

Describing Application Control and concepts.

Ensuring client compliance with Host Integrity.Providing Granular Control with Host Integrity Tailoring Virus and Spyware settings for Linux clients.Preventing email from downloading malware.Identifying zero-day and unknown threats.Detecting and remediating risks in downloaded files.Ensuring real-time protection for clients.Tailoring scans to meet an environment’s needs.Platform and Virus and Spyware Protection policy overview.Describing how the emulator executes a file in a sandbox and the machine learning engine’s role and function.Describing how endpoints are protected with the Intelligent Threat Cloud Service.Describing how SEP protects against zero-day threats and threats downloaded through files and email.


Blocking network attacks using protection and stealth settingsīlocking Threats with Intrusion Prevention.Enforcing corporate security policy with firewall rules.Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Discovering the tools and methods used by attackers.Describing how Symantec Endpoint Protection protects each layer of the network stack.Partner With Us Add product value and help your clients keep their skills up to date.Room Rentals Renting a classroom from ExitCertified is easy and convenient.Government Government training solutions at ExitCertified.Corporate Training Achieve your strategic goals through organizational training.Group Training Work with us on a custom training plan for your next group training.Individual Training Build your technical skills and learn from an accredited instructor.
