Information Security Architects developed training manual for endpoint security training with reference to kaspersky lab solution. This file can be adopted to fit other endpoint security solution brands.
Managing anti-virus protection of a network isdifferent from using anti-virus on a personalcomputer.The scale changes approaches to setting upprotection policies, running scan tasks anddealing with viruses.Endpoint Security is the new implementationpoint for systems security which is the thirdslice of the security framework.
LESSSON 1.1Organizational IssuesLets plan the deployment of an endpoint securitysystem,where do we start?what are the usual problems ?how do we solve them?
LESSSON 1.2Installation of Kaspersky SecurityCenterHow to install the Kaspersky Security CenterWhat are the system requirements?Decision times and what informs such decisions?InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
LESSSON 1.3Installation on ComputersHow we can remotely deploy applications acrosssubnetsDifferent strokes for different folksUsefulness and limitations of various install approachesInteractiveDemo: https://empartner.kaspersky.com/kl_102_10
LESSSON 1.4Management of ComputerStructureCreating of subgroups of managed computersPlacing computers under group containersThe need for multiple groups of managed computersImporting from the Active Directory ContainerInteractiveDemo: https://empartner.kaspersky.com/kl_102_10
LESSSON 2.1Basics of Kaspersky EndpointSecurityUnderstanding the component structure of KESCommon protection parameters for all componentsConcepts of policies, task and their inheritanceKaspersky Security Network: cloud approach protection
LESSSON 2.2File System ProtectionThe technology employed to ensure file systemprotection.InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
LESSSON 2.3Network ProtectionGetting an insight into network protection, interceptiontechnologies and their related components.InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
LESSSON 2.4Proactive DefenseHow the system prevents or minimizes theconsequences of new malware[non-Added signatures]infection on computers.InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
LESSSON 2.5Threat DiagnosticsTools that help collate information about infectedobjects, spot week points and adjust settings for theclient computers.InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
LESSSON 2.6Protection Status DiagnosticsMonitoring protection in general with reports andstatistics associated with them.InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
TRAINING MODULE WAS PREPARE AND PRESENTED BYDesmond IsraelInformation Security Architects Limitedwww.isa.com.gh | email@example.com |Desmond.firstname.lastname@example.org | skype: desmond.israel0204333163 | 0264284133