course overview
download outline
Overview
This course provides an in-depth study of Sophos Enduser Protection, designed for experienced technical professionals who will be planning, installing, configuring and supporting deployments in production environments. The course will be delivered in a classroom setting, and consists of presentations and practical lab exercises to reinforce the taught content. Printed copies of the supporting documents for the course will be provided to each trainee. Due to the nature of delivery, and the varying experiences of the trainees, open discussion is encouraged during the training. This course provides an in-depth study of Sophos Enduser Protection, designed for experienced technical professionals who will be planning, installing, configuring and supporting deployments in production environments. The course will be delivered in a classroom setting, and consists of presentations and practical lab exercises to reinforce the taught content. Printed copies of the supporting documents for the course will be provided to each trainee. Due to the nature of delivery, and the varying experiences of the trainees, open discussion is encouraged during the training. This course provides an in-depth study of Sophos Enduser Protection, designed for experienced technical professionals who will be planning, installing, configuring and supporting deployments in production environments. The course will be delivered in a classroom setting, and consists of presentations and practical lab exercises to reinforce the taught content. Printed copies of the supporting documents for the course will be provided to each trainee. Due to the nature of delivery, and the varying experiences of the trainees, open discussion is encouraged during the training. Target audience Target audience Target audience Target audience This course is designed for technical professionals who will be planning, installing, configuring and supporting deployments in production environments. And for indivudials wishing to obtain the Enduser Protection Certified Architect certification. This course is designed for technical professionals who will be planning, installing, configuring and supporting deployments in production environments. And for indivudials wishing to obtain the Enduser Protection Certified Architect certification. This course is designed for technical professionals who will be planning, installing, configuring and supporting deployments in production environments. And for indivudials wishing to obtain the Enduser Protection Certified Architect certification.
Skills Gained
Prerequisites
Prior to attending this course, trainees should: Prior to attending this course, trainees should: Prior to attending this course, trainees should:
Complete the Sophos Certified Engineer Enduser Protection course and should have passed the Certified Engineer exam Complete the Sophos Certified Engineer Enduser Protection course and should have passed the Certified Engineer exam Complete the Sophos Certified Engineer Enduser Protection course and should have passed the Certified Engineer exam
Have a strong working knowledge of network configuration and troubleshooting before attending this course. Have a strong working knowledge of network configuration and troubleshooting before attending this course. Have a strong working knowledge of network configuration and troubleshooting before attending this course.
Have a good understanding of IT security Have a good understanding of IT security Have a good understanding of IT security
Outline
On completion of this course, trainees will be able to: On completion of this course, trainees will be able to: On completion of this course, trainees will be able to:
Design a complex installation considering all variables Design a complex installation considering all variables Design a complex installation considering all variables
Undertake a multi-server installation appropriate for a customer environment Undertake a multi-server installation appropriate for a customer environment Undertake a multi-server installation appropriate for a customer environment
Understand the function of core components, and how they are configured Understand the function of core components, and how they are configured Understand the function of core components, and how they are configured
Gain understanding of how core components work, and how to troubleshoot Gain understanding of how core components work, and how to troubleshoot Gain understanding of how core components work, and how to troubleshoot
Review of Enduser Protection features and components Review of Enduser Protection features and components Review of Enduser Protection features and components
Factors to consider when designing solutions Factors to consider when designing solutions Factors to consider when designing solutions
Single site deployments Single site deployments Single site deployments
Multi site deployments Multi site deployments Multi site deployments
Air-gapped network Air-gapped network Air-gapped network
Roaming users Roaming users Roaming users
Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements Lab Lab Lab Lab
Factors to consider when designing SEC deployments Factors to consider when designing SEC deployments Factors to consider when designing SEC deployments
Management server requirements Management server requirements Management server requirements
Database design considerations Database design considerations Database design considerations
Remote console requirements Remote console requirements Remote console requirements
Firewall configuration Firewall configuration Firewall configuration
