Courses

Description

Course Description:

The Trend Micro Certification training course will let you know the understanding of how to use Trend Micro Deep Security. This course offers learning about the basic structure, distribution scenarios, setting up, formation, and administration options, and troubleshooting particulars that a network administrator requires to know for successful application and long term maintenance.

Trend Micro is the universal leader in cybersecurity solutions offering multifaceted security for data hubs, hybrid cloud, networks, and endpoints.

Course Essentials:

The candidates who are seeking for the certification must have the mentioned

    • Workings of trend micro products and services
    • Basics of networking and principles
    • Working understanding of windows servers and clients
    • Working understanding of firewalls, web application firewalls, Packet Inspection devices
    • General understanding of malware

Course Objectives:

After the course accomplishment, candidates will be able to learn:

      • Fundamental security concepts
      • IPS setup and configuration
      • SMS setup and configuration
      • Deployment architecture and scenarios
      • Administrative best practices

Course Highlights:

    • 36 Hours of the Classroom/Instructor-Led Online Sessions through certified professionals.
    • E-learning Sessions with explained E-book
    • Tips and techniques while session’s gear the candidates well for the examination.
    • Required reading materials, updates and the reference books for the candidates.
    • The best practices to offer better learning of all the units mentioned in the curriculum.
    • The materials for the candidate’s self-study after completion of the session.
    • 1-day money-back assurances without any query.
    • Get the service at any time of the course material and video session.

