Data Center Security- Server Advanced 6.x Planning, Implementation, and Administration R1

Course Description

The Symantec Data Center Security Server Advanced 6. x  Implementation, Planning, & Administration R1 course is an intro to implementing and managing a Data Center Security- Server Advanced deployment. 

The architecture and individual components of the SDCS-SA solution are detailed & explained. Agent installation & configuration are taught along with deployment & management of SDCS- SA agents & policies across the enterprise. The course also includes SDCS- SA Policy creation/modification in detail.

 

Prerequisites

  • Professionals should have working knowledge of TCP/IP protocols & communications concepts.
  • Professionals must have experience with the Windows & UNIX operating systems in general.
  • A fundamental understanding of key security disciplines (firewalls, intrusion detection/prevention,vulnerability assessment, antivirus protection,  policy management, and so on) is required.

Target Audience

Hands-On

This course includes practical hands-on exercises that allow you to test your new skills & begin to utilize those skills in a working environment.

 

Learning Objectives

  • Explain the major components of Data Center Security- Server Advanced and how they communicate.
  • Install the management  consoles, server, and agent.
  • Define, manage, & create assets, policies, events, & configurations.
  • Understand policy creation & editing in depth.

Content Outline

  •   Security Risks
  •   Security Risk Management
  •   Managing & Protecting Systems
  •   Corporate Security Policies & Security Assessments
  •   Host-Based Computer Security problems

 

  •   SDCS- Server Advanced Overview
  •   SDCS- Server Advanced Component Overview
  •   How Does SDCS- SA Work?
  •   Policy Types and Platforms
  •   Management Console Overview
  •   Agent User Interface Overview

 

  •   Planning the Installation
  •   Deployment Planning
  •   Server Installation
  •   Installing the Server Management Console
  •   Installing a Windows Agent
  •   Installing a UNIX Agent

 

  •   Assets Defined
  •   Agent Architecture
  •   Viewing Agents and Assets
  •   Managing Agents
  •   Managing Agents on Assets by Command Line
  •   Prevention Policy Overview
  •   Detection Policy Overview
  •   Policy Workspace
  •   Implementing Policies with SDCS- SA
  •   SDCS-SA Use Cases

 

  •   Windows Prevention Policy Structure
  •   Editing Windows Prevention Policy
  •   Advanced Policy Settings- Global Policy Options
  •   Advanced Policy Settings- Sandboxes
  •   Resource Lists
  •   Custom Sandboxes
  •   UNIX and Legacy Prevention Policies
  •   Global Policy Options
  •   Daemon and Service Options
  •   Interactive Program Options
  •   Resource Lists
  •   Sandbox Options
  •   Custom Sandboxes
  •   Trusted Users, Groups, and Applications
  •   Profile Lists
  •   Predefined Prevention Policies

 

  •   Profile Applications
  •   Customize Predefined Prevention Policies
  •   Custom Sandbox
  •   Prepare for IPS Policy Deployment
  •   Create New Policies
  •   Detection Policy Details
  •   Predefined Detection Policies

 

  •   Defining Events
  •   Viewing Events
  •   Event Handling and Bulk Logging
  •   Creating Alerts

 

  •   Configurations Defined
  •   Creating and Editing Configurations
  •   Bulk Logging Details
  •   Analyzing Event Log Files and Bulk Loading
  •   Troubleshooting Agents Using Logs and Configuration Files
  •   Using Agent Diagnostic Policies
  •   Using Agent Command-line Interface

 

  •   Database Management
  •   Managing Users and Roles
  •   Server Management
  •   Server Logs

 

Certification

250-426 Administration of Symantec Data-Center Security Server Advanced 6.7

FAQs

Endpoint security is securing endpoints or entry points of end-user devices such as laptops, desktops, and mobile devices from exploitation by malicious actors and campaigns.

 

Endpoint security examines files, processes, and systems for suspicious or malicious activity. Organizations can install an endpoint protection platform — EPP — on devices to prevent malicious actors from using malware or other tools to infiltrate their systems.

 

Endpoint security refers to cybersecurity services for network endpoints. These services may include antivirus, email filtering, web filtering, and firewall services.

 

To attend the training session, you should have operational Desktops or Laptops with the required specifications and a good internet connection to access the labs. 

We would always recommend you attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if you have to skip the class due to some contingency, Radiant Tech learning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

 

Radiant Tech learning has a data center containing a Virtual Training environment for participant's hand-on-practice. Participants can easily access these labs over Cloud with the help of a remote desktop connection. Radiant virtual labs allow you to learn from anywhere in the world and any time zone. 

The learners will be enthralled as we engage them in real-world and Oriented industry projects during the training program. These projects will improve your skills and knowledge and give you a better experience. These real-time projects will help you a lot in your future tasks and assignments.

 

You can request a return if you do not desire to enroll in the course.

 

Yes you can.

 

We use the ideal standards in Internet security. Any data retained is not communicated with third parties.

 

It is recommended but not mandatory. Being acquainted with the primary course material will enable students and the trainer to move at the desired pace during classes. You can access courseware for most vendors.

 

You can buy online from the page by clicking "Buy Now." You can view alternate payment methods on the payment options page.

 

Yes, students can pay from the course page.

 

The course completion certification will be awarded to all the professionals who have completed the training program & the project assignment given by your instructor. You can use the certificate in future job interviews to help you to achieve your dream job.

 

Radiant believes in a practical & creative approach to training & development, distinguishing it from other training & developmental platforms. Moreover, training courses are undertaken by experts with a range of experience in their domain.

 

Radiant team of experts will be available at email support@radianttechlearning.com to answer your technical queries even after the training program.

Yes, Radiant will provide you with the most updated high, value-relevant real-time projects & case studies in each training program.

 

Technical issues are unpredictable & might occur with us as well. Participants must ensure access to the required configuration with good internet speed.

 

Radiant Techlearning offers training programs on weekdays, weekends & combination of weekdays & weekends. We provide you with complete liberty to choose the schedule that suits your needs.

 

Radiant has highly intensive selection criteria for Technology Trainers & Consultants who deliver training programs. Our trainers & consultants undergo rigorous technical and behavioral interview and assessment processes before they are boarded in the company.

Our Technology experts/trainers & consultants carry deep-dive knowledge in the technical subject & are certified by the OEM.

Our training programs are practically oriented with 70% – 80% hands-on training technology tools. Our training program focuses on one-on-one interaction with each participant, the latest content in the curriculum, real-time projects, and case studies during the training program.

Our faculty will provide you with the knowledge of each course from the fundamental level easily, and you are free to ask your doubts any time your respective faculty.

Our trainers have the patience and ability to simplify difficult concepts with depth and breadth of knowledge.

We provide a support session to ensure quality learning even after the training program.

 

Send a Message.


  • Enroll
    • Learning Format: ILT
    • Duration: 80 Hours
    • Training Level : Beginner
    • Jan 29th : 8:00 - 10:00 AM (Weekend Batch)
    • Price : INR 25000
    • Learning Format: VILT
    • Duration: 50 Hours
    • Training Level : Beginner
    • Validity Period : 3 Months
    • Price : INR 6000
    • Learning Format: Blended Learning (Highly Interactive Self-Paced Courses +Practice Lab+VILT+Career Assistance)
    • Duration: 160 Hours 50 Hours Self-paced courses+80 Hours of Boot Camp+20 Hours of Interview Assisstance
    • Training Level : Beginner
    • Validity Period : 6 Months
    • Jan 29th : 8:00 - 10:00 AM (Weekend Batch)
    • Price : INR 6000

    This is id #d