Trend Micro Certification Training

Enquire Now

+1
3 + 8 =

Course Description:

The Trend Micro Certification training course will let you know the understanding of how to use Trend Micro Deep Security. This course offers learning about the basic structure, distribution scenarios, setting up, formation, and administration options, and troubleshooting particulars that a network administrator requires to know for successful application and long term maintenance.

Trend Micro is the universal leader in cybersecurity solutions offering multifaceted security for data hubs, hybrid cloud, networks, and endpoints.

Course Essentials:

The candidates who are seeking for the certification must have the mentioned

    • Workings of trend micro products and services
    • Basics of networking and principles
    • Working understanding of windows servers and clients
    • Working understanding of firewalls, web application firewalls, Packet Inspection devices
    • General understanding of malware

Course Objectives:

After the course accomplishment, candidates will be able to learn:

      • Fundamental security concepts
      • IPS setup and configuration
      • SMS setup and configuration
      • Deployment architecture and scenarios
      • Administrative best practices

Course Highlights:

    • 36 Hours of the Classroom/Instructor-Led Online Sessions through certified professionals.
    • E-learning Sessions with explained E-book
    • Tips and techniques while session’s gear the candidates well for the examination.
    • Required reading materials, updates and the reference books for the candidates.
    • The best practices to offer better learning of all the units mentioned in the curriculum.
    • The materials for the candidate’s self-study after completion of the session.
    • 1-day money-back assurances without any query.
    • Get the service at any time of the course material and video session.
Sl. No. Chapter
Chapter - 1 Introduction
Chapter - 1.1 Evolving Threats
Chapter - 1.2 Traditional Security
Chapter - 1.3 Anatomy of a Targeted Attack
Chapter - 1.4 Point of Entry - Spear Phishing
Chapter - 1.5 How Long Can Targeted Attacks Stay Hidden?
Chapter - 1.6 Why Monitor Your Network?
Chapter - 1.7 Why Deep Discovery?
Chapter - 2 Deep Discovery Solution Overview
Chapter - 2.1 What is Deep Discovery?
Chapter - 2.2 Deep Discovery Attack Detection
Chapter - 2.3 Deep Discovery Threat Detection Technologies
Chapter - 2.4 Deep Discovery Solution Map
Chapter - 2.5 Trend Micro Deep Discovery Inspector
Chapter - 2.6 Trend Micro Deep Discovery Analyzer
Chapter - 2.7 Trend Micro Deep Discovery Email Inspector
Chapter - 2.8 Control Manager
Chapter - 2.9 Custom Threat Defense
Chapter - 2.10 Deep Discovery Director
Chapter - 3 Deep Discovery Inspector
Chapter - 3.1 Key Features and Benefits
Chapter - 3.2 Network Setup
Chapter - 3.3 Form Factors
Chapter - 3.4 Deep Discovery Inspector Models
Chapter - 4 Deep Discovery Inspector Installation and Configuration
Chapter - 4.1 Installation Design
Chapter - 4.2 Deployment Example and Scenarios
Chapter - 4.3 System Requirements
Chapter - 4.4 Installing Deep Discovery Inspector
Chapter - 4.5 Information Provisioning for Setup
Chapter - 4.6 Defining Architecture and Traffic to Capture
Chapter - 4.7 Obtaining ISOs, Hot Fixes/Patches
Chapter - 4.8 Performing an Installation
Chapter - 4.9 Configuring Initial System Settings (Pre-Configuration Console)
Chapter - 4.10 Finalizing Deep Discovery Inspector Configuration (Web Console)
Chapter - 4.11 Testing the Deployment
Chapter - 4.12 Viewing Installation Logs
Chapter - 4.13 Linking Deep Discovery Inspector to Deep Discovery Director
Chapter - 5 Threat Detect Technologies
Chapter - 5.1 Network Content Inspection Engine (NCIE / VSAPI)
Chapter - 5.2 Advanced Threat Scan Engine (ATSE / VSAPI)
Chapter - 5.3 Network Content Inspection Engine (NCIE / VSAPI)
Chapter - 5.4 Network Content Correlation Engine (NCCE / CAV)
Chapter - 5.5 Virtual Analyzer
Chapter - 5.6 Census
