Menu Icon

Available Training Rooms


Course Details

  • Course Overview
  • Skills Gained
  • Who Can Benefit
  • Prerequisites
  • Syllabus

The Symantec Endpoint Protection 12.1: Administration course is designed for the network, IT security, and systems administration professional tasked with architecting, implementing, and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. This class covers how to design, deploy, install, configure, manage, and monitor Symantec Endpoint Protection 12.1 (SEP 12.1). Students learn how to create and implement the client firewall, intrusion prevent ion, application and device control, and behavioral protection policies that guard the enterprise from viruses and hackers. In addition, students learn how to perform server and database management, expand the management environment , use virtualization features for virtual clients, and interface the Symantec Endpoint Protect ion Manager with Protection Center.

Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy.
Install and configure Symantec Endpoint Protection management and client components.
Deploy Symantec Endpoint Protection clients.
Manage the client user interface.
Manage product content updates.
Design a Symantec Endpoint Protection environment.
Manage Virus and Spyware Protection policies.
Manage SONAR scans.
Manage Firewall and Intrusion Prevention policies.
Manage Application and Device Control policies.
Manage virtualized clients.
Configure replication and load balancing.
Monitor and maintain the Symantec Endpoint Protection environment.
Interface the Symantec Endpoint Protection Manager with Protection Center.
Who Can Benefit
This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants w ho are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment.
You must have working knowledge of advanced computer terminology, including TCP/ IP networking terms and Internet terms, and an administrator-level know ledge of Microsoft Windows 2000/XP/2003 operating systems.


Course overview
The classroom lab environment

Symantec Endpoint Protection Product Solution

Why use Symantec Endpoint Protection?
Symantec Endpoint Protection technologies
Symantec Endpoint Protection services
Symantec Endpoint Protection components
Symantec Endpoint Protection policies and concepts
Symantec Endpoint Protection product tiers

Installing Symantec Endpoint Protection

Identifying system requirements
Preparing servers for installation
Installing and configuring the Symantec Endpoint Protection Manager
Describing Symantec Endpoint Protection migration and version compatibility

Configuring the Symantec Endpoint Protection Environment

Starting and navigating the SEPM
Describing policy types and components
Console authentication
Licensing the SEP environment

Deploying Clients

Client requirements and deployment methods
Preparing for client deployment
Client installation packages, settings, and features
Installing managed clients
Configuring an unmanaged detector
Upgrading Symantec Endpoint Protection clients

Client and Policy Management

Describing SEPM and client communications
Administering clients
Configuring groups
Configuring locations
Active Directory integration with SEP 12.1
Client configuration modes
Configuring domains
General client settings and Tamper Protection

Configuring Content Updates

Introducing LiveUpdate
Configuring the SEPM for LiveUpdate
Configuring the LiveUpdate Settings and Content policies
Configuring multiple group update providers (GUPs)
Manually updating virus definitions

Designing a Symantec Endpoint Environment

Architecture and sizing considerations
Designing the architecture
Determining client-to-SEPM ratios
Content distribution methods
SEPM and database sizing
Completing the deployment

Introducing Antivirus, Insight, and SONAR

Virus and spyware protection needs and solutions
Reputation and Insight
Administrator-defined scans
Download Insight
Included Virus and Spyware Protection policies

Managing Virus and Spyware Protection Policies

Configuring administrator-defined scans
Configuring protection technology settings and scans
Configuring e-mail scans
Configuring advanced options
Configuring Mac client detection
Managing scanned clients
Configuring Mac Virus and Spyware Protect ion policy settings

Managing Exception Policies

Exceptions and exclusions
Configuring the Exceptions policy

Introducing Network Threat Protection and Application and Device Control

Network threat protection basics
The firewall
Intrusion prevention
Application access protection

Managing Firewall Policies

Firewall policy overview
Defining rule components
Modifying firewall rules
Configuring built- in rules
Configuring protect ion and stealth settings
Configuring Windows integration settings

