Same Info in:   Русский English 

 
 

KL 002.11: Kaspersky Endpoint Security for Business. Fundamentals

This course describes how to protect a network with no more than 1000 workstations and servers running Windows, concentrated in one place.

All the information in the course applies to Kaspersky Security Center 10.5 and Kaspersky Endpoint Security 11 for Windows.

     

Unit 1

Introduction: Kaspersky Endpoint Security for Business. Fundamentals
Chapter 1: How to install Kaspersky Security Center
Chapter 2: Quick Start Wizard
Demo 1.1: Install Kaspersky Security Center
 Interactive Demo Non-Interactive Demo  
Chapter 3: How to install Kaspersky Endpoint Security on computers
Demo 1.2: Deploying Kaspersky Endpoint Security
 Interactive Demo Non-Interactive Demo  
Demo 1.3: Installing Kaspersky Endpoint Security 11 for Windows on a mobile computer
 Interactive Demo Non-Interactive Demo  
Chapter 4: Which Kaspersky Endpoint Security components to install
Chapter 5: How and why to create installation packages
Chapter 6: Which programs are incompatible and why uninstall them
Chapter 7: How the Administration Server discovers computers
Chapter 8: How and why to create and import groups
Demo 1.4: Create a structure for the managed computers
 Interactive Demo Non-Interactive Demo  

Unit 2

Chapter 1: How Kaspersky Endpoint Security counters attacks
Chapter 2: How to configure file protection
Demo 2.1: File Threat Protection health check
 Interactive Demo Non-Interactive Demo  
Chapter 3: How to configure protection against network threats
Demo 2.2: Configure Mail Threat Protection
 Interactive Demo Non-Interactive Demo  
Demo 2.3: Configure exclusions for Web Threat Protection
 Interactive Demo Non-Interactive Demo  
Chapter 4: How to configure protection against sophisticated threats
Demo 2.4: Configure protection against ransomware
 Interactive Demo Non-Interactive Demo  
Chapter 5: How to control network connections
Demo 2.5: Configure Network Threat Protection
 Interactive Demo Non-Interactive Demo  
Chapter 6: How to protect computers outside the network
Chapter 7: What else is there in protection and why
Demo 2.6: Configure exclusions from self-defense
 Interactive Demo Non-Interactive Demo  
Demo 2.7: Configure password protection
 Interactive Demo Non-Interactive Demo  

Unit 3

Chapter 1: General
Chapter 2: Application Control
Demo 3.1: Configure Application Control
 Interactive Demo Non-Interactive Demo  
Demo 3.2: Block start of unknown applications in the network
 Interactive Demo Non-Interactive Demo  
Chapter 3: Device Control
Demo 3.3: Blocking USB flash drives
 Interactive Demo Non-Interactive Demo  
Demo 3.4: Access rights for USB flash drives
 Interactive Demo Non-Interactive Demo  
Chapter 4: Web Control
Demo 3.5: Web Access Control
 Interactive Demo Non-Interactive Demo  

Unit 4

Chapter 1: How to maintain protection
Demo 4.1: Configuring statistics panes
 Interactive Demo Non-Interactive Demo  
Chapter 2: What to do if something has happened
Demo 4.2: Configure maintenance tools
 Interactive Demo Non-Interactive Demo  
Demo 4.3: Collect trace logs
 Interactive Demo Non-Interactive Demo  
Chapter 3: What to do from time to time


In this course you will find two sorts training materials: slides and demonstrations. Slides mainly explain the principles of how this or that feature works and how you usually use it. Demonstrations specifically show how to do things in Kaspersky Endpoint Security and Kaspersky Security Center and what the expected results of these doings are. Tutorials show the same actions as demonstrations. The difference between them is that in demonstrations you simply watch whereas in tutorials you have to complete all the actions yourself in a simulated environment. Both the slides and the demonstrations (tutorials) are voiced.


Student Prerequisites

Basic experience with Windows operating systems and networking.


System Requirements

To fully experience this training you need the following:

  • Microsoft Internet Explorer 9.0 or later
  • Sound card, speakers or a headphones for listening to voice-over
 


Copyright © 1997-2020 Kaspersky Lab
Privacy Policy   |   Contact Us   |   About us

Stay connected