High availability High availability High availability
Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements Selecting the right solution for a customer's requirements
The installation process The installation process The installation process
Troubleshooting installation Troubleshooting installation Troubleshooting installation Lab Lab Lab Lab
Configure Active Directory Organizational Units Configure Active Directory Organizational Units Configure Active Directory Organizational Units
Configure firewall rules using an Active Directory Group Policy Configure firewall rules using an Active Directory Group Policy Configure firewall rules using an Active Directory Group Policy
Install the Sophos Enterprise Console database role on a SQL Server Install the Sophos Enterprise Console database role on a SQL Server Install the Sophos Enterprise Console database role on a SQL Server
Verify connectivity from SEC to the database on the SQL Server Verify connectivity from SEC to the database on the SQL Server Verify connectivity from SEC to the database on the SQL Server
Perform an installation of the Management Server and Management Console Perform an installation of the Management Server and Management Console Perform an installation of the Management Server and Management Console
Perform an installation of the Management Console on a workstation Perform an installation of the Management Console on a workstation Perform an installation of the Management Console on a workstation
Use RDP to connect to the Management Console on another host Use RDP to connect to the Management Console on another host Use RDP to connect to the Management Console on another host
View setup logs View setup logs View setup logs
Determining the information required to plan endpoint deployment Determining the information required to plan endpoint deployment Determining the information required to plan endpoint deployment
Supported platforms Supported platforms Supported platforms
Deployment strategy Deployment strategy Deployment strategy
Removing other endpoint products Removing other endpoint products Removing other endpoint products
Setup.exe command line parameters Setup.exe command line parameters Setup.exe command line parameters
Protecting computers automatically Protecting computers automatically Protecting computers automatically
Deployment packager Deployment packager Deployment packager
Installation log files Installation log files Installation log files
Mac deployment Mac deployment Mac deployment
Linux deployment Linux deployment Linux deployment
Endpoint Defense – Advanced Tamper Protection Endpoint Defense – Advanced Tamper Protection Endpoint Defense – Advanced Tamper Protection Lab Lab Lab Lab
Use the Competitive Removal Tool (CRT) Use the Competitive Removal Tool (CRT) Use the Competitive Removal Tool (CRT)
Import and synchronize computers on the network using Active Directory Import and synchronize computers on the network using Active Directory Import and synchronize computers on the network using Active Directory
Deploy via Enterprise Console Deploy via Enterprise Console Deploy via Enterprise Console
Perform connection tests between SEC and enduser clients Perform connection tests between SEC and enduser clients Perform connection tests between SEC and enduser clients
Modify the Sophos Default Firewall and Patch Policies Modify the Sophos Default Firewall and Patch Policies Modify the Sophos Default Firewall and Patch Policies
Create and test a deployment package for Windows Create and test a deployment package for Windows Create and test a deployment package for Windows
Deploy Enduser Protection using Active Directory Group Policy Deploy Enduser Protection using Active Directory Group Policy Deploy Enduser Protection using Active Directory Group Policy
Factors to consider when designing an updating infrastructure Factors to consider when designing an updating infrastructure Factors to consider when designing an updating infrastructure
Introduction to AutoUpdate Introduction to AutoUpdate Introduction to AutoUpdate
SUM updating overview SUM updating overview SUM updating overview
Software subscriptions Software subscriptions Software subscriptions
HTTP Updating HTTP Updating HTTP Updating
Deploying multiple CIDs and Update Managers Deploying multiple CIDs and Update Managers Deploying multiple CIDs and Update Managers
Installing additional SUMs Installing additional SUMs Installing additional SUMs
AutoUpdate components AutoUpdate components AutoUpdate components
Troubleshooting SUM Troubleshooting SUM Troubleshooting SUM
Troubleshooting AutoUpdate Troubleshooting AutoUpdate Troubleshooting AutoUpdate Lab Lab Lab Lab
Configure a preview subscription for use by a test group Configure a preview subscription for use by a test group Configure a preview subscription for use by a test group
Install and configure an additional Update Manager Install and configure an additional Update Manager Install and configure an additional Update Manager
Configure IIS to support a Web CID Configure IIS to support a Web CID Configure IIS to support a Web CID
Management architecture Management architecture Management architecture
Remote Management System (RMS) Remote Management System (RMS) Remote Management System (RMS)
RMS component communication RMS component communication RMS component communication
RMS registration RMS registration RMS registration
RMS troubleshooting RMS troubleshooting RMS troubleshooting
Message relays Message relays Message relays
WCF-based management WCF-based management WCF-based management
Configure a message relay Configure a message relay Configure a message relay
