Information Security Architects developed training manual for endpoint security training with reference to kaspersky lab solution. This file can be adopted to fit other endpoint security solution brands.
4. Managing anti-virus protection of a network is
different from using anti-virus on a personal
computer.
The scale changes approaches to setting up
protection policies, running scan tasks and
dealing with viruses.
Endpoint Security is the new implementation
point for systems security which is the third
slice of the security framework.
8. LESSSON 1.1
Organizational Issues
Lets plan the deployment of an endpoint security
system,
where do we start?
what are the usual problems ?
how do we solve them?
9. LESSSON 1.2
Installation of Kaspersky Security
CenterHow to install the Kaspersky Security Center
What are the system requirements?
Decision times and what informs such decisions?
InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
10. LESSSON 1.3
Installation on Computers
How we can remotely deploy applications across
subnets
Different strokes for different folks
Usefulness and limitations of various install approaches
InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
11. LESSSON 1.4
Management of Computer
StructureCreating of subgroups of managed computers
Placing computers under group containers
The need for multiple groups of managed computers
Importing from the Active Directory Container
InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
13. LESSSON 2.1
Basics of Kaspersky Endpoint
SecurityUnderstanding the component structure of KES
Common protection parameters for all components
Concepts of policies, task and their inheritance
Kaspersky Security Network: cloud approach protection
14. LESSSON 2.2
File System Protection
The technology employed to ensure file system
protection.
InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
15. LESSSON 2.3
Network Protection
Getting an insight into network protection, interception
technologies and their related components.
InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
16. LESSSON 2.4
Proactive Defense
How the system prevents or minimizes the
consequences of new malware[non-Added signatures]
infection on computers.
InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
17. LESSSON 2.5
Threat Diagnostics
Tools that help collate information about infected
objects, spot week points and adjust settings for the
client computers.
InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
18. LESSSON 2.6
Protection Status Diagnostics
Monitoring protection in general with reports and
statistics associated with them.
InteractiveDemo: https://empartner.kaspersky.com/kl_102_10
19. TRAINING MODULE WAS PREPARE AND PRESENTED BY
Desmond Israel
Information Security Architects Limited
www.isa.com.gh | desmond@isa.com.gh |
Desmond.israel@gmail.com | skype: desmond.israel
0204333163 | 0264284133