Endpoint Encryption 11.2 Install Configure Deploy

Course Description

The Symantec Endpoint Encryption 11.2 Install, Configure, & Deploy course is developed for the network, IT security, systems administration, & support professionals tasked with maintaining & troubleshooting a Symantec Endpoint Encryption (SEE) environment. This class includes how to install configure, and use Symantec Endpoint Encryption Management Console, drive encryption client, removable media encryption client, web-based Help Desk Recovery console and the CD/DVD burning utility. It also covers integration with Symantec Data Loss Prevention and Symantec Encryption Management Server. It will cover ongoing maintenance & troubleshooting from an administrative perspective, including configuration, reporting, logging,  installation, and product maintenance.

Prerequisites

This course assumes that scholars have a working knowledge of advanced computer terminology, also including TCP/IP networking & Internet terms, administrator-level knowledge of Microsoft Windows operating systems & IIS, as well as knowledge required to configure SQL.

 

Target Audience

Hands-On

This course includes practical hands-on exercises that allow you to test your new skills & begin to use those skills in a working environment

 

Learning Objectives

  • Conduct Symantec Endpoint Encryption server installation.
  • Configure connection to an SQL database.
  • Configure drive & removable media policies.
  • Describe details about drive encryption.
  • Comprehend drive recovery methods; Self Recovery, Help Desk recovery, Win PE Recovery Utility
  • Conduct configuration of the various administrative roles.
  • Combine Symantec Data Loss Prevention.
  • Combine Symantec Encryption Management Server for encrypted drive recovery.
  • Handle client installations and user settings.
  • Troubleshoot server & client issues.

Content Outline

  •  Overview of the product
  •  Describe the core benefits
  •  Identify the architecture
  •  Discuss why encryption is required
  •  Describe the setup process
  • Introducing the SEE Management server
  • List the system requirements
  • Discuss the pre-requisite software
  • Describe the setup process of .NET and IIS
  • Describe the setup process of SQL
  • Review the needed account types

  Installing the Management Server

  • Overview of the post installation configuration
  • Configuring the Web Service
  • Configuring Active Directory Integration
  • Verifying the installation
  • Backup and Recovery
  •   Administration console options
  •   Using the Management console for Administration
  •   Using the web based Help Desk Recovery console
  •   Roles overview
  •   Assigning roles
  •   Editing roles
  •   Enabling policy options
  •   Creating policies
  •   Managing policies
  •   Deploying Native policies
  •   Drive encryption overview
  •   Review smart cards and tokens
  •   Creating the Windows client installation settings
  •   Creating the Mac FileVault client installation settings
  •   Introducing Opal drives
  •   Describe user registration
  •   Configuring Self Recovery
  •   Configuring Autologon
  •   Explain the methods of drive recovery
  •   Removable Media Encryption overview
  •   Creating Removable Media Encryption client
  •   Using the Removable Media Encryption Burner
  •   Integrating with Data Loss Prevention
  •   Overview of Management Agent settings
  •   Configuring Client Administrators
  •   Describe Server based commands
  •   Describe the types of reports
  •   Accessing reports
  •   Creating reports
  •   Customizing the appearance of reports
  •   Managing policies on virtual desktops
  •   Interfacing with Symantec Encryption Management Server
  •   Configuring Server-less mode

FAQs

Information security, often referred to as InfoSec, refers to the processes & tools designed & deployed to protect sensitive business information from disruption, modification, destruction, and inspection.

 

When we discuss data & information, we must consider the CIA triad. The CIA triad refers to an information security model constituted of the three main components- confidentiality, integrity and availability. Each piece represents a fundamental objective of information security.

Protecting the data that the organization collect & use-

The significance of the data motivated the attackers to steal or corrupt the data. This is important for the integrity and the value of the organization's data. Information security allows the protection of both data in motion and data in rest.

 

Broadcom is a leading provider of enterprise security solutions worldwide leveraging the breadth and depth of expertise in both hardware and software security.

To attend the training session, you should have operational Desktops or Laptops with the required specifications, along with a good internet connection to access the labs. 

We would always recommend you attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if, due to some contingency, you have to skip the class, Radiant Tech learning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

Radiant Tech learning has a data center containing the Virtual Training environment for the purpose of participant hand-on-practice. Participants can easily access these labs over Cloud with the assistance of a remote desktop connection. Radiant virtual labs provide you the flexibility to learn from anywhere in the world and in any time zone. 

The learners will be enthralled as we engage them in real-world and Oriented industry projects during the training program. These projects will improve your skills and knowledge, and you will gain a better experience. These real-time projects will help you a lot in your future tasks and assignments.

 

You can request a return if you do not desire to enroll in the course.

Yes you can.

 

We use the ideal standards in Internet security. Any data retained is not communicated with third parties.

 

It is recommended but not mandatory. Being acquainted with the primary course material will enable students and the trainer to move at the desired pace during classes. You can access courseware for most vendors.

 

You can buy online from the page by clicking on "Buy Now". You can view alternate payment methods on the payment options page.

Yes, students can pay from the course page.

The course completion certification will be awarded to all the professionals who have completed the training program & the project assignment given by your instructor. You can use the certificate in your future job interviews which will surely help you to achieve your dream job.

 

Radiant believes in a practical & creative approach to training & development, which distinguishes it from other activity & developmental platforms. Moreover, training courses are undertaken by some experts with a range of experience in their domain.

 

Radiant team of experts will be available at e-mail support@radianttechlearning.com to answer your technical queries even after the training program.

 

Yes, Radiant will provide you with the most updated high, value & relevant real-time projects & case studies in each training program.

 

Technical issues are unpredictable & might occur with us as well. Participants have to ensure they have access to the required configuration with good internet speed.

 

Radiant Techlearning offers training programs on weekdays, weekends & combination of weekdays & weekends. We provide you with complete liberty to choose the schedule that suits your needs.

 

Radiant has highly intensive selection criteria for Technology Trainers & Consultants, who deliver you training programs. Our trainers & consultants undergo rigorous technical and behavioural interview and assessment processes before they are on board in the company.

Our Technology experts/trainers & consultants carry deep-dive knowledge in the technical subject & are certified from the OEM.

Our training programs are practically oriented with 70% – 80% hands on the training technology tool.  Our training program focuses on one-on-one interaction with each participant, latest content in curriculum, real-time projects and case studies during the training program.

Our faculty will provide you with the knowledge of each course from the fundamental level in an easy way and you are free to ask your doubts any time from your respective faculty.

Our trainers have patience and ability to explain complex concepts in a simplistic way with depth and width of knowledge.

To ensure quality learning, we provide a support session even after the training program.

 

Send a Message.


  • Enroll
    • Learning Format: ILT
    • Duration: 80 Hours
    • Training Level : Beginner
    • Jan 29th : 8:00 - 10:00 AM (Weekend Batch)
    • Price : INR 25000
    • Learning Format: VILT
    • Duration: 50 Hours
    • Training Level : Beginner
    • Validity Period : 3 Months
    • Price : INR 6000
    • Learning Format: Blended Learning (Highly Interactive Self-Paced Courses +Practice Lab+VILT+Career Assistance)
    • Duration: 160 Hours 50 Hours Self-paced courses+80 Hours of Boot Camp+20 Hours of Interview Assisstance
    • Training Level : Beginner
    • Validity Period : 6 Months
    • Jan 29th : 8:00 - 10:00 AM (Weekend Batch)
    • Price : INR 6000

    This is id #d