Curriculum

  • Sl. No.
  • Chapter
  • Chapter - 1
  • Introduction
  • Chapter - 1.1
  • Evolving Threats
  • Chapter - 1.2
  • Traditional Security
  • Chapter - 1.3
  • Anatomy of a Targeted Attack
  • Chapter - 1.4
  • Point of Entry - Spear Phishing
  • Chapter - 1.5
  • How Long Can Targeted Attacks Stay Hidden?
  • Chapter - 1.6
  • Why Monitor Your Network?
  • Chapter - 1.7
  • Why Deep Discovery?
  • Chapter - 2
  • Deep Discovery Solution Overview
  • Chapter - 2.1
  • What is Deep Discovery?
  • Chapter - 2.2
  • Deep Discovery Attack Detection
  • Chapter - 2.3
  • Deep Discovery Threat Detection Technologies
  • Chapter - 2.4
  • Deep Discovery Solution Map
  • Chapter - 2.5
  • Trend Micro Deep Discovery Inspector
  • Chapter - 2.6
  • Trend Micro Deep Discovery Analyzer
  • Chapter - 2.7
  • Trend Micro Deep Discovery Email Inspector
  • Chapter - 2.8
  • Control Manager
  • Chapter - 2.9
  • Custom Threat Defense
  • Chapter - 2.10
  • Deep Discovery Director
  • Chapter - 3
  • Deep Discovery Inspector
  • Chapter - 3.1
  • Key Features and Benefits
  • Chapter - 3.2
  • Network Setup
  • Chapter - 3.3
  • Form Factors
  • Chapter - 3.4
  • Deep Discovery Inspector Models
  • Chapter - 4
  • Deep Discovery Inspector Installation and Configuration
  • Chapter - 4.1
  • Installation Design
  • Chapter - 4.2
  • Deployment Example and Scenarios
  • Chapter - 4.3
  • System Requirements
  • Chapter - 4.4
  • Installing Deep Discovery Inspector
  • Chapter - 4.5
  • Information Provisioning for Setup
  • Chapter - 4.6
  • Defining Architecture and Traffic to Capture
  • Chapter - 4.7
  • Obtaining ISOs, Hot Fixes/Patches
  • Chapter - 4.8
  • Performing an Installation
  • Chapter - 4.9
  • Configuring Initial System Settings (Pre-Configuration Console)
  • Chapter - 4.10
  • Finalizing Deep Discovery Inspector Configuration (Web Console)
  • Chapter - 4.11
  • Testing the Deployment
  • Chapter - 4.12
  • Viewing Installation Logs
  • Chapter - 4.13
  • Linking Deep Discovery Inspector to Deep Discovery Director
  • Chapter - 5
  • Threat Detect Technologies
  • Chapter - 5.1
  • Network Content Inspection Engine (NCIE / VSAPI)
  • Chapter - 5.2
  • Advanced Threat Scan Engine (ATSE / VSAPI)
  • Chapter - 5.3
  • Network Content Inspection Engine (NCIE / VSAPI)
  • Chapter - 5.4
  • Network Content Correlation Engine (NCCE / CAV)
  • Chapter - 5.5
  • Virtual Analyzer
  • Chapter - 5.6
  • Census
  • Chapter - 5.7
  • Certified Safe Software Service (CSSS / GRID)
  • Chapter - 5.8
  • Trend Micro URL Filtering Engine (TMUFE)
  • Chapter - 5.9
  • Network Reputation with Smart Protection Network
  • Chapter - 5.10
  • Mobile Application Reputation Service (MARS)
  • Chapter - 6
  • Deep Discovery Inspector Management and Administration
  • Chapter - 6.1
  • Administration Methods
  • Chapter - 6.2
  • Default Accounts
  • Chapter - 6.3
  • Threat Management and Configuration
  • Chapter - 6.4
  • System Management and Configuration
  • Chapter - 6.5
  • Monitoring System Performance and Resources
  • Chapter - 6.6
  • Troubleshooting Resource Issues
  • Chapter - 6.7
  • Deep Discovery Inspector Logs and Reports
  • Chapter - 6.8
  • Accessing System Logs
  • Chapter - 6.9
  • Debug Logs
  • Chapter - 6.10
  • Determining Log Entities
  • Chapter - 6.11
  • Reporting Logs - Event Classification
  • Chapter - 6.12
  • Debug Portal
  • Chapter - 6.13
  • Threat Reports
  • Chapter - 7
  • Virtual Analyzer
  • Chapter - 7.1
  • What is Virtual Analyzer Looking For?
  • Chapter - 7.2
  • Virtual Analyzer Components
  • Chapter - 7.3
  • Process Flow for Samples
  • Chapter - 7.4
  • Overall Sample Ratings and Risk Level
  • Chapter - 7.5
  • Virtual Analyzer Outputs
  • Chapter - 7.6
  • Virtual Analyzer Report
  • Chapter - 7.7
  • How to Explain a Malicious Result
  • Chapter - 7.8
  • Sending Files to Virtual Analyzer for Analysis
  • Chapter - 7.9
  • Virtual Analyzer Feedback in Deep Discovery Inspector
  • Chapter - 7.10
  • Introducing a Tradition Sandbox into Deep Discovery Inspector for usage by the Virtual Analyzer
  • Chapter - 8
  • Deep Discovery Analyzer Installation and Configuration
  • Chapter - 8.1
  • Information Provisioning
  • Chapter - 8.2
  • Defining the Architecture
  • Chapter - 8.3
  • Obtaining ISOs, Hot Fixes/Patches
  • Chapter - 8.4
  • Performing the Installation
  • Chapter - 8.5
  • Configuring Initial System Settings
  • Chapter - 8.6
  • Configuring Final Settings for Deep Discovery Analyzer
  • Chapter - 8.7
  • Testing the Deployment
  • Chapter - 9
  • Deep Discovery Analyzer Administration
  • Chapter - 9.1
  • Console Overview
  • Chapter - 9.2
  • General Administrative Tasks
  • Chapter - 9.3
  • Troubleshooting
  • Chapter - 10
  • Deep Discovery Email Inspector
  • Chapter - 10.1
  • Functionality
  • Chapter - 10.2
  • Supported Hardware
  • Chapter - 10.3
  • Deployment Modes
  • Chapter - 10.4
  • Ports Used
  • Chapter - 10.5
  • Summary of Operation Modes
  • Chapter - 10.6
  • Threat Detection in Deep Discovery Email Inspector
  • Chapter - 11
  • Deep Discovery Email Inspector Installation and Configuration
  • Chapter - 11.1
  • Information Provisioning
  • Chapter - 11.2
  • Defining the Architecture
  • Chapter - 11.3
  • Obtain ISOs, Hot Fixes/Patches
  • Chapter - 11.4
  • Performing the Installation
  • Chapter - 11.5
  • Completing Pre-Configuration
  • Chapter - 11.6
  • Configuring Final Deep Discovery Email Inspector Settings
  • Chapter - 11.7
  • Testing the Deployment
  • Chapter - 12
  • Deep Discovery Email Inspector Administration
  • Chapter - 12.1
  • Management Console Overview
  • Chapter - 12.2
  • How to View Detections
  • Chapter - 12.3
  • Configuring Policies
  • Chapter - 12.4
  • Setting up Recipient Notifications
  • Chapter - 12.5
  • Defining Email Message Tags
  • Chapter - 12.6
  • Configuring Redirects (Non-Scanable Attachments)
  • Chapter - 12.7
  • Adding Policy Exceptions
  • Chapter - 12.8
  • Configuring Alerts
  • Chapter - 12.9
  • Generating Reports
  • Chapter - 12.10
  • Accessing Log Files
  • Chapter - 12.11
  • System Administration and Management
  • Chapter - 12.12
  • Performing System Maintenance Tasks
  • Chapter - 13
  • Threat Connect
  • Chapter - 13.1
  • Content
  • Chapter - 13.2
  • Using Threat Connect
  • Chapter - 13.3
  • Report Content
  • Chapter - 14
  • Connected Threat Defense
  • Chapter - 14.1
  • Integration is Key to Effective Security
  • Chapter - 14.2
  • Connected Threat Defense Requirements
  • Chapter - 14.3
  • Connected Threat Defense Components
  • Chapter - 14.4
  • Suspicious Objects
  • Chapter - 14.5
  • Handling Suspicious Objects
  • Chapter - 14.6
  • Trend Micro Control Manager
  • Chapter - 14.7
  • Integrating Deep Discovery Inspector with Control Manager
  • Chapter - 15
  • Integration
  • Chapter - 15.1
  • Open Architecture
  • Chapter - 15.2
  • Deep Discovery Inspector Integration
  • Chapter - 15.3
  • Integration with Syslog Servers and SIEM Systems
  • Chapter - 15.4
  • Third-Party Blocking Integration
  • Chapter - 15.5
  • Deep Discovery Analyzer Integration

FAQ

Contact Us

Request a Call Back

+1
2 + 3=

Student's Review & Feedback

Post a comment
Submit Review
  • No Comment

Trend Micro Certification Training, this Course and batch also available in other locations View

Top