Courses
Curriculum
- Sl. No.
- Chapter
- Chapter - 1
- Introduction
- Chapter - 1.1
- Evolving Threats
- Chapter - 1.2
- Traditional Security
- Chapter - 1.3
- Anatomy of a Targeted Attack
- Chapter - 1.4
- Point of Entry - Spear Phishing
- Chapter - 1.5
- How Long Can Targeted Attacks Stay Hidden?
- Chapter - 1.6
- Why Monitor Your Network?
- Chapter - 1.7
- Why Deep Discovery?
- Chapter - 2
- Deep Discovery Solution Overview
- Chapter - 2.1
- What is Deep Discovery?
- Chapter - 2.2
- Deep Discovery Attack Detection
- Chapter - 2.3
- Deep Discovery Threat Detection Technologies
- Chapter - 2.4
- Deep Discovery Solution Map
- Chapter - 2.5
- Trend Micro Deep Discovery Inspector
- Chapter - 2.6
- Trend Micro Deep Discovery Analyzer
- Chapter - 2.7
- Trend Micro Deep Discovery Email Inspector
- Chapter - 2.8
- Control Manager
- Chapter - 2.9
- Custom Threat Defense
- Chapter - 2.10
- Deep Discovery Director
- Chapter - 3
- Deep Discovery Inspector
- Chapter - 3.1
- Key Features and Benefits
- Chapter - 3.2
- Network Setup
- Chapter - 3.3
- Form Factors
- Chapter - 3.4
- Deep Discovery Inspector Models
- Chapter - 4
- Deep Discovery Inspector Installation and Configuration
- Chapter - 4.1
- Installation Design
- Chapter - 4.2
- Deployment Example and Scenarios
- Chapter - 4.3
- System Requirements
- Chapter - 4.4
- Installing Deep Discovery Inspector
- Chapter - 4.5
- Information Provisioning for Setup
- Chapter - 4.6
- Defining Architecture and Traffic to Capture
- Chapter - 4.7
- Obtaining ISOs, Hot Fixes/Patches
- Chapter - 4.8
- Performing an Installation
- Chapter - 4.9
- Configuring Initial System Settings (Pre-Configuration Console)
- Chapter - 4.10
- Finalizing Deep Discovery Inspector Configuration (Web Console)
- Chapter - 4.11
- Testing the Deployment
- Chapter - 4.12
- Viewing Installation Logs
- Chapter - 4.13
- Linking Deep Discovery Inspector to Deep Discovery Director
- Chapter - 5
- Threat Detect Technologies
- Chapter - 5.1
- Network Content Inspection Engine (NCIE / VSAPI)
- Chapter - 5.2
- Advanced Threat Scan Engine (ATSE / VSAPI)
- Chapter - 5.3
- Network Content Inspection Engine (NCIE / VSAPI)
- Chapter - 5.4
- Network Content Correlation Engine (NCCE / CAV)
- Chapter - 5.5
- Virtual Analyzer
- Chapter - 5.6
- Census
- Chapter - 5.7
- Certified Safe Software Service (CSSS / GRID)
- Chapter - 5.8
- Trend Micro URL Filtering Engine (TMUFE)
- Chapter - 5.9
- Network Reputation with Smart Protection Network
- Chapter - 5.10
- Mobile Application Reputation Service (MARS)
- Chapter - 6
- Deep Discovery Inspector Management and Administration
- Chapter - 6.1
- Administration Methods
- Chapter - 6.2
- Default Accounts
- Chapter - 6.3
- Threat Management and Configuration
- Chapter - 6.4
- System Management and Configuration
- Chapter - 6.5
- Monitoring System Performance and Resources
- Chapter - 6.6
- Troubleshooting Resource Issues
- Chapter - 6.7
- Deep Discovery Inspector Logs and Reports
- Chapter - 6.8
- Accessing System Logs
- Chapter - 6.9
- Debug Logs
- Chapter - 6.10
- Determining Log Entities
- Chapter - 6.11
- Reporting Logs - Event Classification
- Chapter - 6.12
- Debug Portal
- Chapter - 6.13
- Threat Reports
- Chapter - 7
- Virtual Analyzer
- Chapter - 7.1
- What is Virtual Analyzer Looking For?
