![]() ![]() Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection. Enforce adaptive security posture Who Should Attend.Control endpoint integrity and compliance.Secure endpoints against network and file-based threats.Delivery Methodīy the completion of this course, you will be able to: This class brings context and examples of attacks and tools used by cybercriminals. The Symantec Endpoint Protection 14.2: Configure and Protect course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection. Symantec Endpoint Protection 14.2: Configure and Protect Course Outline COURSE DESCRIPTION ![]() Microsoft Technical Certification (Role-based). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |