COURSES
Enduser Protection
Sophos is a Leading Information Security UK-based brand which start producing security products 30 years ago. While IT network and infrastructure is becoming more and more complex everyday, Sophos is focused on making IT security simple and reliable. Sophos believes that simpler security is better security. Sophos understands that effective security strategy includes securing network, servers and all other devices, while managing them from a single centralized cloud-based platform.
Training Program Offered
Sophos Enduser Protection Administrator
Course Description
The course is expected to take 2 days to complete, of which approximatedly half will be spent on the practical exercises Objective On completion of this course, trainees will be able to-understand how Sophos Central protects against security threats-Complete common configuration tasks-Demonstrate the most commonly used features-Preform basics troubleshooting
Who Should Attend
This course is designed for technical professionals who will be administering Sophos Central Endpoint and Server Protection. Professional may include: System Administrators Network Engineers System Integrators Security Consultants
Pre-requisites
Prior to taking this course you should:have experience of windows client and server operating systems able to setup a Windows server with windows workstation have knowledge of general windows networking have familiarity with using Android or iOS mobile devices
Course Outline
Module 01: Security Threats and Protection
Module 02: Endpoint Protection
Module 03: Server Protection
Module 04: Analysis
Enroll / Register
Sophos Enduser Protection and Server
Course Description
The course is expected to take 2 days to complete, of which approximately half will be spent on the practical exercises Objective On completion of this course, trainees will be able to-understand how Sophos Central protects against security threats-Complete common configuration tasks-Demonstrate the most commonly used features-Preform basics troubleshooting
Who Should Attend
This course is designed for technical professionals who will be demonstrating Sophos Central Endpoint and Server protection. It provides an overview of the protection Sophos central provides to endpoints and servers including major capabilities and core configuration concepts.
Pre-requisites
Prior to taking this course you should:have experience of windows client and server operating systems able to setup a Windows server with windows workstation have knowledge of general windows networking have familiarity with using Android or iOS mobile devices
Course Outline
Module 1: XG Firewall Overview
Module 2: Getting Started with XG Firewall
Module 3: Network Protection
Module 4: Site-to-Site Connections
Module 5: Authentication
Module 6: Web Protection and Application Control
Module 7: Email Protection
Module 8: Wireless Protection
Module 9: Remote Access
Module 10: Logging, Reporting and Troubleshooting
Module 11: Sizing and Evaluation
Enroll / Register
Sophos Enduser Protection and Server Architect
Course Description
The course is expected to take 3 days (24 hours) to complete, of which approximately 9 hours will be spent on thepractical exercises. Objectives On completion of this course, trainees will be able to: Design an installation considering all variables Undertake a multi-site installation appropriate for a customer environment Explain the function of core components, how they work, and how to configure them Track the source of infections and cleanup infected devices Perform preliminary troubleshooting and basic support of customer environments
Who Should Attend
This course provides an in-depth study of Sophos Central, designed for experienced technical professionals who will be planning, installing, configuring and supporting deployments in production environments.
Pre-requisites
Prior to taking this training you should: Have completed and passed the Sophos Central Endpoint and Server Protection – Certified Engineer course We recommend students have the following knowledge and experience: Experience with Windows networking and the ability to troubleshoot issues A good understanding of IT securityExperience using the Linux command line for common tasks Experience configuring Active Directory Group Policies Experience creating and managing virtual servers or desktops
Course Outline
Module 1: Deployment Scenarios
Module 2: Client Deployment Methods
Module 3: Endpoint Protection Policies
Module 4: Server Protection Policies
Module 5: Protecting Virtual Servers
Module 6: Logging and Reporting
Module 7: Managing Infections
Module 8: Management
Enroll / Register
We Are Here To Help!
Office
Suite # 1001 – 10th Floor, Caesars Towers (National IT Park),
Main Shara-e-Faisal, Karachi, Pakistan
Call Us
Tel : +92 (21) 37132222
Fax : +92 (21) 37132222
email: trainings@softechms.com