Skip Ribbon Commands
Skip to main content
Computer Security Day
Computer Security Day>CSD-2013>Training Programmes

Training Programmes


CERT-MU in collaboration with Symantec and Checkpoint also organised the following trainings for December 2013:
 
 
Course Title ​Date Scheduled ​Offered by
1. Check Point Software Blade Administration 

3rd December 2013

(1 Day)

​2. Symantec Endpoint Protection 12.1

​4th-5th December 2013

(2 Days)

3. PGP Universal Server 3.2 Administration

​9th-10th December 2013

(2 Days)

All Trainings are FREE OF CHARGE
 
About the Training Courses 
 
1. Check Point Software Blade Administration Training (3 December 2013)
 
Check Point Software Blade Training Blade is a learning course about administering software blades. This course provides insights that teach how to identify and address Web 2.0 issues including malware threats, IPS management, bandwidth impact, and productivity loss and how to effectively manage and educate users about corporate web usage. It  also highlights the importance of Security Event & log management capabilities & Endpoint Security aspects.
 
 
Course Objectives
By the completion of this course, participants will be able to:
 
  • Identify the Application Control Software Blade / IPS / Threat Prevention Software Blade as part of a total security management solution.
  • Identify and address Web 2.0 application access issues including malware threats, bandwidth impact issues and productivity loss.
  • Monitor / block specific applications usage in your organization.
  • View all current activity that is occurring with the Application Control Rule Base.
  • Identify important aspects of IPS software blade management including testing and deployment and activation of protections.
  • Configure Application / Web Intelligence Protections.
  • Discuss how Bot are used in an attack, infect computer & how to prevent using Threat Prevention policies
  • Knowhow to leverage ThreatWiki, ThreatCloud.
  • Discuss the challenges and benefits of log management.
  • Describe how SmartLog transforms data into security intelligence.
  • Use SmartEvent to analyze your Application Control data / IPS Events / Malware to prepare management reports.
  • Describe Endpoint Security architecture, dependencies, various endpoint software blades.
  • Client deployment methodology.
  • Managing Full Disk Encryption & Media Encryption policies.
 
 
​​Who Should Attend?

• Network managers
• Systems Administrators
• Systems  Professionals
• ICT Professionals
• Security Professionals
 
 
​​Prerequisites?
 
Persons attending this course should have general knowledge of TCP/IP, working knowledge of Windows and/or Unix, network technology, the Internet and 6 months experience working in a Check Point security gateway environment.
 
2. Symantec Endpoint Protection 12.1: Administration (4-5 December 2013)
The Symantec Endpoint Protection 12.1: Administration course is designed for the network, IT security, and systems administration professional tasked with architecting, implementing, and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. This class covers how to design, deploy, install, configure, manage, and monitor Symantec Endpoint Protection 12.1 (SEP 12.1).
By the completion of this course, participants will be able to: 
 
  • ​Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy
  • ​Install and configure Symantec Endpoint Protection management and client components
  • ​Deploy Symantec Endpoint Protection clients
  • ​Deploy Symantec Endpoint Protection clients
  • ​Manage the client user interface
  • ​Manage product content updates
  • ​Design a Symantec Endpoint Protection environment
  • ​Manage Virus and Spyware Protection policies
  • ​Manage SONAR scans
  • ​Manage Firewall and Intrusion Prevention policies
  • ​Manage Application and Device Control policies
  • Manage virtualized clients who should attend
   
 
​​Who Should Attend?

• Network managers
• Systems Administrators
• Systems  Professionals
• ICT Professionals
• Security Professionals
 
 
​​Prerequisites?
 
Participants must have working knowledge of advanced computer terminology, including TCP/IP networking terms and Internet terms, and an administrator-level knowledge of Microsoft Windows 7/2008 operating systems.
 
 
3. PGP Universal Server 3.2 Administration Training (9-10 December 2013)
 
The PGP Universal Server 3.2 Administration course for PGP Universal Server 3.2 and PGP Desktop 10.2 is designed to provide participants with the fundamental knowledge to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. The course also covers troubleshooting of PGP Desktop, including installation and enrolment problems, PGP Whole Disk Encryption, and common files and services that may need to be manipulated or repaired. Additionally, participants are introduced to the following PGP encryption products: Key Management Services, PGP Support Package for BlackBerry, PGP Mobile, PGP iOS Viewer and Endpoint Device Control.
 
 
Course Objectives

At the completion of the course, participants will be able to:
 
  •  
​Describe the features, concepts, components, and terminology of both the PGP Universal Server 3.2 and PGP Desktop 10.2products.
​Install PGP Universal Server 3.2 and complete setup using the most commonly configured options.
Install a managed and customized PGP Desktop 10.2 client.
​Configure, complete administration tas ks for, and use PGP Whole Disk Encryption and other PGP Desktop features
Configure policy-based messaging security for internal and external recipients
​Create and modify users, user policies, and groups using either manual or directory integration methods.
 
 
​​Who Should Attend?
 
• Network managers
• Systems Administrators
• Systems  Professionals
• ICT Professionals
• Security Professionals
 
 
​​Prerequisites?
 
An understanding of information security concepts and terminology helps you succeed in this course. Also, this course requires familiarity with networking and computing concepts. Symantec recommends that students taking this course have at least one year of information technology experience.