Tembo Sacco Plaza, Garden Estate Rd, Nairobi, Kenya
Mon - Sat: 09:00 AM - 05:00 PM

Endpoint Security and Device Protection Training Course

INTRODUCTION

This essential training course provides comprehensive knowledge and practical skills for mastering Endpoint Security and Device Protection. As endpoints – including laptops, desktops, mobile devices, and IoT devices – represent a primary entry point for cyber threats and hold vast amounts of sensitive data, securing them is paramount for organizational resilience. Endpoint Security and Device Protection Training Course equips participants with a systematic understanding of endpoint vulnerabilities, various defense mechanisms, and strategies for implementing robust protection measures. Participants will gain deep insights into deploying anti-malware solutions, managing patches, configuring host-based firewalls, enforcing data encryption, and securing mobile devices, all crucial for safeguarding individual devices and preventing the proliferation of attacks across the network.

This course is designed for IT professionals, system administrators, security analysts, and help desk personnel responsible for the security of an organization's endpoints. It empowers participants to implement effective endpoint security strategies, troubleshoot device-related security issues, and contribute significantly to minimizing the attack surface, thereby enhancing the overall security posture of the organization in a distributed and mobile work environment.

DURATION

10 days

TARGET AUDIENCE

This course is specifically designed for IT and security professionals responsible for the security of endpoints and user devices, including:

  • System Administrators.
  • Desktop Support Technicians.
  • IT Help Desk Personnel.
  • Junior Cybersecurity Analysts.
  • Mobile Device Management (MDM) Specialists.

OBJECTIVES

Upon completion of this course, participants will be able to:

  • Understand the criticality of endpoint security in modern IT environments.
  • Implement effective anti-malware and host-based defense solutions.
  • Master patch management and vulnerability remediation for devices.
  • Securely configure and manage operating systems and applications.
  • Develop and apply strategies for mobile device security and data protection.

MODULES

Module 1: Understanding the Endpoint Landscape and Attack Surface

  • Define endpoints and their role in an organization's IT infrastructure.
  • Discuss the evolving threat landscape targeting endpoints (e.g., ransomware, zero-day exploits, fileless malware).
  • Explore common vulnerabilities in operating systems, applications, and user behavior.
  • Examine the concept of the endpoint as a primary attack vector.
  • Learn about the criticality of securing endpoints in remote and hybrid work environments.

Module 2: Anti-Malware and Endpoint Protection Platforms (EPP)

  • Understand the different types of malware (viruses, worms, trojans, ransomware, spyware).
  • Discuss the principles of antivirus and anti-malware software (signature-based, heuristic, behavioral).
  • Explore the features and deployment of Endpoint Protection Platforms (EPP).
  • Examine the role of cloud-based threat intelligence in EPP solutions.
  • Learn about preventing and responding to malware infections.

Module 3: Host-Based Firewalls and Intrusion Prevention

  • Understand the function and importance of host-based firewalls.
  • Discuss configuring firewall rules to control inbound and outbound traffic.
  • Explore the use of Host-based Intrusion Detection Systems (HIDS) and Host-based Intrusion Prevention Systems (HIPS).
  • Examine techniques for application control and whitelisting/blacklisting.
  • Learn about monitoring host logs for suspicious activity.

Module 4: Patch Management and Vulnerability Remediation

  • Understand the critical importance of patch management for endpoint security.
  • Discuss developing a robust patch management strategy and schedule.
  • Explore tools and processes for automated patching and software updates.
  • Examine vulnerability scanning tools and interpreting their results.
  • Learn about prioritizing and remediating vulnerabilities effectively.

Module 5: Operating System and Application Hardening

  • Understand best practices for hardening operating systems (e.g., Windows, macOS, Linux).
  • Discuss disabling unnecessary services and features.
  • Explore secure configuration baselines and security policies (e.g., Group Policy Objects).
  • Examine the importance of application security and secure coding practices.
  • Learn about limiting user privileges and implementing principle of least privilege.

Module 6: Data Encryption and Data Loss Prevention (DLP) on Endpoints

  • Understand the importance of data encryption for data at rest (e.g., full disk encryption, file-level encryption).
  • Discuss tools and methods for implementing endpoint data encryption.
  • Explore the principles of Data Loss Prevention (DLP) for endpoints.
  • Examine how DLP solutions monitor and prevent sensitive data exfiltration.
  • Learn about secure data storage practices on endpoints and removable media.

Module 7: Mobile Device Security and Management (MDM)

  • Understand the unique security challenges of mobile devices (smartphones, tablets).
  • Discuss the role of Mobile Device Management (MDM) and Enterprise Mobility Management (EMM) solutions.
  • Explore policies for device enrolment, configuration, and remote wipe.
  • Examine secure access to corporate resources from mobile devices.
  • Learn about BYOD (Bring Your Own Device) security considerations.

Module 8: Endpoint Detection and Response (EDR) and Incident Response

  • Understand the capabilities of Endpoint Detection and Response (EDR) solutions.
  • Discuss how EDR goes beyond traditional AV to provide threat hunting and incident investigation.
  • Explore the role of endpoints in the incident response lifecycle.
  • Examine forensic data collection from endpoints during an incident.
  • Learn about isolating compromised endpoints and initiating recovery procedures.

CERTIFICATION

  • Upon successful completion of this training, participants will be issued with Macskills Training and Development Institute Certificate

TRAINING VENUE

  • Training will be held at Macskills Training Centre. We also tailor make the training upon request at different locations across the world.

AIRPORT PICK UP AND ACCOMMODATION

  • Airport pick up and accommodation is arranged upon request

TERMS OF PAYMENT

  • Payment should be made to Macskills Development Institute bank account before the start of the training and receipts sent to info@macskillsdevelopment.com

 

Endpoint Security And Device Protection Training Course
Dates Fees Location Action
16/06/2025 - 27/06/2025 $2,450 Nairobi
07/07/2025 - 18/07/2025 $3,950 Kigali
07/07/2025 - 18/07/2025 $3,950 Kigali
14/07/2025 - 25/07/2025 $2,450 Nairobi
04/08/2025 - 15/08/2025 $3,950 Kigali
11/08/2025 - 22/08/2025 $5,950 Dubai
18/08/2025 - 29/08/2025 $2,450 Nairobi
01/09/2025 - 12/09/2025 $3,950 Kigali
08/09/2025 - 19/09/2025 $2,950 Mombasa
15/09/2025 - 26/09/2025 $2,450 Nairobi
06/10/2025 - 17/10/2025 $3,950 Kigali
13/10/2025 - 24/10/2025 $3,950 Kigali
20/10/2025 - 31/10/2025 $2,450 Nairobi
03/11/2025 - 14/11/2025 $5,950 Instanbul
17/11/2025 - 28/11/2025 $2,450 Nairobi
01/12/2025 - 12/12/2025 $2,450 Nairobi