- Cryptography Essentials
• Cryptography defined
• Caesar cipher
• Symmetric-Key cryptography
• Public-Key cryptography
• Symantec Public-Key cryptography
• Digital signatures
• Trust Models
• Keys and key signatures
• Passphrases
• Certificates - Symantec Encryption Product Introduction
• Symantec Encryption Security products
• Symantec Encryption Management Server
• Symantec Encryption Desktop
• Symantec Encryption Command Line
• Symantec Encryption Mobile
• Symantec Encryption iOS Viewer - Installing Symantec Encryption Management Server
• Symantec Encryption Management Server installation steps
• System requirements
• Installing Symantec Encryption Management Server
• Configuring the Symantec Encryption Management Server
• Installing updates and upgrading the Encryption Server Lab: Post installation tasks - Consumers and Groups
• Introducing consumers, users and devices
• Introducing groups and policy
• Lab: Creating groups and users - Administrative Keys
• The Organization Key
• Additional Decryption Key (ADK)
• SSL/TLS and X.509 Certificates
• Ignition key
• Lab: Manage administrative keys - Server Messaging
• Learn mode
• Mail proxies
• Server placement
• Mail flow - Monitoring and Reporting
• Server monitoring and logging
• Protecting your Symantec Encryption Management Server
• Lab: Create a backup and review logs and daily status email - Mail Policy
• Definition of policy chains and rules
• Rule conditions, actions, and key searches
• Default policy chains
• Adding custom chains to mail flow
• Adding custom chains to mail flow
• Custom chains and rules
• Lab: Manage mail flow and work with mail policies - Key Not Found
• External users
• Key Not Found and direct actions
- Web Email Protection
• Introducing Web Messenger
• Configuring Web Messenger
• Out of Mail Stream
• X.509 Delivery
• External delivery options
• Lab: Configure and work with Web Email protection
- Preparing SEMS for Encryption Desktop Clients
• What is directory synchronization
• How to use directory synchronization
- Keys
• Managed key configuration
• Key usage and tokens
- Configuring Client Enrollment
• Definition of enrollment
• Methods of client enrollment
• Lab: Configuring client enrollment - Installing Symantec Encryption Desktop
• System requirements
• Symantec Encryption Desktop installer
• Licensing Symantec Encryption Desktop
• Modifying the Symantec Encryption Desktop
• Lab: Download and install Symantec Encryption Desktop - Create General Policy Settings
• General Symantec Encryption Desktop options in Consumer Policy
• Updating policy settings - Symantec Encryption Desktop Messaging
• How Symantec Encryption Desktop affects messaging infrastructure
• MAPI buttons - Configuring Symantec Encryption Whole Disk Encryption
• What is Whole Disk Encryption
• Configuring Whole Disk Encryption
• Symantec Encryption Whole Disk Encryption for Mac OS X
• Symantec Encryption Whole Disk Encryption for Linux
• Lab: Configure Whole Disk Encryption - Symantec Encryption Whole Disk Encryption Management and Recovery
• Logon failure and reporting
• The WDE-ADMIN group
• The pgpwde command-line tool
• Recovery options
• Remote Disable and Destroy
• Configuring Remote Disable and Destroy
• Lab: Recover hard drive manually - Configuring Symantec Encryption NetShare
• Encrypted folder creation
• How to configure Symantec Encryption Netshare
• Symantec Encryption NetShare Group Key
• Active Directory Group integration
• Miscellaneous information about Symantec Encryption NetShare
• Lab: Configure Symantec Encryption Netshare - Other Symantec Encryption Desktop Features
• Symantec Encryption Zip file and folder protection
• Symantec Encryption Shredder
• Shred Free Space
• Symantec Encryption Portable
• Lab: Create and use a virtual disk. Use Symantec Encryption Zip and Symantec Encryption Shredder - Clustering
• How Symantec Encryption Management Server Clustering works
• Using the DMZ Clustering Zone
• Cluster failover
• Web Messenger inbox replication Lab: Configure a cluster