KL 002.11.1 - Zertifizierungs Schulung - Virtual Class-Room
Teilnehmerkreis:
Dieses Seminar wendet ausschließlich an Kunden und Partner die eine Zertifizierung oder Re- Zertifizierung für den KL 002.11 anstreben.
Voraussetzungen:
Grundkenntnisse über Windows-Betriebssysteme und IT-Sicherheit werden vorausgesetzt. Das Seminar wird in deutscher Sprache gehalten, bei Bedarf auch in englischer Sprache.
Inhalt:
Unit I. Deployment
Chapter 1. How to deploy Kaspersky Endpoint Security for Business
Chapter 2. How to install Kaspersky Security Center
Chapter 3. How to install Kaspersky Endpoint Security on computers
Chapter 4. How to organize computers into groups
- Lab 1 — How to install Kaspersky Security Center
- Lab 2 — How to deploy Kaspersky Endpoint Security
- Lab 3 — How to create a structure for the managed computers
Unit II. Protection management
Chapter 1. How Kaspersky Endpoint Security protects computers
Chapter 2. How to configure file protection
Chapter 3. How to configure protection against network threats
Chapter 4. How to configure protection against sophisticated threats
Chapter 5. How to control network connections
Chapter 6. How to protect computers outside the network
Chapter 7. What else is there in protection and why
- Lab 4 — How to test File Threat Protection
- Lab 5 — How to configure Mail Threat Protection
- Lab 6 — How to test Web Threat Protection
- Lab 7 — How to test protection of network folders against ransomware
- Lab 8 — How to check health of Exploit Prevention
- Lab 9 — How to test protection against fileless threats
- Lab 10 — Improve workstations’ protection against ransomware
- Lab 11 — How to test Network Threat Protection
- Lab 12 — How to configure exclusions from self-defense
- Lab 13 — How to configure password protection
Unit III. Security Controls
Chapter 1. General
Chapter 2. Application Control
Chapter 3. Device Control
Chapter 4. Web Control
Chapter 5. Adaptive Anomaly Control
- Lab 14 — How to configure Application Control
- Lab 15 — How to block start of unknown applications in the network
- Lab 16 — How to block USB flash drives
- Lab 17 — How to configure granular permissions for USB flash drives
- Lab 18 — How to configure web access control
- Lab 19 — How to configure Adaptive Anomaly Control
Unit IV. Maintenance
Chapter 1. How to maintain protection
Chapter 2. What to do daily
Chapter 3. What to do if something has happened