Kaspersky Endpoint Security and Management: Systems Management (KL 009.10)

This advanced course (Day 2/3) is intended for Microsoft Windows network administrators who either have experience with Kaspersky Security Center and Kaspersky Endpoint Security for Windows or attended the KL 002.10 course.


Certified Training Course




Price available on request due to exchange rate fluctuations

SATV Redeemable 


Delivery Method

Classroom-based, Instructor-led with emphasis on hands-on exercises. Every student does laboratory work independently on a separate set of virtual machines.


1 day

Start time: 09:00 (Registration will commence at 08:30 on the first day)


To be able to master the course and efficiently fulfill the laboratory work, a learner must have the following knowledge and skills before attending this course: 

  • Experience with Kaspersky Security Center and Kaspersky Endpoint Security for Windows; and
  • Successfully completed the KL 002.10 course, or have valid KL Certified Professional or KL Certified Administrator status.

Course Objectives

At the end of this course, you should be able to use systems management features of the Kaspersky management platform that go beyond the management of endpoint protection on the following technologies: 

  • Kaspersky Security Center 10

Exam & Certifications

Participants will receive an official certificate after completion of the course. This course culminates with the KLE 009.10 exam that you have up to three (3) chances to pass with a minimum mark of 70%. The exam should be written after class and in your own time.

Kaspersky Technical Certifications are relevant to and valid for the lifetime of a Kaspersky Lab product version.

Course Topics

Chapter 1: General

Chapter 2: Software and Hardware Management

Chapter 3: Vulnerability and Patch Management

Chapter 4: Network Access Control

Chapter 5: Capturing and Deploying Computer Images

My tab content

Lab 1: Managing Licenses of Applications by Other Manufacturers

Lab 2. Installing Windows Updates

Lab 3. Fixing Program Vulnerabilities

Lab 4. Installing Programs by Other Manufacturers

Lab 5. Manually Prohibit Network Access to Device

Lab 6. Redirecting Computers to Authorization Page

Lab 7: Limiting Access Based on Computer Status

Lab 8. Capturing Operating System Image

Lab 9. Deploying Operating System