Tags
Language
Tags
April 2025
Su Mo Tu We Th Fr Sa
30 31 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 1 2 3
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Full Kaspersky Training (Endpoint Sec , Hybrid Cloud , Edr) (updated 11/2022)

Posted By: ELK1nG
Full Kaspersky Training (Endpoint Sec , Hybrid Cloud , Edr) (updated 11/2022)

Full Kaspersky Training (Endpoint Sec , Hybrid Cloud , Edr)
Last updated 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.21 GB | Duration: 12h 16m

The Complete Kaspersky Bootcamp(Endpoint SEC For Windows With EDR Optimum & Hybrid Cloud For Virtualization Light Agent)

What you'll learn

Be Familiar with kaspersky security center and KES for windows

Install KES for windows and also kaspersky network agent

Identify the needed policies on network firewalls to enable communication between kaspersky components

Install the needed tasks and policies of KES for windows

Protect your windows machine in multiple manners ( File , Web , Network and User Behaviour )

Control your windows machine in multiple manners ( Web , Device and App )

Learn how to make full disk encryption using KES for windows

Monitoring all things related to your windows machines

Learn how KES for windows will help you discover vulnerabilities on your windows machine and how it will patch them

Requirements

Network Basics

Security Basics

Systems Basics

Description

In This Course Student Will Learn The Main Features Of KSC & KES By Working On Giant Lab Which simulates a real world organization integrated with multiple vendors security solutions . First course will be about kaspersky endpoint security for windows -> First section will be an introduction to KSC and KES via a mini-book describing all the things will be explained in the labs sections , Second section will be the installation process of both KSC and KES via local method and remote method , Third section will be about the needed tasks after the installation finsihed , Fourth section will be about configuring the policy and discovering it's main features , Fifth section will be a quick example of penetration testing using kali linux on our machines have KES installed on them , Lastly some reports and monitoring techniques . With this course , student will be able to install KES via KSC ( MMC Console ) and configure the proper security rules on firewalls on it's path which happens in each real world environment .Second course will about kaspersky hybrid cloud security for virtualization . During This Course Student Will Able To Define The Main Features Of Kaspersky Hybrid Cloud Security For Virtualization , See The Main Components Of Solution ( Integration Server , Protection Server "SVM" , Light Agent , Network Agent ) , Differentiate Between Light Agent & Agentless . Why We Choose Light Agent ! , Install Kaspersky Hybrid Cloud Security For Virtual Environments ( KSC , vCenter , Protection Sever , Pushing Light Agent To Windows Machines ) , Configuring The Main Policies Of SVM And Light Agents And See The Main Components And Feature Of Each Policy , Configuring The Main Needed Tasks For Each Application , Comparing Kaspersky Light Agent With Kaspersky Endpoint Security For Windows , What's The Difference Between Both , Launching A Quick Pen Testing On Our Device Has Kaspersky Light Agent On it And See It Will Defend Against Some Attacks And Malwares and See How To Monitor What Happened From Kaspersky Security Center . Third course will about configuring EDR optimum with KES for windows . During This Course Student will be able to install Kaspersky Endpoint Detection & Response Optimum and dicover it's main features . Endpoint Protection Platform will be compared to endpoint detection and response and the main advantages of the last will be discovered .Endpoint detection and response optimum is a solution consisting of two main applications ( endpoint agent & kaspersky endpoint security "below version 11.6" or kaspersky hybrid cloud or kaspersky for windows server ) .In new versions of kaspersky endpoint security form version 11.7 and above , endpoint agent became part of the platform and user doesn't have to install both applications seperately and intergrate between them .During this course we will use kaspersky security center "Web console" since we are using EDR and results will not be shown except in web console .We will also see how to install the solution via the two methods ( Change application components OR Edit the application settings directly ) .Then we will discover all the features of EDR optimum like discovering all the files , network connections , registery that threat can create on the machine .Responses also will be discussed like ( Host isolation ; to completely isolate the pc from the network .. Execution prevention ;to prevent the execution of the threat form begining .. IOC Scan ; To search for specific md5 hash on other pcs in the network ..

