Cisco træning

Insoft Services er en af de få uddannelsesudbydere i EMEAR, der tilbyder hele spektret af Cisco-certificering og specialiseret teknologiuddannelse.

Lær hvordan

Cisco-certificeringer

Oplev en blandet læringsmetode, der kombinerer det bedste fra instruktørstyret træning og e-læring i eget tempo for at hjælpe dig med at forberede dig til din certificeringseksamen.

Lær hvordan

Cisco Learning Credits

Cisco Learning Credits (CLCs) er forudbetalte træningskuponer, der indløses direkte med Cisco, og som gør det nemmere at planlægge din succes, når du køber Cisco-produkter og -tjenester.

Lær hvordan

Cisco Efteruddannelse

Cisco Continuing Education Program tilbyder alle aktive certificeringsindehavere fleksible muligheder for at gencertificere ved at gennemføre en række kvalificerede træningselementer.

Lær hvordan

Cisco Digital Learning

Certificerede medarbejdere er VÆRDSATTE aktiver. Udforsk Ciscos officielle digitale læringsbibliotek for at uddanne dig selv gennem optagede sessioner.

Lær hvordan

Cisco Business Enablement

Cisco Business Enablement Partner Program fokuserer på at skærpe Cisco Channel Partners og kunders forretningsmæssige færdigheder.

Lær hvordan

Cisco kursuskatalog

Lær hvordan

Fortinet-certificeringer

Fortinet Network Security Expert (NSE) -programmet er et otte-niveau uddannelses- og certificeringsprogram for at undervise ingeniører i deres netværkssikkerhed for Fortinet FW-færdigheder og erfaring.

Lær hvordan

Fortinet træning

Insoft er anerkendt som Autoriseret Fortinet Training Center på udvalgte steder på tværs af EMEA.

Tekniske kurser

Fortinet kursuskatalog

Udforsk hele Fortinet-træningskataloget. Programmet omfatter en bred vifte af selvstændige og instruktørledede kurser.

Lær hvordan

ATC-status

Tjek vores ATC-status på tværs af udvalgte lande i Europa.

Lær hvordan

Fortinet Professionelle Services

Globalt anerkendte team af certificerede eksperter hjælper dig med at gøre en mere jævn overgang med vores foruddefinerede konsulent-, installations- og migreringspakker til en lang række Fortinet-produkter.

Lær hvordan

Microsoft træning

Insoft Services tilbyder Microsoft-undervisning i EMEAR. Vi tilbyder Microsoft tekniske kurser og certificeringskurser, der ledes af instruktører i verdensklasse.

Tekniske kurser

Extreme træning

Find all the Extreme Networks online and instructor led class room based calendar here.

Tekniske kurser

Tekniske certificeringer

Vi leverer omfattende læseplan for tekniske kompetencefærdigheder på certificeringspræstationen.

Lær hvordan

Extreme kursuskatalog

Lær hvordan

ATP-akkreditering

Som autoriseret uddannelsespartner (ATP) sikrer Insoft Services, at du får de højeste uddannelsesstandarder, der findes.

Lær hvordan

Løsninger og tjenester

Vi leverer innovativ og avanceret support til design, implementering og optimering af IT-løsninger. Vores kundebase omfatter nogle af de største Telcos globalt.

Lær hvordan

Globalt anerkendte team af certificerede eksperter hjælper dig med at gøre en mere jævn overgang med vores foruddefinerede konsulent-, installations- og migreringspakker til en lang række Fortinet-produkter.

Om os

Insoft tilbyder autoriseret uddannelses- og konsulentbistand til udvalgte IP-leverandører. Få mere at vide om, hvordan vi revolutionerer branchen.

Lær hvordan
  • +45 32 70 99 90
  • Symantec Data Loss Prevention 15.5 Administration

    Duration
    5 Dage
    Delivery
    (Online Og På stedet)
    Price
    Pris på forespørgsel

    The Symantec Data Loss Prevention 15.5 Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs include exercises for configuring the Enforce server, detection servers, and DLP agents; creating policies; detecting and responding to incidents; performing incident reporting; and administering users and roles. You are introduced to the following Symantec Data Loss Prevention products: Network Monitor, Network Prevent, Network Discover, Network Protect, Cloud Storage Discover, Cloud Service for Email, Endpoint Prevent, and Endpoint Discover

     

    Note: This course is delivered on a Microsoft Windows platform.