Managing Intrusion Prevention Policies

Configuring intrusion prevention
Managing custom signatures

Managing Application and Device Control Policies

Creating application and device control policies
Defining application control
Modifying policy rules
Defining device control

Customizing Network Threat Protection and Application and Device Control

Tools for customizing network threat protection
Managing policy components
Configuring learned applications
Configuring system lockdown


Introducing virtualization features
Virtual image exception
Shared Insight Cache
Virtual client tagging
Off line image scanner

Configuring Replication and Failover and Load Balancing

About sites and replication
How replication works
Symantec Endpoint Protection replication scenarios
Configuring replication
Failover and load balancing

Performing Server and Database Management

Managing SEPM servers
Maintaining server security
Communicating with other servers
Managing administrators
Managing the database
Disaster recovery techniques

Advanced Monitoring and Reporting

Monitoring the Home and Monitors page
Analyzing and managing logs
Configuring and viewing notifications
Creating and reviewing reports
Introducing IT Analytics

Interfacing the SEPM with Protection Center

Describing Protection Center
Describing the Protection Center appliance
Configuring Protection Center
Using Protection Center


  • Security Administrators
  • Systems Engineers
  • Network Managers
  • System Administrators

Public Program Schedule

Course Name Duration Brochure Location Schedule Enroll
There is no upcoming Public Batch Schedule, you can ask for Private Batch or for On-Demand Learning

Download the syllabus


The highest standard, The happiest learners

Our Enterprise Clients


  • What is the Symantec Certification Program?
  • What is the benefit of becoming Symantec Certified?
  • How does a live-online class differ from a standard classroom delivery ?
  • What time do classes begin ?
  • Who will be my trainer?
  • How do I pay?
  • What are your cancellation & refund policy?

The Symantec Certification Program provides rigorous, objective assessments of Symantec technical expertise through securely proctored, computer-based, multiple-choice exams (based on real-world job tasks). The program validates the skills and technical competencies necessary for Symantec professionals to efficiently implement, administer, and maintain their data protection, high availability, and security environments utilizing Symantec solutions. Successful completion of the programs’ current requirements will result in the achievement and reward of either a Symantec Certified Specialist (SCS) or Symantec Certified Professional (SCP) certificate.

Symantec certified candidates and their companies have the ability to gain industry recognition, competitive differentiation, greater productivity & results, increased user community satisfaction, and a tangible measure of their education investment. Did you know that 76% of candidates and recruiters verified that Symantec Certification was discussed as part of the hiring process? Certification can open the door to increased visibility, better opportunities and new jobs in your industry. In today’s highly competitive environment, certification differentiates you as a professional who is serious about applied learning, making you an asset to a prospective employer. Read about the benefits of Certification for an Individual and Employer.

Our live online classes are conducted in the same manner as our classroom classes, using the same manuals and lab equipment. Just as in our classroom classes, each online student is assigned a set of remote lab equipment including an ESXi host and various pre-configured Virtual machines, as the specific class they are attending requires. The students connect to the lab environment using Microsoft’s Remote Display Protocol (RDP) in order to perform the lab exercises. The vast majority of our online students find the class experience equivalent to or better than a classroom delivered class.

All our trainers are Symantec Certified Instructors. Our representative will share trainer profile once you start talking to our team.

We accept all modes of payment. If you are being nominated by your organization, your organization need to release PO before the course start date. If you are an individual you can pay through credit / debit cards, online transfer (RTGS/NEFT) to our account 7 days prior to the course start date.

  • In a highly unlikely event of cancellation of batch from our end, we shall refund 100% that is paid by you. If client choose to cancel for any reasons, below is the terms.
  • If you cancel or reschedule your registration 5 or more calendar days before the scheduled start date of the class – No cancellation charges
  • If you cancel or reschedule your registration less than 5 calendar days before the scheduled start date of the class – cancellation charges 100% of the course fee
  • If you do not show up for the event, or cancel on the day of the event - cancellation charges 100% of the course fee

Other Related Courses

Related courses will be updated soon...