Overview

Section 1: Introduction To KSC & KES For Windows

Lecture 1 Introduction To Giant Labs

Lecture 2 Vlans & IP Schema Of Giant Lab Explained

Lecture 3 Intoduction To Kaspersky

Lecture 4 Security Center

Lecture 5 Security Center 2

Lecture 6 Main Functions Of KSC

Lecture 7 Endpoint Security For Business ( Windows ) ( KES )

Lecture 8 Computer Protection

Lecture 9 Computer Control

Section 2: Installing Kaspersky Security Center & Kaspersky Endpoint Security For Windows

Lecture 10 Install Kaspersky Security Center Part 1

Lecture 11 Install Kaspersky Security Center Part 2

Lecture 12 Install Kaspersky Security Center Part 3

Lecture 13 Adding License Of KES

Lecture 14 Communication Rules Between Clients And MGMT Server

Lecture 15 Installing Network Agent Remotely & Riprep

Lecture 16 Rules To Enable Kaspersky Security Center Get It's Updates

Lecture 17 Creating Installation Packages Part 1

Lecture 18 Creating Installation Packages Part2

Lecture 19 Installing KES Remotely Using A Task

Lecture 20 Installing KES & Kaspersky Network Agent Locally

Lecture 21 Uninstalling KES For Windows Remotely From A Machine

Section 3: Needed Tasks

Lecture 22 Task 1 - Activation Of Applications

Lecture 23 Task 2 - Updating KES Databases

Lecture 24 Task 3 Virs Scan

Lecture 25 Task 4 Change Application Components

Lecture 26 More About Tasks

Section 4: KSC For System Management

Lecture 27 Using KSC For System Management

Section 5: Configuring Policy

Lecture 28 Introduction To Policies

Lecture 29 General Setting , Event Configurations & File Threat Protection Options

Lecture 30 Web Threat Protection

Lecture 31 Mail Threat Protection

Lecture 32 Network Threat Protection

Lecture 33 BadUSB Attack Prevention & AMSI Protection

Lecture 34 Advanced Threat Protection

Lecture 35 Host Intrusion Prevention & Firewall

Lecture 36 General Settings

Section 6: Penetration Testing

Lecture 37 Netowrk Discover & Ping Trials

Lecture 38 Creating An Encoded Payload Through KALi & Testing Against KES

Lecture 39 Using Shellter To Include Payload To Normal EXE File & Testing Against KES

Section 7: Monitoring

Lecture 40 Reports & Statistics & Events

Section 8: Using Web Console & Labs Extensions

Lecture 41 Web Console ( Intial Configurations )

Lecture 42 Installing Applications

Lecture 43 Groups & Moving Rules

Lecture 44 Application Control ( Blocking Web Browsers )

Lecture 45 Web Control ( Blocking Social Networking )

Lecture 46 Application Restrictions

Lecture 47 Protection From Network Threats

Lecture 48 Protection From Exploits

Section 9: Kaspersky Endpoint Security ( All About Encryption )

Lecture 49 Full Disk Encryption

Lecture 50 BitLocker Encryption & File Level Encryption

Section 10: Introduction To Kaspersky Hybrid Cloud Solution ( Virtual Environments )

Lecture 51 Introduction

Section 11: Installing ( vCenter , KSC , SVM , Light Agent )

Lecture 52 Intro To Kaspersky Hybrid Cloud

Lecture 53 Installing vCenter -1

Lecture 54 Installing vCenter - 2

Lecture 55 About KSC

Lecture 56 Installing KSLV Components 1

Lecture 57 Installing KSLV Components 2

Lecture 58 Installing SVM On vCenter 1

Lecture 59 Installing SVM On vCenter 2

Lecture 60 SVM ( Protection Server) Activation Task

Lecture 61 Database Updates Task

Lecture 62 Creating Policy For SVM

Lecture 63 Installing ( Network Agent , Light Agent ) On A Test Machine 1

Lecture 64 Installing ( Network Agent , Light Agent ) On A Test Machine 2

Lecture 65 Installing ( Network Agent , Light Agent ) On A Test Machine 3

Section 12: Configuring Needed Tasks And Policy - Penetration Testing

Lecture 66 Configuring Virus Scan Task & Policy

Lecture 67 Penetration Testing & Monitoring

Section 13: Introduction To Endpoint Detection & Response Optimum With GLAB

Lecture 68 Introduction

Section 14: Installing EDR Solution

Lecture 69 Installing EDR Optimum With KES 1

Lecture 70 Installing EDR Optimum With KES 2

Section 15: Investigation & Response

Lecture 71 Working With KSC WEB Console

Lecture 72 Enabling EDR Component VIA KES Policy

Lecture 73 Trying Device Isolation & Files Drop Investigation

Lecture 74 Configuring Execution Prevention

Lecture 75 Running IOC Scan

Systems Engineers,Enterprise Networks Engineers,Network Security Engineers,IT Engineers