Menu Icon

Available Training Rooms


Course Details

  • Course Overview
  • Skills Gained
  • Who Can Benefit
  • Prerequisites
  • Syllabus

Build boot packages that can be used to create and restore images, connect to a multicast server, or boot to DOS.
Manually create and restore images using the DOSbased graphical user interfaces for both Ghost and DeployCenter.
Apply best practices for creating a master image file to deploy systems across a network.
Use the multicasting technologies included in the Ghost Solution Suite to deploy images to systems across a network.
Use Ghost's command line interface and DeployCenter's scripting language to automate
image creation and restoration processes.
Use the Ghost Console to organize and manage client computers.
Capture user profile settings from a computer and restore them to the same computer or to another computer.
Use Ghost AutoInstall to capture changes made on a single Windows computer, and then use the Ghost Console to quickly deploy these changes to other
machines across a network.
Collect information from machines managed by the Ghost Console and use this information to generate software and hardware inventory reports so you can target specific machine configurations for tasks.
Use the GDisk utility included with Symantec Ghost to assist you in retiring aging systems.
Who Can Benefit
This course is for network and system administrators, IT managers, IT support personnel, and other network operations staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware configuration tasks for computers, and retiring outdated computers.
You should have working knowledge of network topology, TCP/IP networking, basic network administration; and a conceptual understanding of network design and best practices.
Overview of Endpoint Lifecycle Management

  • Introduction to Endpoint Lifecycle Management
  • Phases of Endpoint Lifecycle Management
  • ELM Business Objectives and Goals
  • ELM Solution Mapping to Business Objectives
  • Ghost Solution Suite 3.0 Product Overview
  • Implementation Assessment

ELM Requirements Gathering
  • Solution Analysis of ELM Requirements
  • Implementation Design

GSS 3.0 Technical Overview
  • Installation Options and Prerequisites
  • Defining the Solution Infrastructure
  • Defining the ELM Solution Configuration
  • Installation and Configuration of the ELM Solution

Base Software Installation
  • Navigating the Console
  • Core & Solution Configuration
  • Driver Management
  • Pre-boot Environment
  • Endpoint Identification & Gathering

IT Requirements Overview
  • Analyzing and Defining IT Requirements
  • Using ELM to Forecast IT Requirements
  • Endpoint Configuration Standards

Endpoint Standards Overview
Defining Endpoint Standards
  • Implementation of Endpoint Standards
  • Endpoint Provisioning

Endpoint Provisioning Overview
  • Standard Build and Image Methodology
  • Software Compatibility Analysis
  • Software Packaging requirements for use in the ELM Solution
  • Software Quality Assurance Methodology
  • Endpoint Deployment & Staging

Endpoint Lifecycle Automation
  • Endpoint Lifecycle Automation Scenario Exercise
  • Backup and restore
  • Automating the backup of a computer image
  • Scripted OS Installation
  • Capturing an image for deployment
  • Automating the creation of a master image
  • Automating the deployment of computer images
  • Software Distribution

Software Delivery Methods
  • Software Installation Methods
  • Understanding Software Delivery
  • Reporting and Analysis of Software Distribution Tasks
  • Image and Build Maintenance

Image maintenance overview
  • Restoring a computer image
  • Capturing the updated image
  • Updating Jobs
  • Managing Software Upgrades

Software Upgrade Process Overview
  • Distribution of Software Updates
  • Supporting the Business

Ensuring Business Continuity in an ELM System
  • Endpoint Restoration/Recovery
  • Managing Service Support Activities
  • Endpoint Monitoring & Alerting
  • Endpoint Configuration & Maintenance
  • Automating Problem Resolution
  • Application Self-Healing
  • Desired State Management
  • Hardware Refresh & Migration

Hardware Refresh & Migration Process Overview
  • Personality Capture and Restore
  • Gathering Current State Inventory for Requirements and Planning Activities
  • Performing Data capture and storage activities
  • Gathering User state or PC personality information
  • Automating the Migration Process
  • Endpoint Retirement/Disposal

Ensuring Compliant Disposal Methods and Procedures
  • End to End Endpoint Lifecycle Use Case

Endpoint Management Lifecycle Use Case for GSS


  • IT Managers
  • Network Administrator
  • System Administrators

Public Program Schedule

Course Name Duration Brochure Location Schedule Enroll
There is no upcoming Public Batch Schedule, you can ask for Private Batch or for On-Demand Learning

Download the syllabus


The highest standard, The happiest learners

Our Enterprise Clients


  • What is the Symantec Certification Program?
  • What is the benefit of becoming Symantec Certified?
  • How does a live-online class differ from a standard classroom delivery ?
  • What time do classes begin ?
  • Who will be my trainer?
  • How do I pay?
  • What are your cancellation & refund policy?

The Symantec Certification Program provides rigorous, objective assessments of Symantec technical expertise through securely proctored, computer-based, multiple-choice exams (based on real-world job tasks). The program validates the skills and technical competencies necessary for Symantec professionals to efficiently implement, administer, and maintain their data protection, high availability, and security environments utilizing Symantec solutions. Successful completion of the programs’ current requirements will result in the achievement and reward of either a Symantec Certified Specialist (SCS) or Symantec Certified Professional (SCP) certificate.

Symantec certified candidates and their companies have the ability to gain industry recognition, competitive differentiation, greater productivity & results, increased user community satisfaction, and a tangible measure of their education investment. Did you know that 76% of candidates and recruiters verified that Symantec Certification was discussed as part of the hiring process? Certification can open the door to increased visibility, better opportunities and new jobs in your industry. In today’s highly competitive environment, certification differentiates you as a professional who is serious about applied learning, making you an asset to a prospective employer. Read about the benefits of Certification for an Individual and Employer.

Our live online classes are conducted in the same manner as our classroom classes, using the same manuals and lab equipment. Just as in our classroom classes, each online student is assigned a set of remote lab equipment including an ESXi host and various pre-configured Virtual machines, as the specific class they are attending requires. The students connect to the lab environment using Microsoft’s Remote Display Protocol (RDP) in order to perform the lab exercises. The vast majority of our online students find the class experience equivalent to or better than a classroom delivered class.

All our trainers are Symantec Certified Instructors. Our representative will share trainer profile once you start talking to our team.

We accept all modes of payment. If you are being nominated by your organization, your organization need to release PO before the course start date. If you are an individual you can pay through credit / debit cards, online transfer (RTGS/NEFT) to our account 7 days prior to the course start date.

  • In a highly unlikely event of cancellation of batch from our end, we shall refund 100% that is paid by you. If client choose to cancel for any reasons, below is the terms.
  • If you cancel or reschedule your registration 5 or more calendar days before the scheduled start date of the class – No cancellation charges
  • If you cancel or reschedule your registration less than 5 calendar days before the scheduled start date of the class – cancellation charges 100% of the course fee
  • If you do not show up for the event, or cancel on the day of the event - cancellation charges 100% of the course fee

Other Related Courses

Related courses will be updated soon...