Describe how SES Complete blocks Command & Control communication/ Describe how SES Complete prevents threat execution
Describe the various methods for enrolling SES endpoint agents/ Introduction to Symantec Endpoint Security Complete
Describe SES Complete content update types and how they are distributed to endpoints/ Describe the requirements to enable Endpoint
Describe the incident lifecycle and steps required to identify a threat/ Describe the benefits of SES Complete Cloud-based management
Understand how Sites and Replication are impacted in a Hybrid environment/ Understand the Threat landscape and the MITRE ATT&CK Framework
Describe how SES Complete's mobile technologies protection against malicious networks/ Understand how policies are used to protect endpoint devices
Describe how Threat Defense for Active Directory protects against misconfigurations and vulnerabilites in an environment/ Describe how SES Complete works to block data exfiltration
Describe the SES Complete policy and device groups and how they are used/ Describe how to use ICDm to configure administrative reports
Describe how the SES Complete Heatmap can be used to prevent unwanted application behaviors/ Describe the requirements to enable Network Integrity in the ICDm management console
Describe how Threat Defense for Active Directory is used to identify threats/ Describe how SES Complete can be used in preventing an attacker from accessing the environment
Describe how EDR assists in identifying suspicious and malicious activity/ Describe how EDR can be used to block and quarantine suspicious files
Describe the process for policy migration from SEPM to the ICDm console/ Understand how ICDm is used to identify threats in the environment
Describe the configuration and use of the Endpoint Activity Recorder/ Describe the ways in which ICDm can be used to remediate threats
Describe how to use EDR to retrieve and submit files for analysis/ Describe how EDR can be used to quarantine endpoint devices
Describe the requirements for Threat Defense for Active Directory Installation and Configuration/ Describe how SES Complete's mobile technologies protection against malicious apps