• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

14226 Environment courses

Microsoft SQL Server Development Training

4.8(9)

By Skill Up

Learn basic Database Design, use of Microsoft SQL Management Studio, creating Complex Database Objects & boost up your

Microsoft SQL Server Development Training
Delivered Online On Demand6 hours
£25

Landscape Drawing Course

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career in the technology industry and learn from the

Landscape Drawing Course
Delivered Online On Demand9 hours 29 minutes
£25

Professional Electrical Engineering Course for Electrical Substations

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Professional Electrical Engineering Course for Electrical Substations
Delivered Online On Demand5 hours 5 minutes
£25

iPhone Cinematography

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

iPhone Cinematography
Delivered Online On Demand1 hour 24 minutes
£25

PLC Programming Course: Logixpro Simulator

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

PLC Programming Course: Logixpro Simulator
Delivered Online On Demand6 hours 35 minutes
£25

Mastering MySQL Database Development

4.8(9)

By Skill Up

Embark on a journey to become a MySQL Database Development master! Our course equips you with the skills to design, optimize, and manage databases flawlessly.

Mastering MySQL Database Development
Delivered Online On Demand4 hours 20 minutes
£25

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

Risk Assessing

By Prima Cura Training

This course is designed to enable learners to increase their understanding of risk assessment and risk management in Health and Social Care settings.

Risk Assessing
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Microsoft Excel Complete Training

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Microsoft Excel Complete Training
Delivered Online On Demand13 hours 3 minutes
£13.59

EYFS Teaching Diploma Level 3

4.8(9)

By Skill Up

Elevate your teaching skills with our Level 3 EYFS Diploma. Understand child development, plan effective learning, & foster creativity. Shape the future, today.

EYFS Teaching Diploma Level 3
Delivered Online On Demand14 hours 56 minutes
£13.59