Chapter - 5.7 Certified Safe Software Service (CSSS / GRID)
Chapter - 5.8 Trend Micro URL Filtering Engine (TMUFE)
Chapter - 5.9 Network Reputation with Smart Protection Network
Chapter - 5.10 Mobile Application Reputation Service (MARS)
Chapter - 6 Deep Discovery Inspector Management and Administration
Chapter - 6.1 Administration Methods
Chapter - 6.2 Default Accounts
Chapter - 6.3 Threat Management and Configuration
Chapter - 6.4 System Management and Configuration
Chapter - 6.5 Monitoring System Performance and Resources
Chapter - 6.6 Troubleshooting Resource Issues
Chapter - 6.7 Deep Discovery Inspector Logs and Reports
Chapter - 6.8 Accessing System Logs
Chapter - 6.9 Debug Logs
Chapter - 6.10 Determining Log Entities
Chapter - 6.11 Reporting Logs - Event Classification
Chapter - 6.12 Debug Portal
Chapter - 6.13 Threat Reports
Chapter - 7 Virtual Analyzer
Chapter - 7.1 What is Virtual Analyzer Looking For?
Chapter - 7.2 Virtual Analyzer Components
Chapter - 7.3 Process Flow for Samples
Chapter - 7.4 Overall Sample Ratings and Risk Level
Chapter - 7.5 Virtual Analyzer Outputs
Chapter - 7.6 Virtual Analyzer Report
Chapter - 7.7 How to Explain a Malicious Result
Chapter - 7.8 Sending Files to Virtual Analyzer for Analysis
Chapter - 7.9 Virtual Analyzer Feedback in Deep Discovery Inspector
Chapter - 7.10 Introducing a Tradition Sandbox into Deep Discovery Inspector for usage by the Virtual Analyzer
Chapter - 8 Deep Discovery Analyzer Installation and Configuration
Chapter - 8.1 Information Provisioning
Chapter - 8.2 Defining the Architecture
Chapter - 8.3 Obtaining ISOs, Hot Fixes/Patches
Chapter - 8.4 Performing the Installation
Chapter - 8.5 Configuring Initial System Settings
Chapter - 8.6 Configuring Final Settings for Deep Discovery Analyzer
Chapter - 8.7 Testing the Deployment
Chapter - 9 Deep Discovery Analyzer Administration
Chapter - 9.1 Console Overview
Chapter - 9.2 General Administrative Tasks
Chapter - 9.3 Troubleshooting
Chapter - 10 Deep Discovery Email Inspector
Chapter - 10.1 Functionality
Chapter - 10.2 Supported Hardware
Chapter - 10.3 Deployment Modes
Chapter - 10.4 Ports Used
Chapter - 10.5 Summary of Operation Modes
Chapter - 10.6 Threat Detection in Deep Discovery Email Inspector
Chapter - 11 Deep Discovery Email Inspector Installation and Configuration
Chapter - 11.1 Information Provisioning
Chapter - 11.2 Defining the Architecture
Chapter - 11.3 Obtain ISOs, Hot Fixes/Patches
Chapter - 11.4 Performing the Installation
Chapter - 11.5 Completing Pre-Configuration
Chapter - 11.6 Configuring Final Deep Discovery Email Inspector Settings
Chapter - 11.7 Testing the Deployment
Chapter - 12 Deep Discovery Email Inspector Administration
Chapter - 12.1 Management Console Overview
Chapter - 12.2 How to View Detections
Chapter - 12.3 Configuring Policies
Chapter - 12.4 Setting up Recipient Notifications
Chapter - 12.5 Defining Email Message Tags
Chapter - 12.6 Configuring Redirects (Non-Scanable Attachments)
Chapter - 12.7 Adding Policy Exceptions
Chapter - 12.8 Configuring Alerts
Chapter - 12.9 Generating Reports
Chapter - 12.10 Accessing Log Files
Chapter - 12.11 System Administration and Management
Chapter - 12.12 Performing System Maintenance Tasks
Chapter - 13 Threat Connect
Chapter - 13.1 Content
Chapter - 13.2 Using Threat Connect
Chapter - 13.3 Report Content
Chapter - 14 Connected Threat Defense
Chapter - 14.1 Integration is Key to Effective Security
Chapter - 14.2 Connected Threat Defense Requirements
Chapter - 14.3 Connected Threat Defense Components
Chapter - 14.4 Suspicious Objects
Chapter - 14.5 Handling Suspicious Objects
Chapter - 14.6 Trend Micro Control Manager
Chapter - 14.7 Integrating Deep Discovery Inspector with Control Manager
Chapter - 15 Integration
Chapter - 15.1 Open Architecture
Chapter - 15.2 Deep Discovery Inspector Integration
Chapter - 15.3 Integration with Syslog Servers and SIEM Systems
Chapter - 15.4 Third-Party Blocking Integration
Chapter - 15.5 Deep Discovery Analyzer Integration


StudentS' Review & Feedback

No Review & Feedback