Create and test a deployment package for a remote endpoint Create and test a deployment package for a remote endpoint Create and test a deployment package for a remote endpoint
Endpoint Protection Advanced and Exploit Prevention components Endpoint Protection Advanced and Exploit Prevention components Endpoint Protection Advanced and Exploit Prevention components
Preventing a threat before it reaches the device Preventing a threat before it reaches the device Preventing a threat before it reaches the device
Browser Exploit Prevention Browser Exploit Prevention Browser Exploit Prevention
Web Protection and Control Web Protection and Control Web Protection and Control
Sophos Extensible List (SXL) Sophos Extensible List (SXL) Sophos Extensible List (SXL)
Download Reputation Download Reputation Download Reputation
Preventing a threat before it runs on the device Preventing a threat before it runs on the device Preventing a threat before it runs on the device
Exploit Prevention Exploit Prevention Exploit Prevention
Configuring exclusions Configuring exclusions Configuring exclusions
Host Intrusion Prevention (HIPS) Host Intrusion Prevention (HIPS) Host Intrusion Prevention (HIPS)
On-access scanning On-access scanning On-access scanning
Detecting threats Detecting threats Detecting threats
Malicious Traffic Detection (MTD) Malicious Traffic Detection (MTD) Malicious Traffic Detection (MTD)
CryptoGuard CryptoGuard CryptoGuard
WipeGuard WipeGuard WipeGuard
Respond Respond Respond
On-demand scanning On-demand scanning On-demand scanning
Clean up Clean up Clean up
Sophos Clean Sophos Clean Sophos Clean
Tamper Protection and Endpoint Defense Tamper Protection and Endpoint Defense Tamper Protection and Endpoint Defense Lab Lab Lab Lab
Review of device control Review of device control Review of device control
Device control event viewer Device control event viewer Device control event viewer
Unique device instance IDs Unique device instance IDs Unique device instance IDs
Device exemptions Device exemptions Device exemptions
Review of data control Review of data control Review of data control
Content Control List (CCL) Content Control List (CCL) Content Control List (CCL)
Latest SophosLabs Content Control Lists Latest SophosLabs Content Control Lists Latest SophosLabs Content Control Lists
How to create a custom CCL How to create a custom CCL How to create a custom CCL
Data control exclusions Data control exclusions Data control exclusions Lab Lab Lab Lab
Configure a device control policy and add an exemption Configure a device control policy and add an exemption Configure a device control policy and add an exemption
Patch assessment components and architecture Patch assessment components and architecture Patch assessment components and architecture
Patch assessment using a proxy Patch assessment using a proxy Patch assessment using a proxy
Patch assessment troubleshooting Patch assessment troubleshooting Patch assessment troubleshooting Labs Labs Labs Labs
Configured a reverse proxy to cache patch data and proxy the assessment reporting Configured a reverse proxy to cache patch data and proxy the assessment reporting Configured a reverse proxy to cache patch data and proxy the assessment reporting
Auditing configuration Auditing configuration Auditing configuration
Granting access to audit data Granting access to audit data Granting access to audit data
Using external applications for audit reporting Using external applications for audit reporting Using external applications for audit reporting
Email alerting Email alerting Email alerting
Sophos Reporting Interface Sophos Reporting Interface Sophos Reporting Interface
Sophos Log Writer Sophos Log Writer Sophos Log Writer
Enhanced reporting with 3rd party tools Enhanced reporting with 3rd party tools Enhanced reporting with 3rd party tools Lab Lab Lab Lab
Enable auditing and use the database view to review logged actions Enable auditing and use the database view to review logged actions Enable auditing and use the database view to review logged actions
Configure email alerting from endpoints for Anti-virus and HIPS Configure email alerting from endpoints for Anti-virus and HIPS Configure email alerting from endpoints for Anti-virus and HIPS
Supported Platforms Supported Platforms Supported Platforms
SVE Architecture SVE Architecture SVE Architecture
Guest virtual machine (VM) migration Guest virtual machine (VM) migration Guest virtual machine (VM) migration
Updating architecture Updating architecture Updating architecture
Guest VM deployment methods Guest VM deployment methods Guest VM deployment methods
Viewing Guest VMs Viewing Guest VMs Viewing Guest VMs
Backup and restore data and configuration Backup and restore data and configuration Backup and restore data and configuration
PurgeDB PurgeDB PurgeDB
Database and server migration Database and server migration Database and server migration
Upgrading servers Upgrading servers Upgrading servers Lab Lab Lab Lab
Backup and restore configuration and the database Backup and restore configuration and the database Backup and restore configuration and the database
Create a scheduled task to run PurgeDB Create a scheduled task to run PurgeDB Create a scheduled task to run PurgeDB
Perform a database migration Perform a database migration Perform a database migration
If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.
Submit an enquiry from any page on this site and let us know you are interested in the requirements box, or simply mention it when we contact you.
All $ prices are in USD unless it’s a NZ or AU date
SPVC = Self Paced Virtual Class
LVC = Live Virtual Class
Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.