Switches & routers are the critical building blocks of a successful internetwork infrastructure. In this course, you gain the
...The Client Management Suite 7: Deployment & Imaging course is designed for the professional tasked with installing, configuring,
...The Symantec Net Backup Maintain & Troubleshoot course provides the IT professional with instruction on troubleshooting
...The Symantec Backup Exec 12.5 for Windows Servers: Administration course is designed for the data protection professional tasked
... The Symantec Brightmail Gateway 8.0
- Administration
- OD course is designed for the customers, support engineers, SEs,
The Symantec Data Loss Prevention 10.5 Administration course is designed to provide you with the fundamental knowledge & hands-on
...The Endpoint Protection 11.0 course is designed for the network, IT security, & systems administration professional tasked with
...This class is designed for system administrators tasked with installing, operating, integrating, & monitoring the
...The Symantec Enterprise Vault 8.x for Exchange course is designed for system administrators tasked with installing, operating,
...The Legal Discovery Using Symantec Enterprise Vault 8 Discovery Accelerator course is designed for those who use Discovery Accelerator
...This course provides in-depth instruction on the installation and configuration of the Symantec Control Compliance Suite including the RMS and ESM data collectors.
The course outlines the steps necessary to secure IT environments that use multiple
This course provides in-depth instruction on the installation & configuration of the Symantec Control Compliance Suite including the RMS & ESM data collectors.
The course outlines the steps necessary to secure IT environments that use multiple operating systems & applications, such as Microsoft Windows, IIS, Active Directory, Exchange, & SQL Server, in addition to multiple UNIX platforms & Oracle environments.
The course begins with a discussion of a specific environment & its inherent vulnerabilities. The course then demonstrates how to use the Control Compliance Suite to assess & remediate vulnerabilities. This course also explains how to achieve compliance with an effective enterprise security program that leverages the advantages of the Policy, Standards, Entitlements & Response Assessment modules.
This training may be available onsite; please contact us if you are interested.