Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:


IBM Endpoint Manager 9.2 Security and Compliance Fundamentals

IBM Course Code: TOD16G

GK# 720750 Vendor# TOD16G

Course Overview


Learn how to use IBM Endpoint Manager 9.2 for Security and Compliance in your enterprise. Learn how to administer the Security and Compliance Management, work with reports in Security and Compliance Analytics version 1.5, and work with the Client Manager for Endpoint Protection application.

What You'll Learn

  • Discover how IBM Endpoint Manger 9.2 for Security and Compliance can provide major benefits to your corporate IT security program
  • Work with the checklists of Security Compliance Management to assess and manage the configurations of desktops, notebooks, and servers, and enforce security policies
  • Administer Security and Compliance Analytics, work with exceptions, and produce standard and custom reports
  • Manage endpoint security clients from different vendors from a common console in Client Manager for Endpoint Protection


Viewing outline for:

Self-Paced Outline

  • IBM Endpoint Manager 9.2 for Security and Compliance Overview
    • Security Compliance Management
    • Additional components within the IBM Endpoint Manager Security Configuration Domain
  • Security Configuration Management
    • Security Configuration Management Setup
    • Using checks and checklists
    • Custom checklists
    • Security Content Automation Protocol (SCAP)
  • IBM Endpoint Manager 9.2 for Security and Compliance Analytics
    • Overview
    • General usage concepts
    • Security and Compliance Analytics Reports
    • Management Tasks
    • Exceptions
  • Client Management for Endpoint Protection
    • Antivirus support
    • Device Control

Who Should Attend


This intermediate-level course is for implementers, administrators, and users of IBM Endpoint Manager for Software Configuration Management and Security Compliance Analytics.

Course Delivery

This course is available in the following formats:


On-demand content enables you to train on your own schedule.

Request this course in a different delivery format.