1. Home
  2. Broadcom
  3. 250-561 Exam Syllabus

Broadcom 250-561 Exam Syllabus

Start Free 250-561 Exam Practice After Reviewing the Topics

Before starting your 250-561 exam preparation, it is recommended to review the complete Broadcom Endpoint Security Complete - R1 Technical Specialist exam syllabus and carefully go through the exam objectives listed below. Once you understand the exam structure and objectives, you should practice using our free 250-561 questions. We also provide premium 250-561 practice test, fully updated according to the latest exam objectives, to help you accurately assess your preparedness for the actual exam.

Broadcom 250-561 Exam Objectives

Section Objectives
Introduction to Symantec Endpoint Security Complete
  • Understand SES Complete Architecture.
  • Describe the benefits of SES Complete Cloud-based management.
  • Describe the various methods for enrolling SES endpoint agents.
Configuring SES Complete Security Controls
  • Understand how policies are used to protect endpoint devices.
  • Understand the Threat landscape and the MITRE ATT&CK Framework.
  • Describe how SES Complete can be used in preventing an attacker from accessing the environment.
  • Describe how SES Complete prevents threat execution.
  • Describe how SES Complete prevents threat persistence.
  • Describe how SES Complete prevents privilege escalation.
  • Describe how SES Complete prevents defense evasion.
  • Describe how SES Complete prevents device discovery.
  • Describe how SES Complete blocks Command & Control communication.
  • Describe how SES Complete works to block data exfiltration.
  • Describe SES Complete content update types and how they are distributed to endpoints.
  • Describe SES Complete policy versioning and its use.
Responding to Threats with ICDm
  • Describe the ICDm security control dashboards and their use.
  • Understand how ICDm is used to identify threats in the environment.
  • Describe the incident lifecycle and steps required to identify a threat.
  • Describe the ways in which ICDm can be used to remediate threats.
  • Describe how to use ICDm to configure administrative reports.
Endpoint Detection and Response
  • Describe the requirements to enable Endpoint
  • Detection and Response in the ICDm management console.
  • Describe how EDR assists in identifying suspicious and malicious activity.
  • Describe how EDR aids in investigating potential threats.
  • Describe the configuration and use of the Endpoint Activity Recorder.
  • Understand the use of LiveShell for incident response.
  • Describe how to use EDR to retrieve and submit files for analysis.
  • Describe how EDR can be used to quarantine endpoint devices.
  • Describe how EDR can be used to block and quarantine suspicious files.
Attack Surface Reduction
  • Describe Behavior Prevalence the use of the SES Complete Behavioral Insights and Policy Tuning Widget.
  • Describe how the SES Complete Heatmap can be used to prevent unwanted application behaviors.
  • Describe SES Complete policy adaptations and behavioral tuning.
  • Describe the SES Complete policy and device groups and how they are used.
  • Describe the requirements to enable App Control in the ICDm management console.
  • Describe the process of monitoring drift to further tune App Control policies.
Mobile and Modern device security
  • Describe the requirements to enable Network Integrity in the ICDm management console.
  • Describe Network Integrity Policy Configuration and it's use.
  • Describe how Network Integrity works to remediate threats.
  • Describe how SES Complete's mobile technologies protection against malicious apps.
  • Describe how SES Complete's mobile technologies protection against malicious networks.
Threat Defense for Active Directory
  • Describe the requirements for Threat Defense for Active Directory Installation and Configuration.
  • Describe the Threat Defense Active Directory policy and it's use.
  • Describe how Threat Defense for Active Directory is used to identify threats.
  • Describe how Threat Defense for Active Directory protects against misconfigurations and vulnerabilites in an environment.
Working with a Hybrid Environment
  • Describe the process for policy migration from SEPM to the ICDm console.
  • Describe policy precedence in a hybrid configuration.
  • Understand how Sites and Replication are impacted in a Hybrid environment.
  • Describe the requirements and process for SEPM integration with the ICDm platform used in a SES Complete Hybrid architecture.
Official Information https://www.broadcom.com/support/education/software/certification/all-exams/exam-251-250-561