Each course is priced at $995 dollars.
Each course is a two-day session: Sunday October 26th - Monday, October 27th
Hours: 9:00 am - 5:00 pm daily
A certification voucher will be included in the takeaways for each student.
Who Should Take These Classes
System and network administrators, security personnel, auditors, and/or consultants concerned with network and system security should take this course. It is recommended that students have a working
knowledge of Microsoft Windows administration, system administration concepts, a basic understanding of computer security concepts, and a general understanding of Internet services.
Attendee Laptop Requirements
Attendees are required to bring a laptop that is capable of connecting to the Internet. Prior to attending a course, the machine/browser must pass the system and network checks at:
We will make every effort to assist however given the limited time frame and instructor resources you will be responsible for troubleshooting your system.
McAfee® ePolicy Orchestrator Security Management Integration Course
McAfee® ePolicy Orchestrator (ePO) provides unified management of endpoint, network, and data security. As the foundation of McAfee Security Management Platform, McAfee ePO provides the framework
to support the interworking of other McAfee products, such as McAfee® Network Security Platform, McAfee® Host Intrusion Prevention, McAfee® Vulnerability Manager to increase visibility, gain efficiencies, and strengthen protection.
At the end of this course, attendees should understand the benefits and capabilities of an integrated McAfee Security Management solution and have the capability to integrate McAfee ePolicy Orchestrator and selected network security end
endpoint products to optimize and gain higher levels of security across the network.
Prior experience using the McAfee® ePolicy Orchestrator and McAfee® Network Security Platform is strongly recommended.
McAfee® Network Data Loss Prevention, McAfee® Next Generation Firewall Administration, McAfee® Security Information and Event Management, and McAfee® Security Operations Center administration are beyond the scope of this course.
McAfee Network Data Loss Prevention Administration Course
- McAfee ePolicy Orchestrator and McAfee Vulnerability Manager integration
- McAfee Network Security Platform and McAfee Vulnerability Manager Integration
- McAfee ePolicy Orchestrator and McAfee Network Security Platform Integration
- McAfee Advanced Threat Defense Integration (overview)
McAfee® Network Data Loss Prevention protects against data loss by ensuring that data only leaves the network when appropriate — whether through email, webmail, instant messenger, wikis, blogs, portals, HTTP/HTTPS, or
FTP transfers. If a policy violation is detected, you can (at your choice), encrypt, redirect, quarantine, or even block the data transmission in question. This supports compliance with privacy regulations and reduces
the likelihood of data breaches, while enabling legitimate data use.
At the end of this course, attendees should under-stand the capabilities of the McAfee NDLP product and have the ability to configure McAfee NDLP Manager, Prevent, Discover, and Monitor in a production environment. Students
will also learn how to customize policy, generate reports and optimize their data loss prevention environment.
McAfee® ePolicy Orchestrator, McAfee® Next Generation Firewall, McAfee® Security Information and Event Management, and McAfee® Security Operations Center administration are beyond the scope of this course.
McAfee Next Generation Firewall Administration Course
- Administration of McAfee Network Data Loss Prevention appliances
- Case-based policy configuration
- Incident management and case workflow
- Policy tuning and best practices
McAfee® Next Generation Firewall (NGFW) delivers complete, centrally managed network security with high availability, multitenancy, advanced evasion protection, application control, and flexible deployment options,
including software, physical, and virtual firewall appliances.
At the end of this course, attendees should know the benefits of McAfee Next Generation Firewall; understand the skills needed to successfully plan, design, and implement McAfee Next Generation Firewall following McAfee
Professional Services methodology; and be capable of installing and configuring the appliance within their own environment.
Prior experience using McAfee® Next Generation Firewall (NGFW) or other firewall technologies strongly recommended.
McAfee® ePolicy Orchestrator, McAfee® Network Data Loss Prevention, McAfee® Security Information and Event Management, and McAfee® Security Operations Center administration are beyond the scope of this course.
McAfee® Security Information and Event Management (SIEM) Administration I Course
- McAfee Next Generation Firewall overview
- Log management
- Monitoring, statistics, and reporting
At the end of this course, attendees should understand how to implement the Security Information and Event Management (SIEM) appliances in a workflow suitable to their enterprise environment; understand the
skills needed to successfully operate McAfee SIEM following McAfee Professional Services methodology; and be capable of configuring the appliances within their own environment.
McAfee® Security Operations Center Administration I Course
- Security Information and Event Management Overview
- Enterprise Security Manager (ESM)
- Enterprise Log Manager (ELM)
- Advanced Correlation Engine (ACE)
- Application Data Monitor (ADM)
- Database Event Monitor (DEM)
- Data sources
- Policy Editor
- Alarms, watch lists, and reporting
- ESMI Views
At the end of this course, attendees should state the role and components of a SOC and understand the best implementations for a SOC in any organization.
- Introduction to Security Operations Center (SOC) operations
- Security Operations Center manual and procedures
- Security Operations Center functional and operational roles
- Operational risks
- Network architecture
- Using collected network data
- Incident response lifecycle
- Detecting Signs of an incident
- Incident priority and severity
- Containment and escalation
- Incident recovery, eradication and resolution
- Communication during the incident recovery process
- Incident recovery checklists and drills