In this Endpoint Security training course, you will learn how to control the admission, defence status, and configuration of all endpoints in your organization, and gain the skills to better control access to intranet resources. You will learn to implement Network Access Control to prevent malware contamination from untrusted devices, optimize Data Loss Prevention (DLP) through host-based IDS/IPS and endpoint encryption, and prevent malware and botnet propagation utilizing anti-malware and honeypot technology.
TRAINING AT YOUR SITE
Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.
Guaranteed to RunWhen you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.
Internal defenses vs. perimeter defenses
Establishing a secure internal architecture
Developing a VLAN strategy
Segregating and isolating traffic
Installing a NAC server
Securing access with 802.1X
Implementing policy–based access control
Managing patches and anti–malware updates
Monitoring and enforcing endpoint security
Establishing an encryption policy
Developing a data loss strategy
Monitoring and detecting data leakage
Managing enterprise anti–malware configuration
Deploying host–based IDS/IPS
Responding to and mitigating attacks
Demonstrating organizational compliance
The purpose of endpoint security is to secure the various endpoints on a network and protect them.
NAC is a security approach that enforces policy on devices that access networks to increase network visibility and reduce risk.
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.
Social Engineering Training: Deceptions and DefencesDefending the Perimeter from Cyber Attacks TrainingPenetration Testing Training: Tools and TechniquesVulnerability Assessment Training: Protecting Your OrganizationCISSP Training and Certification Exam Preparation
Your Training Comes with a 100% Satisfaction Guarantee!*
*Partner-delivered courses may have different terms that apply. Ask for details.