Computer Endpoint Security Management Fundamentals
What you'll learn
- Learn how to understand Cybersecurity for Endpoints and Concepts
- Understand how to implement a Endpoint Management system
- Identify the Endpoint Cybersecurity strategy and cloud or on premises components
- Learn the architecture for the Symantec Endpoint Management Solution
- Learn how to protect your information and DLP
Requirements
- Any User
Description
Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of endpoint devices such as laptops, tablets, mobile phones, Internet-of-things devices, and other wireless devices to corporate networks creates attack paths for security threats. Endpoint security attempts to ensure that such devices follow a definite level of compliance to standards.
"If your computer is lost, your files are accessed easily with computer software that is free on the internet. But with disk encryption
your computer becomes ultra secure no one can access without a secure password even if is stolen or lost the encryption makes your
life more secure."
The endpoint security space has evolved over the last several years away from limited antivirus software and into a more advanced, comprehensive defense. This includes next-generation antivirus, threat detection, investigation, and response, device management, data leak protection (DLP), and other considerations to face evolving threats.
Learn the Fundamentals of Endpoint management by Symantec Broadcom by Securely manage desktops, laptops, and servers
On this training we will discuss how Symantec endpoint management solutions help manage, patch, and remediate application and OS configurations on desktops, laptops and servers throughout their lifecycle to strengthen endpoint security and maximize user productivity. Our solutions are extremely versatile with support for all major operating systems, real-time and persistent management of endpoints inside and outside the perimeter, and extensive deployment, asset management, and patch management capabilities.
Securely manage Windows, Mac, Linux, Unix and virtual systems like VMware, Hyper V, cloud systems like AWS, GCP.
Patch Microsoft and commonly used third-party applications
Make informed decisions using real-time and historical data
Automate processes to reduce costs and complexity
Who this course is for:
- Any User
Instructor
J.S Garcia “Juan Sebastian Garcia” is an Engineer and an Author. His Family moved to Brooklyn, NY, in 1992 where he grew up. He’s the youngest of four children. After he graduated as a Computer Forensics Investigator from the Electronic Commerce Council University in NM, he is also certified as an Avaya Certified Expert, CEH, CHFI, CCNA, ENA, Oracle DBA.
Over 20 Years of experience in IT Infrastructure Teams and management, Specialized in Telecomunications, Contact Centers, Cloud, Virtualization, Security. Motivated, adaptable, customer focused, results driven, and hard working Information Technology Professional With proven ability to work under any pressure and deliver desired outcome of high quality requirements and customer deadlines. Worked at top companies, including Harry and David, Amerigroup Corp, IDT Corp, RFA Corp, Cable and Wireless Business and many more. Strong communication and interpersonal skills demonstrated in working with colleagues and customers across the global. Implemented more that 120.000 users worldwide and 32.000 Call Center Agents in 20+ Countries from design to implementation and customer satisfaction.