corporate Endpoint Security Training [Kaspersky]

  1. 1. ENDPOINT SECURITYseries
  2. 2. KL 102.98.EndpointSecurityfor Windows
  3. 3. INTRODUCTION
  4. 4. Managing anti-virus protection of a network isdifferent from using anti-virus on a personalcomputer.The scale changes approaches to setting upprotection policies, running scan tasks anddealing with viruses.Endpoint Security is the new implementationpoint for systems security which is the thirdslice of the security framework.
  5. 5. Perimeter Security includesFirewallsTMGRoutersetcInformationSecurity includesReadExecuteWrite etcSystems Security includesDevicesApplicationsWeb Access etc
  6. 6. DEPLOYMENTL1
  7. 7. LESSSON 1.1Organizational IssuesLets plan the deployment of an endpoint securitysystem,where do we start?what are the usual problems ?how do we solve them?
  8. 8. LESSSON 1.2Installation of Kaspersky SecurityCenterHow to install the Kaspersky Security CenterWhat are the system requirements?Decision times and what informs such decisions?InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
  9. 9. LESSSON 1.3Installation on ComputersHow we can remotely deploy applications acrosssubnetsDifferent strokes for different folksUsefulness and limitations of various install approachesInteractiveDemo: https://empartner.kaspersky.com/kl_102_10
  10. 10. LESSSON 1.4Management of ComputerStructureCreating of subgroups of managed computersPlacing computers under group containersThe need for multiple groups of managed computersImporting from the Active Directory ContainerInteractiveDemo: https://empartner.kaspersky.com/kl_102_10
  11. 11. PROTECTION MGTL2
  12. 12. LESSSON 2.1Basics of Kaspersky EndpointSecurityUnderstanding the component structure of KESCommon protection parameters for all componentsConcepts of policies, task and their inheritanceKaspersky Security Network: cloud approach protection
  13. 13. LESSSON 2.2File System ProtectionThe technology employed to ensure file systemprotection.InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
  14. 14. LESSSON 2.3Network ProtectionGetting an insight into network protection, interceptiontechnologies and their related components.InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
  15. 15. LESSSON 2.4Proactive DefenseHow the system prevents or minimizes theconsequences of new malware[non-Added signatures]infection on computers.InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
  16. 16. LESSSON 2.5Threat DiagnosticsTools that help collate information about infectedobjects, spot week points and adjust settings for theclient computers.InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
  17. 17. LESSSON 2.6Protection Status DiagnosticsMonitoring protection in general with reports andstatistics associated with them.InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
  18. 18. TRAINING MODULE WAS PREPARE AND PRESENTED BYDesmond IsraelInformation Security Architects Limitedwww.isa.com.gh | desmond@isa.com.gh |Desmond.israel@gmail.com | skype: desmond.israel0204333163 | 0264284133

×