     

    Associated certification:

    • Exam 250-553: Symantec Data Loss Prevention 15.5 Technical Specialist

    By the end of this course, you will be able to configure and use Symantec Data Loss Prevention 15.5.

    Module 1: Data Loss Prevention Landscape

    • Data Loss Prevention landscape
    • Data loss risk management
    • Data Loss Prevention real-world use cases

     

    Module 2: Overview of Symantec Data Loss Prevention

    • Symantec Data Loss Prevention Suite
    • Symantec Data Loss Prevention architecture

     

    Module 3: Identifying and Describing Confidential Data

    • Identifying confidential data
    • Configuring Symantec Data Loss Prevention torecognize confidential data
    • Described Content Matching (DCM)
    • Exact matching (EDM and EMDI)
    • Indexed Document Matching (IDM)
    • Vector Machine Learning (VML)
    • Sensitive Image Recognition
    • Custom file type detection

     

    Hands-On Labs: Tour the Enforce console, create policy groups, configure policies for PersonallyIdentifiable Information (PII) detection, configure a policy for PCI compliance, configure a policy to protect confidential documents, configure a policy to protect source code, configure a policy for Form Recognition, use a template to add a DLP policy,export policies for use at a Disaster Recovery (DR) site, configure Optical Character Recognition (OCR)

     

    Module 4: Locating Confidential Data Stored on Premises and in the Cloud

    • Determining where to search for confidential data
    • Locating confidential data on corporate repositories
    • Locating confidential data in the Cloud
    • Locating confidential data on endpoint computers

     

    Hands-On Labs: Run a Content Enumeration Scan, scan a Windows target, scan endpoint computers for confidential data, scan a server for confidential data using Exact Match Data Identifiers (EMDI), configure a global policy for PII compliance

     

    Module 5: Understanding How Confidential Data is Being Used

    • Monitoring confidential data moving across thenetwork
    • Monitoring confidential data being used on endpointcomputers

     

    Hands-On Labs: Configure Network Prevent for Email to monitor SMTP messages, use Network Prevent for Email to monitor SMTP messages, monitor Endpoint activity

     

    Module 6: Educating Users to Adopt Data Protection Practices

    • Implementing corporate training on data protectionpolicies
    • Providing notifications of user policy violations

     

    Hands-On Labs: Configure the Active Directory lookup plugin, configure email notifications,configure onscreen notifications

     

    Module 7: Preventing Unauthorized Exposure of Confidential Data

    • Using response rules to prevent the exposure of confidential data
    • Protecting confidential data in motion
    • Protecting confidential data in use
    • Protecting confidential data at rest

     

    Hands-On Labs: Configure SMTP blocking, test Optical Character Recognition (OCR) and the “HIPAA and HITECH (including PHI)” policy, configure endpoint blocking, configure endpoint User Cancel, scan and quarantine files on a server file share target, scan and quarantine files on an endpoint target

     

    Module 8: Remediating Data Loss Incidents and Tracking Risk Reduction

    • Reviewing risk management frameworks
    • Using incident reporting options to identify andassess risk
    • Creating tools that support the organization’s risk reduction process
    • Communicating risk to stakeholders
    • Understanding advanced reporting options and analytics

     

    Hands-On Labs: Configure roles and users, use reports to track risk exposure and reduction, define incident statuses and status groups, configure and use Smart Responses, schedule and send reports

     

    Module 9: Enhancing Data Loss Prevention with Integrations

    • Symantec DLP integration mechanisms
    • Symantec Information Centric Security
    • Additional integrations with Symantec Enterprise solutions

     

    Hands-On Labs: Create the views schema and user, run the incident data view setup script, verify incident data views creation, use incident data views, create an ICT tag policy for file discovery, scan for file tags using Network Discover

     

    Module 10: Course Review

    • Review of Symantec Data Loss products and architecture
    • Review of the stages in a Data Loss Prevention implementation
    • Working knowledge of Windows server-classoperating systems and commands
    • Networking and Network Security concepts
    • Technical users responsible for creating and maintaining policies and incident responses

    The Symantec Data Loss Prevention 15.5 Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs include exercises for configuring the Enforce server, detection servers, and DLP agents; creating policies; detecting and responding to incidents; performing incident reporting; and administering users and roles. You are introduced to the following Symantec Data Loss Prevention products: Network Monitor, Network Prevent, Network Discover, Network Protect, Cloud Storage Discover, Cloud Service for Email, Endpoint Prevent, and Endpoint Discover

     

    Note: This course is delivered on a Microsoft Windows platform.

