Symantec Data Loss Prevention Administration-Certification
4.0 (96 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,124 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Symantec Data Loss Prevention Administration-Certification to your Wishlist.

Add to Wishlist

Symantec Data Loss Prevention Administration-Certification

Prepare for Symantec Data Loss Prevention Administration Certification
4.0 (96 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,124 students enrolled
Last updated 5/2016
English
Price: Free
Includes:
  • 4.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Describe DLP and Describe Symantec DLP Approach
  • Describe the Symantec DLP products
  • Explain architecture of Symantec DLP System
  • Navigate the main components of the user interface
  • List Report Types and identify System Reports
  • Navigate reports and configure dashboards and user reporting preferences
  • User Report Filters to Create incident List and Summary reports
  • Understand Report Filters, Report Commands, Incident Snapshot, Incident Data Types & IT Analytics
  • Understand Incident Remediation & Workflow; Manage Roles and Users; Custom Attribute Lookup; User Risk Summary
  • Policy Overview, Creating Policy Groups, Using Policy Templates, Building Policies, Policy Development Best Practices
  • Response Rule Overview, Configuring Automated Response Rules, Configuring Smart Response Rules, Response Rule Best Practices
  • Understand Described Content Matching
  • Exact Data Matching (EDM), Advanced EDM, Directory Group Matching ( DGM)
  • Indexed Document matching (IDM)
  • Vector Machine Learning
  • Review of Network Monitor, Protocols, Traffic Filtering, Network Monitor Best Practices
View Curriculum
Requirements
  • Working knowledge of Microsoft Windows server-class operating systems and commands
Description

Course: Symantec Data Loss Prevention Administration - Certification Bootcamp - Fundamentals 

Benefits : By the end of this training course, you will be able to configure and use Symantec Data Loss Prevention and prepare for the Certification Exam.

Delivery: Online

Agenda : The Symantec Data Loss Prevention  Administration course is designed to provide fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The course covers the concepts for configuring Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering.  Additionally, you are introduced to deployment best practices and the following Symantec Data Loss Prevention products: Network Monitor, Mobile Email Monitor, Mobile Prevent, Network Prevent, Network Discover, Network Protect, Endpoint Prevent, and Endpoint Discover. 

Lab Access & Lab Guide : Not Included

Who is the target audience?
  • Data Security Specialists
  • Security Administrators
  • Data Loss Prevention Consultants
  • Security Analysts
  • Security Consultants
  • Risk & Compliance Consultants
Students Who Viewed This Course Also Viewed
Curriculum For This Course
23 Lectures
04:35:57
+
Course Introduction
1 Lecture 02:20
Introduction
02:20
+
Symantec Data Loss Prevention Overview
3 Lectures 51:43

This topics defines Data Loss Prevention in the industry and the Symantec approach to Data Loss Prevention. 

Lesson 1
14:24

This topics defines Data Loss Prevention in the industry and the Symantec approach to Data Loss Prevention. 

Lesson 2
20:00

This topics defines Data Loss Prevention in the industry and the Symantec approach to Data Loss Prevention. 

Lesson 3
17:19
+
Policy Management
4 Lectures 35:01

Welcome to the Policy Management lesson. This lesson covers information related to Policy Management as it pertains to Symantec Data Loss Prevention. 

Lesson 1
06:56

Welcome to the Policy Management lesson. This lesson covers information related to Policy Management as it pertains to Symantec Data Loss Prevention. 

Lesson 2
06:05

Welcome to the Policy Management lesson. This lesson covers information related to Policy Management as it pertains to Symantec Data Loss Prevention. 

Lesson 3
09:59

Welcome to the Policy Management lesson. This lesson covers information related to Policy Management as it pertains to Symantec Data Loss Prevention. 

Lesson 4
12:01
+
Response Rule Management
2 Lectures 25:39
Lesson 1
13:50

Lesson 2
11:49
+
Exact Data Matching and Directory Group Matching
4 Lectures 01:07:17

Welcome to the Exact Data Matching and Directory Group Matching lesson. This lesson describes Exact Data Matching and Directory Group Matching, their use cases, and how to use them in policies. 

Lesson 1
18:21

Welcome to the Exact Data Matching and Directory Group Matching lesson. This lesson describes Exact Data Matching and Directory Group Matching, their use cases, and how to use them in policies. 

Lesson 2
17:53

Welcome to the Exact Data Matching and Directory Group Matching lesson. This lesson describes Exact Data Matching and Directory Group Matching, their use cases, and how to use them in policies. 

Lesson 3
19:31

Welcome to the Exact Data Matching and Directory Group Matching lesson. This lesson describes Exact Data Matching and Directory Group Matching, their use cases, and how to use them in policies. 

Lesson 4
11:32
+
Indexed Document Matching
2 Lectures 20:45

This is the Indexed Document Matching lesson . After completing this lesson, you will be able to describe the indexed document matching detection method and use it in a policy. 

Lesson 1
10:45

After completing this lesson, you will be able to describe the indexed document matching detection method and use it in a policy. 

Lesson 2
10:00
+
Vector Machine Learning
3 Lectures 35:42

This lesson covers Vector Machine Learning, its use cases, and how to use it in policies. After completing this lesson, you will be able to define Vector Machine Learning and describe how it is used. 

Lesson 1
12:10

This lesson covers Vector Machine Learning, its use cases, and how to use it in policies. After completing this lesson, you will be able to define Vector Machine Learning and describe how it is used. 

Lesson 2
09:33

This lesson covers Vector Machine Learning, its use cases, and how to use it in policies. After completing this lesson, you will be able to define Vector Machine Learning and describe how it is used. 

Lesson 3
13:59
+
Network Monitor
4 Lectures 37:30

This lesson reviews the Network Monitor features, introduces filtering, and includes best practices. 

Lesson 1
07:18

This lesson reviews the Network Monitor features, introduces filtering, and includes best practices. 

Lesson 2
09:36

This lesson reviews the Network Monitor features, introduces filtering, and includes best practices. 

Lesson 3
12:20

This lesson reviews the Network Monitor features, introduces filtering, and includes best practices. 

Lesson 4
08:16
About the Instructor
Security Skills Hub
3.3 Average rating
236 Reviews
5,873 Students
23 Courses
Information Security Training

Information Security organization focusing on enabling skills and competency in the domain of Information Security across multiple practices including Governance, Risk Management, Compliance Management, Identity and Access Management, data Security, Application Security, SAP Security, Managed Security Services, Infrastructure Security and Device Management.

Our mission and vision is to bring hands on training on training in the domain of Information Security tools and technologies to every individual wanting to make a career in this domain by making it more affordable, self intuitive and tailored to the skills required.