Overview of McAfee Education Services Security Training Offered At FOCUS 14

Course Information

Each course is priced at $995 dollars.

Each course is a two-day session: Sunday October 26th - Monday, October 27th
Hours: 9:00 am - 5:00 pm daily


A certification voucher will be included in the takeaways for each student.

Who Should Take These Classes

System and network administrators, security personnel, auditors, and/or consultants concerned with network and system security should take this course. It is recommended that students have a working knowledge of Microsoft Windows administration, system administration concepts, a basic understanding of computer security concepts, and a general understanding of Internet services.

IMPORTANT: Attendee Laptop Requirements

Attendees are required to bring a laptop that is capable of connecting to the Internet. Prior to attending a course, the machine/browser must pass the system and network checks at:
http://truelab.hatsize.com/syscheck/syscheck.php

We will make every effort to assist however given the limited time frame and instructor resources you will be responsible for troubleshooting your system.

Course Descriptions

McAfee® ePolicy Orchestrator Security Management Integration Course

What You Will Learn
McAfee® ePolicy Orchestrator (ePO) provides unified management of endpoint, network, and data security. As the foundation of McAfee Security Management Platform, McAfee ePO provides the framework to support the interworking of other McAfee products, such as McAfee® Network Security Platform, McAfee® Host Intrusion Prevention, McAfee® Vulnerability Manager to increase visibility, gain efficiencies, and strengthen protection.

At the end of this course, attendees should understand the benefits and capabilities of an integrated McAfee Security Management solution and have the capability to integrate McAfee ePolicy Orchestrator and selected network security end endpoint products to optimize and gain higher levels of security across the network.

Important:
Prior experience using the McAfee® ePolicy Orchestrator and McAfee® Network Security Platform is strongly recommended.

McAfee® Network Data Loss Prevention, McAfee® Next Generation Firewall Administration, McAfee® Security Information and Event Management, and McAfee® Security Operations Center administration are beyond the scope of this course.

Highlights
  • McAfee ePolicy Orchestrator and McAfee Vulnerability Manager integration
  • McAfee Network Security Platform and McAfee Vulnerability Manager Integration
  • McAfee ePolicy Orchestrator and McAfee Network Security Platform Integration
  • McAfee Advanced Threat Defense Integration (overview)

McAfee Network Data Loss Prevention Administration Course

What You Will Learn
McAfee® Network Data Loss Prevention protects against data loss by ensuring that data only leaves the network when appropriate — whether through email, webmail, instant messenger, wikis, blogs, portals, HTTP/HTTPS, or FTP transfers. If a policy violation is detected, you can (at your choice), encrypt, redirect, quarantine, or even block the data transmission in question. This supports compliance with privacy regulations and reduces the likelihood of data breaches, while enabling legitimate data use.

At the end of this course, attendees should under-stand the capabilities of the McAfee NDLP product and have the ability to configure McAfee NDLP Manager, Prevent, Discover, and Monitor in a production environment. Students will also learn how to customize policy, generate reports and optimize their data loss prevention environment.

Important:
McAfee® ePolicy Orchestrator, McAfee® Next Generation Firewall, McAfee® Security Information and Event Management, and McAfee® Security Operations Center administration are beyond the scope of this course.

Highlights
  • Administration of McAfee Network Data Loss Prevention appliances
  • Case-based policy configuration
  • Incident management and case workflow
  • Policy tuning and best practices

McAfee Next Generation Firewall Administration Course

What You Will Learn
McAfee® Next Generation Firewall (NGFW) delivers complete, centrally managed network security with high availability, multitenancy, advanced evasion protection, application control, and flexible deployment options, including software, physical, and virtual firewall appliances.

At the end of this course, attendees should know the benefits of McAfee Next Generation Firewall; understand the skills needed to successfully plan, design, and implement McAfee Next Generation Firewall following McAfee Professional Services methodology; and be capable of installing and configuring the appliance within their own environment.

Important:
Prior experience using McAfee® Next Generation Firewall (NGFW) or other firewall technologies strongly recommended.

McAfee® ePolicy Orchestrator, McAfee® Network Data Loss Prevention, McAfee® Security Information and Event Management, and McAfee® Security Operations Center administration are beyond the scope of this course.

Highlights
  • McAfee Next Generation Firewall overview
  • Administration
  • Log management
  • Policies
  • Monitoring, statistics, and reporting

McAfee® Security Information and Event Management (SIEM) Administration I Course

What You Will Learn
At the end of this course, attendees should understand how to implement the Security Information and Event Management (SIEM) appliances in a workflow suitable to their enterprise environment; understand the skills needed to successfully operate McAfee SIEM following McAfee Professional Services methodology; and be capable of configuring the appliances within their own environment.

Highlights
  • Security Information and Event Management Overview
    • Enterprise Security Manager (ESM)
    • Receiver
    • Enterprise Log Manager (ELM)
    • Advanced Correlation Engine (ACE)
    • Application Data Monitor (ADM)
    • Database Event Monitor (DEM)
  • Data sources
  • Aggregation
  • Correlation
  • Policy Editor
  • Alarms, watch lists, and reporting
  • ESMI Views

McAfee® Security Operations Center Administration I Course

What You Will Learn
At the end of this course, attendees should state the role and components of a SOC and understand the best implementations for a SOC in any organization.

Highlights
  • Introduction to Security Operations Center (SOC) operations
  • Security Operations Center manual and procedures
  • Security Operations Center functional and operational roles
  • Operational risks
  • Services
  • Network architecture
  • Using collected network data
  • Incident response lifecycle
  • Detecting Signs of an incident
  • Incident priority and severity
  • Containment and escalation
  • Incident recovery, eradication and resolution
  • Communication during the incident recovery process
  • Incident recovery checklists and drills

Sign up for email event
information and reminders
DESTINATION
The Venetian and the Palazzo
Congress Center, Las Vegas