- Chapter - 7.2
- Virtual Analyzer Components
- Chapter - 7.3
- Process Flow for Samples
- Chapter - 7.4
- Overall Sample Ratings and Risk Level
- Chapter - 7.5
- Virtual Analyzer Outputs
- Chapter - 7.6
- Virtual Analyzer Report
- Chapter - 7.7
- How to Explain a Malicious Result
- Chapter - 7.8
- Sending Files to Virtual Analyzer for Analysis
- Chapter - 7.9
- Virtual Analyzer Feedback in Deep Discovery Inspector
- Chapter - 7.10
- Introducing a Tradition Sandbox into Deep Discovery Inspector for usage by the Virtual Analyzer
- Chapter - 8
- Deep Discovery Analyzer Installation and Configuration
- Chapter - 8.1
- Information Provisioning
- Chapter - 8.2
- Defining the Architecture
- Chapter - 8.3
- Obtaining ISOs, Hot Fixes/Patches
- Chapter - 8.4
- Performing the Installation
- Chapter - 8.5
- Configuring Initial System Settings
- Chapter - 8.6
- Configuring Final Settings for Deep Discovery Analyzer
- Chapter - 8.7
- Testing the Deployment
- Chapter - 9
- Deep Discovery Analyzer Administration
- Chapter - 9.1
- Console Overview
- Chapter - 9.2
- General Administrative Tasks
- Chapter - 9.3
- Troubleshooting
- Chapter - 10
- Deep Discovery Email Inspector
- Chapter - 10.1
- Functionality
- Chapter - 10.2
- Supported Hardware
- Chapter - 10.3
- Deployment Modes
- Chapter - 10.4
- Ports Used
- Chapter - 10.5
- Summary of Operation Modes
- Chapter - 10.6
- Threat Detection in Deep Discovery Email Inspector
- Chapter - 11
- Deep Discovery Email Inspector Installation and Configuration
- Chapter - 11.1
- Information Provisioning
- Chapter - 11.2
- Defining the Architecture
- Chapter - 11.3
- Obtain ISOs, Hot Fixes/Patches
- Chapter - 11.4
- Performing the Installation
- Chapter - 11.5
- Completing Pre-Configuration
- Chapter - 11.6
- Configuring Final Deep Discovery Email Inspector Settings
- Chapter - 11.7
- Testing the Deployment
- Chapter - 12
- Deep Discovery Email Inspector Administration
- Chapter - 12.1
- Management Console Overview
- Chapter - 12.2
- How to View Detections
- Chapter - 12.3
- Configuring Policies
- Chapter - 12.4
- Setting up Recipient Notifications
- Chapter - 12.5
- Defining Email Message Tags
- Chapter - 12.6
- Configuring Redirects (Non-Scanable Attachments)
- Chapter - 12.7
- Adding Policy Exceptions
- Chapter - 12.8
- Configuring Alerts
- Chapter - 12.9
- Generating Reports
- Chapter - 12.10
- Accessing Log Files
- Chapter - 12.11
- System Administration and Management
- Chapter - 12.12
- Performing System Maintenance Tasks
- Chapter - 13
- Threat Connect
- Chapter - 13.1
- Content
- Chapter - 13.2
- Using Threat Connect
- Chapter - 13.3
- Report Content
- Chapter - 14
- Connected Threat Defense
- Chapter - 14.1
- Integration is Key to Effective Security
- Chapter - 14.2
- Connected Threat Defense Requirements
- Chapter - 14.3
- Connected Threat Defense Components
- Chapter - 14.4
- Suspicious Objects
- Chapter - 14.5
- Handling Suspicious Objects
- Chapter - 14.6
- Trend Micro Control Manager
- Chapter - 14.7
- Integrating Deep Discovery Inspector with Control Manager
- Chapter - 15
- Integration
- Chapter - 15.1
- Open Architecture
- Chapter - 15.2
- Deep Discovery Inspector Integration
- Chapter - 15.3
- Integration with Syslog Servers and SIEM Systems
- Chapter - 15.4
- Third-Party Blocking Integration
- Chapter - 15.5
- Deep Discovery Analyzer Integration
Contact Us
- Public Batches Phone No.: +1-844-889-4054 Email.: support@careerera.com
- Private Batches Phone No.: +1-844-889-4054 Email: Sandeep@careerera.com
- Corporate Batches Phone No.: +1-844-889-4054 Email: aditya@careerera.com
Trend Micro Certification Training, this Course and batch also available in other locations View
- Ain
- Aisne
- Albi Le Sequestre
- Allier
- Alpes-Cote dAzur
- Alpes-de-Haute-Provence
- Alpes-Maritimes
- Alsace
- Aquitaine
- Ardeche
- Ardennes
- Ariege
- Aube
- Aude
- Auvergne
- Aveyron
- Bas-Rhin
- Basse-Normandie
- Bouches-du-Rhone
- Bourgogne
- Bretagne
- Brittany
- Burgundy
- Calvados
- Cantal
- Cedex
- Centre
- Charente
- Charente-Maritime
- Cher
- Correze
- Corse-du-Sud
- Cote-d'Or
- Cotes-d'Armor
- Creuse
- Crolles
- Deux-Sevres
- Dordogne
- Doubs
- Drome
- Essonne
- Eure
- Eure-et-Loir
- Feucherolles
- Finistere
- Franche-Comte
- Gard
- Gers
- Gironde
- Haut-Rhin
- Haute-Corse
- Haute-Garonne
- Haute-Loire
- Haute-Marne
- Haute-Saone
- Haute-Savoie
- Haute-Vienne
- Hautes-Alpes
- Hautes-Pyrenees
- Hauts-de-Seine
- Herault
- Ile-de-France
- Ille-et-Vilaine
- Indre
- Indre-et-Loire
- Isere
- Jura
- Klagenfurt
- Landes
- Languedoc-Roussillon
- Larcay
- Le Castellet
- Le Creusot
- Limousin
- Loir-et-Cher
- Loire
- Loire-Atlantique
- Loiret
- Lorraine
- Lot
- Lot-et-Garonne
- Lower Normandy
- Lozere
- Maine-et-Loire
- Manche
- Marne
- Mayenne
- Meurthe-et-Moselle
- Meuse
- Midi-Pyrenees
- Morbihan
- Moselle
- Nievre
- Nord
- Nord-Pas-de-Calais
- Oise
- Orne
- Paris
- Pas-de-Calais
- Pays de la Loire
- Pays-de-la-Loire
- Picardy
- Puy-de-Dome
- Pyrenees-Atlantiques
- Pyrenees-Orientales
- Quelmes
- Rhone
- Rhone-Alpes
- Saint Ouen
- Saint Viatre
- Saone-et-Loire
- Sarthe
- Savoie
- Seine-et-Marne
- Seine-Maritime
- Seine-Saint-Denis
- Somme
- Sophia Antipolis
- Souvans
- Tarn
- Tarn-et-Garonne
- Territoire de Belfort
- Treignac
- Upper Normandy
- Val-d'Oise
- Val-de-Marne
- Var
- Vaucluse
- Vellise
- Vendee
- Vienne
- Vosges
- Yonne
- Yvelines