Endpoint Security and Network Access Control Training

Level: Intermediate
RATING: 4.6/5 4.65/5 Based on 84 Reviews

In this Endpoint Security training course, you will learn how to control the admission, defence status, and configuration of all endpoints in your organisation, and gain the skills to better control access to intranet resources. You will learn to implement Network Access Control to prevent malware contamination from untrusted devices, optimise Data Loss Prevention (DLP) through host-based IDS/IPS and endpoint encryption, and prevent malware and botnet propagation utilising anti-malware and honeypot technology.

Key Features of this Endpoint Security Training:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Enforce security policies to protect sensitive data from internal and external threats
  • Deploy Network Access Control to prevent malware infestation
  • Implement Data Loss Prevention (DLP) through host-based IDS/IPS and endpoint encryption
  • Regulate USB devices and optimise anti-malware

Certifications/Credits:

CompTIA

Choose the Training Solution That Best Fits Your Individual Needs or Organisational Goals

LIVE, INSTRUCTOR-LED

In Class & Live, Online Training

  • 4-day instructor-led training course
  • One-on-one after course instructor coaching
  • Earn 23 CompTIA CEUs
  • Pay later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard £2095

RESERVE SEAT

PRODUCT #2011

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organisation
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience

CONTACT US

Save More on Training with Learning Tree Training Vouchers!

Our flexible, easy-to-redeem training vouchers are available to any employee within your organisation. For details, please call 0800 282 353 or chat live.

In Class & Live, Online Training

  • AFTERNOON START: Attend these live courses online via Anyware

    19 - 22 Feb ( 4 Days)
    2:00 PM - 9:30 PM GMT
    Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • 6 - 9 Aug ( 4 Days)
    2:00 PM - 9:30 PM BST
    Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Important Endpoint Security Course Information

Endpoint Security Course Outline

  • Introduction to Endpoint Security

    Internal defences vs. perimeter defences

    • Defining a holistic security posture
    • Assessing threats from client–side and internal attacks
    • Shifting the paradigm from a fortress mentality

    Establishing a secure internal architecture

    • Instituting a risk–based access control policy
    • Choosing guest access strategies
    • Regulating, monitoring and controlling network traffic
  • Establishing VLANs to Isolate Traffic

    Developing a VLAN strategy

    • Determining the number and types of VLANs
    • Configuring VLAN trunking
    • Managing VLAN access centrally

    Segregating and isolating traffic

    • Restricting access with port security
    • Setting up quarantine and guest VLANs
    • Managing port security violations
  • Implementing Network Access Control (NAC)

    Installing a NAC server

    • Implementing and authenticating with EAP
    • Leveraging VLAN infrastructure

    Securing access with 802.1X

    • Configuring authentication agents
    • Deploying certificates and RADIUS servers
    • Denying rogue devices
  • Establishing Policy Servers and Repositories

    Implementing policy–based access control

    • Configuring system health requirements
    • Creating a Bring Your Own Devices (BYOD) policy

    Managing patches and anti–malware updates

    • Establishing software repositories
    • Pushing OS and application patches to clients

    Monitoring and enforcing endpoint security

    • Checking system health against policy
    • Validating pre– and post–connect profiles
    • Quarantining and remediating noncompliant devices
  • Managing Confidentiality for Data at Rest

    Establishing an encryption policy

    • Handling mobile devices and removable media
    • Integrating encryption with Data Loss Prevention (DLP)

    Implementing encryption

    • Leveraging PKI to generate corporate recovery keys
    • Enforcing full and partial disk encryption for endpoints
  • Preventing and Detecting Data Exfiltration

    Developing a data loss strategy

    • Permitting required traffic and denying dangerous traffic
    • Configuring enterprise host firewalls
    • Regulating attached USB and portable devices

    Monitoring and detecting data leakage

    • Preventing covert tunnels within DNS and HTTP(S) traffic
    • Preventing Personally Identifiable Information (PII) leaks
    • Identifying attempts to steal data
  • Implementing Anti–Malware Defences

    Deploying anti–malware

    • Pushing defensive software to endpoints
    • Establishing internal anti–malware signature update servers
    • Managing mobile and remote users

    Managing enterprise anti–malware configuration

    • Configuring scanning policies
    • Determining responses to infection alerts
    • Securing anti–malware configurations

    Deploying host–based IDS/IPS

    • Monitoring host processes
    • Deciding amongst deployment options
  • Reporting and Compliance Checking

    Responding to and mitigating attacks

    • Assessing incidence response strategies
    • Developing mitigation and containment strategies

    Demonstrating organisational compliance

    • Generating reports for compliant and noncompliant systems
    • Complying with government regulations
    • Tracking policy effectiveness
    • Producing policy violation reports

Team Training

Endpoint Security Training FAQs

  • What is endpoint security?

    The purpose of endpoint security is to secure the various endpoints on a network and protect them.

  • What is network access control?

    NAC is a security approach that enforces policy on devices that access networks to increase network visibility and reduce risk.

  • Can I learn endpoint security online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 0800 282 353
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition fee!
  • No advance payment required for most products.
  • Tuition fee can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

Herndon, VA / Online (AnyWare)
Herndon, VA / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français