The Symantec Data Loss Prevention 15.0
Administration course is designed to provide
you with the fundamental knowledge to
configure and administer the Symantec Data
Loss Prevention Enforce platform. The hands-on
labs include exercises for configuring Enforce
server, detection servers, and DLP agents as
well as performing policy creation and incident
detection, incident response, incident
reporting, and user and role administration.
Additionally, you are introduced to deployment
best practices and the following Symantec Data
Loss Prevention products: Network Monitor,
Network Prevent, Cloud Service for Email, Cloud
Detection Service, Network Discover, Network
Protect, Cloud Storage, Endpoint Prevent, and
Endpoint Discover. Note that this course is
delivered on a Microsoft Windows platform.

Audience: The Symantec Data Loss Prevention
Administration course is intended for attendees
who are responsible for configuring and
maintaining Symantec Data Loss Prevention.
Additionally, this course is intended for
technical users responsible for creating and
maintaining Symantec Data Loss Prevention
policies and the incident response structure.

Event Number: SYMAN-31938

Available Languages: English (US)

Subjects: Software

Objectives:

By the end of this course, you will be able to
configure and use Symantec Data Loss
Prevention 15.0.

Course Detail:

COURSE OUTLINE
Module 1: Data Loss Prevention Landscape
Data Loss Prevention landscape
Data loss risk management
Data Loss Prevention real-world use
cases
Module 2: Overview of Symantec Data Loss
Prevention
Symantec Data Loss Prevention Suite
Symantec Data Loss Prevention
architecture
Module 3: Identifying and Describing
Confidential Data
Identifying confidential data
Configuring Symantec Data Loss
Prevention to recognize confidential
data
Described Content Matching (DCM)
Exact Data Matching (EDM) Indexed Document Matching (IDM)
Vector Machine Learning (VML)
Sensitive Image Recognition
Custom file-type detection
Module 4: Locating Confidential Data at
Rest
Determining where to search for
confidential data
Locating confidential data on corporate
repositories
Locating confidential data in the cloud
Locating confidential data on endpoint
computers
Module 5: Understanding How
Confidential Data is Being Used
Monitoring confidential data moving
across the network
Monitoring confidential data being used
on endpoint computers
Module 6: Educating End Users to Adopt
Data-Protection Practices
Implementing corporate training on
data protection policies
Providing notifications of user policy
violations
Module 7: Preventing Unauthorized
Exposure of Confidential Data
Using response rules to prevent the
exposure of confidential data
Protecting confidential data in motion
Protecting confidential data in use
Protecting confidential data at rest
Module 8: Remediating Data Loss Incidents
and Tracking Risk Reduction
Reviewing risk management
frameworks
Using incident reporting options to
identify and assess risk
Creating tools that support the
organization´┐Żs risk reduction process
Communicating risk to stakeholders
Understand

Pre-Requisite Text:
This course assumes that students have a basic
understanding of Windows server-class
operating systems and commands, as well as
networking and network security concepts.

No Sessions available at this moment
Please contact your local Training Administrator to schedule this class
Or, Chat With Us in the lower right corner of the page