Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

GLAB - Kaspersky Bootcamp ( 3- EDR Optimum )

Posted By: ELK1nG
GLAB - Kaspersky Bootcamp ( 3- EDR Optimum )

GLAB - Kaspersky Bootcamp ( 3- EDR Optimum )
Last Updated 07/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 8 lectures (1h 59m) | Size: 1.23 GB

( Endpoint Security ) Kaspersky Endpoint Detection And Response Optimum Installed And Configured

What you'll learn
Comparing Between EPP & EDR Solutions And What Are Main Advantages Of EDR Over EPP
Differentiate Between Version Of Kaspersky KES With EDR Optimum , How To Install Each
Working With Kaspersky Web Console And Investigate Incident Cards With EDR Optimum
Perform Host Isolation , Execution Prevention , Analysis Of Files , Network Connections And IOC Scans

Requirements
- Systems Basics
- Networks Basics
- Security Basics

Description
- During This Course Student will be able to install Kaspersky Endpoint Detection & Response Optimum and dicover it's main features .

- Endpoint Protection Platform will be compared to endpoint detection and response and the main advantages of the last will be discovered .

- Endpoint detection and response optimum is a solution consisting of two main applications ( endpoint agent & kaspersky endpoint security "below version 11.6" or kaspersky hybrid cloud or kaspersky for windows server ) .

- In new versions of kaspersky endpoint security form version 11.7 and above , endpoint agent became part of the platform and user doesn't have to install both applications seperately and intergrate between them .

- During this course we will use kaspersky security center "Web console" since we are using EDR and results will not be shown except in web console .

- We will also see how to install the solution via the two methods ( Change application components OR Edit the application settings directly ) .

- Then we will discover all the features of EDR optimum like discovering all the files , network connections , registery that threat can create on the machine .

- Responses also will be discussed like ( Host isolation ; to completely isolate the pc from the network .. Execution prevention ;to prevent the execution of the threat form begining .. IOC Scan ; To search for specific md5 hash on other pcs in the network ..

Who this course is for
Network Security Engineers
System Administrators
IT Administrators