In This Course Student Will Learn The Main Features Of KSC & KES By Working On Giant Lab Which simulates a real world organization integrated with multiple vendors security solutions. First course will be about kaspersky endpoint security for windows -> First section will be an introduction to KSCand KESvia a mini-book describing all the things will be explained in the labs sections, Second section will be the installation process of both KSCand KESvia local method and remote method, Third section will be about the needed tasks after the installation finsihed, Fourth section will be about configuring the policy and discovering it’s main features, Fifth section will be a quick example of penetration testing using kali linux on our machines have KESinstalled on them, Lastly some reports and monitoring techniques. With this course, student will be able to install KESvia KSC(MMC Console )and configure the proper security rules on firewalls on it’s path which happens in each real world environment. Second course will about kaspersky hybrid cloud security for virtualization. During This Course Student Will Able To Define The Main Features Of Kaspersky Hybrid Cloud Security For Virtualization, See The Main Components Of Solution (Integration Server, Protection Server “SVM” , Light Agent, Network Agent ) , Differentiate Between Light Agent & Agentless. Why We Choose Light Agent! , Install Kaspersky Hybrid Cloud Security For Virtual Environments (KSC, vCenter, Protection Sever, Pushing Light Agent ToWindows Machines ) , Configuring The Main Policies Of SVMAnd Light Agents And See The Main Components And Feature Of Each Policy, Configuring The Main Needed Tasks For Each Application, Comparing Kaspersky Light Agent With Kaspersky Endpoint Security For Windows, What’s The Difference Between Both, Launching A Quick Pen Testing On Our Device Has Kaspersky Light Agent On it And See It Will Defend Against Some Attacks And Malwares and See How To Monitor What Happened From Kaspersky Security Center. Third course will about configuring EDR optimum with KES for windows. During This Course Student will be able to install Kaspersky Endpoint Detection & Response Optimum and dicover it’s main features. Endpoint Protection Platform will be compared to endpoint detection and response and the main advantages of the last will be discovered. Endpoint detection and response optimum is a solution consisting of two main applications (endpoint agent & kaspersky endpoint security “below version 11.6” or kaspersky hybrid cloud or kaspersky for windows server ) .In new versions of kaspersky endpoint security form version 11.7 and above, endpoint agent became part of the platform and user doesn’t have to install both applications seperately and intergrate between them. During this course we will use kaspersky security center “Web console” since we are using EDRand results will not be shown except in web console. We will also see how to install the solution via the two methods ( Change application components OREdit the application settings directly ).Then we will discover all the features of EDRoptimum like discovering all the files, network connections, registery that threat can create on the machine. Responses also will be discussed like (Host isolation; to completely isolate the pc from the network. Execution prevention; to prevent the execution of the threat form begining. IOC Scan; To search for specific md5 hash on other pcs in the network.