     

    Associated certification:

    • Exam 250-553: Symantec Data Loss Prevention 15.5 Technical Specialist

    By the end of this course, you will be able to configure and use Symantec Data Loss Prevention 15.5.

    Module 1: Data Loss Prevention Landscape

    • Data Loss Prevention landscape
    • Data loss risk management
    • Data Loss Prevention real-world use cases

     

    Module 2: Overview of Symantec Data Loss Prevention

    • Symantec Data Loss Prevention Suite
    • Symantec Data Loss Prevention architecture

     

    Module 3: Identifying and Describing Confidential Data

    • Identifying confidential data
    • Configuring Symantec Data Loss Prevention torecognize confidential data
    • Described Content Matching (DCM)
    • Exact matching (EDM and EMDI)
    • Indexed Document Matching (IDM)
    • Vector Machine Learning (VML)
    • Sensitive Image Recognition
    • Custom file type detection

     

    Hands-On Labs: Tour the Enforce console, create policy groups, configure policies for PersonallyIdentifiable Information (PII) detection, configure a policy for PCI compliance, configure a policy to protect confidential documents, configure a policy to protect source code, configure a policy for Form Recognition, use a template to add a DLP policy,export policies for use at a Disaster Recovery (DR) site, configure Optical Character Recognition (OCR)

     

    Module 4: Locating Confidential Data Stored on Premises and in the Cloud

    • Determining where to search for confidential data
    • Locating confidential data on corporate repositories
    • Locating confidential data in the Cloud
    • Locating confidential data on endpoint computers

     

    Hands-On Labs: Run a Content Enumeration Scan, scan a Windows target, scan endpoint computers for confidential data, scan a server for confidential data using Exact Match Data Identifiers (EMDI), configure a global policy for PII compliance

     

    Module 5: Understanding How Confidential Data is Being Used

    • Monitoring confidential data moving across thenetwork
    • Monitoring confidential data being used on endpointcomputers

     

    Hands-On Labs: Configure Network Prevent for Email to monitor SMTP messages, use Network Prevent for Email to monitor SMTP messages, monitor Endpoint activity

     

    Module 6: Educating Users to Adopt Data Protection Practices

    • Implementing corporate training on data protectionpolicies
    • Providing notifications of user policy violations

     

    Hands-On Labs: Configure the Active Directory lookup plugin, configure email notifications,configure onscreen notifications

     

    Module 7: Preventing Unauthorized Exposure of Confidential Data

    • Using response rules to prevent the exposure of confidential data
    • Protecting confidential data in motion
    • Protecting confidential data in use
    • Protecting confidential data at rest

     

    Hands-On Labs: Configure SMTP blocking, test Optical Character Recognition (OCR) and the “HIPAA and HITECH (including PHI)” policy, configure endpoint blocking, configure endpoint User Cancel, scan and quarantine files on a server file share target, scan and quarantine files on an endpoint target

     

    Module 8: Remediating Data Loss Incidents and Tracking Risk Reduction

    • Reviewing risk management frameworks
    • Using incident reporting options to identify andassess risk
    • Creating tools that support the organization’s risk reduction process
    • Communicating risk to stakeholders
    • Understanding advanced reporting options and analytics

     

    Hands-On Labs: Configure roles and users, use reports to track risk exposure and reduction, define incident statuses and status groups, configure and use Smart Responses, schedule and send reports

     

    Module 9: Enhancing Data Loss Prevention with Integrations

    • Symantec DLP integration mechanisms
    • Symantec Information Centric Security
    • Additional integrations with Symantec Enterprise solutions

     

    Hands-On Labs: Create the views schema and user, run the incident data view setup script, verify incident data views creation, use incident data views, create an ICT tag policy for file discovery, scan for file tags using Network Discover

     

    Module 10: Course Review

    • Review of Symantec Data Loss products and architecture
    • Review of the stages in a Data Loss Prevention implementation
    • Working knowledge of Windows server-classoperating systems and commands
    • Networking and Network Security concepts
    • Technical users responsible for creating and maintaining policies and incident responses
      Kommende datoer
      Dato på anmodning

    Follow Up Courses

    Filtrer
    • 2 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 3 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 3 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 3 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 2 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 4 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 2 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 3 Dage
      Dato på anmodning
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.