Courses
Curriculum
- Sl. No.
- Chapter
- Chapter - 1
- Introduction
- Chapter - 1.1
- Evolving Threats
- Chapter - 1.2
- Traditional Security
- Chapter - 1.3
- Anatomy of a Targeted Attack
- Chapter - 1.4
- Point of Entry - Spear Phishing
- Chapter - 1.5
- How Long Can Targeted Attacks Stay Hidden?
- Chapter - 1.6
- Why Monitor Your Network?
- Chapter - 1.7
- Why Deep Discovery?
- Chapter - 2
- Deep Discovery Solution Overview
- Chapter - 2.1
- What is Deep Discovery?
- Chapter - 2.2
- Deep Discovery Attack Detection
- Chapter - 2.3
- Deep Discovery Threat Detection Technologies
- Chapter - 2.4
- Deep Discovery Solution Map
- Chapter - 2.5
- Trend Micro Deep Discovery Inspector
- Chapter - 2.6
- Trend Micro Deep Discovery Analyzer
- Chapter - 2.7
- Trend Micro Deep Discovery Email Inspector
- Chapter - 2.8
- Control Manager
- Chapter - 2.9
- Custom Threat Defense
- Chapter - 2.10
- Deep Discovery Director
- Chapter - 3
- Deep Discovery Inspector
- Chapter - 3.1
- Key Features and Benefits
- Chapter - 3.2
- Network Setup
- Chapter - 3.3
- Form Factors
- Chapter - 3.4
- Deep Discovery Inspector Models
- Chapter - 4
- Deep Discovery Inspector Installation and Configuration
- Chapter - 4.1
- Installation Design
- Chapter - 4.2
- Deployment Example and Scenarios
- Chapter - 4.3
- System Requirements
- Chapter - 4.4
- Installing Deep Discovery Inspector
- Chapter - 4.5
- Information Provisioning for Setup
- Chapter - 4.6
- Defining Architecture and Traffic to Capture
- Chapter - 4.7
- Obtaining ISOs, Hot Fixes/Patches
- Chapter - 4.8
- Performing an Installation
- Chapter - 4.9
- Configuring Initial System Settings (Pre-Configuration Console)
- Chapter - 4.10
- Finalizing Deep Discovery Inspector Configuration (Web Console)
- Chapter - 4.11
- Testing the Deployment
- Chapter - 4.12
- Viewing Installation Logs
- Chapter - 4.13
- Linking Deep Discovery Inspector to Deep Discovery Director
- Chapter - 5
- Threat Detect Technologies
- Chapter - 5.1
- Network Content Inspection Engine (NCIE / VSAPI)
- Chapter - 5.2
- Advanced Threat Scan Engine (ATSE / VSAPI)
- Chapter - 5.3
- Network Content Inspection Engine (NCIE / VSAPI)
- Chapter - 5.4
- Network Content Correlation Engine (NCCE / CAV)
- Chapter - 5.5
- Virtual Analyzer
- Chapter - 5.6
- Census
- Chapter - 5.7
- Certified Safe Software Service (CSSS / GRID)
- Chapter - 5.8
- Trend Micro URL Filtering Engine (TMUFE)
- Chapter - 5.9
- Network Reputation with Smart Protection Network
- Chapter - 5.10
- Mobile Application Reputation Service (MARS)
- Chapter - 6
- Deep Discovery Inspector Management and Administration
- Chapter - 6.1
- Administration Methods
- Chapter - 6.2
- Default Accounts
- Chapter - 6.3
- Threat Management and Configuration
- Chapter - 6.4
- System Management and Configuration
- Chapter - 6.5
- Monitoring System Performance and Resources
- Chapter - 6.6
- Troubleshooting Resource Issues
- Chapter - 6.7
- Deep Discovery Inspector Logs and Reports
- Chapter - 6.8
- Accessing System Logs
- Chapter - 6.9
- Debug Logs
- Chapter - 6.10
- Determining Log Entities
- Chapter - 6.11
- Reporting Logs - Event Classification
- Chapter - 6.12
- Debug Portal
- Chapter - 6.13
- Threat Reports
- Chapter - 7
- Virtual Analyzer
- Chapter - 7.1
- What is Virtual Analyzer Looking For?
- Chapter - 7.2
- Virtual Analyzer Components
- Chapter - 7.3
- Process Flow for Samples
- Chapter - 7.4
- Overall Sample Ratings and Risk Level
- Chapter - 7.5
- Virtual Analyzer Outputs
- Chapter - 7.6
- Virtual Analyzer Report
- Chapter - 7.7
- How to Explain a Malicious Result
- Chapter - 7.8
- Sending Files to Virtual Analyzer for Analysis
- Chapter - 7.9
- Virtual Analyzer Feedback in Deep Discovery Inspector
- Chapter - 7.10
- Introducing a Tradition Sandbox into Deep Discovery Inspector for usage by the Virtual Analyzer
- Chapter - 8
- Deep Discovery Analyzer Installation and Configuration
- Chapter - 8.1
- Information Provisioning
- Chapter - 8.2
- Defining the Architecture
- Chapter - 8.3
- Obtaining ISOs, Hot Fixes/Patches
- Chapter - 8.4
- Performing the Installation
- Chapter - 8.5
- Configuring Initial System Settings
- Chapter - 8.6
- Configuring Final Settings for Deep Discovery Analyzer
- Chapter - 8.7
- Testing the Deployment
- Chapter - 9
- Deep Discovery Analyzer Administration
- Chapter - 9.1
- Console Overview
- Chapter - 9.2
- General Administrative Tasks
- Chapter - 9.3
- Troubleshooting
- Chapter - 10
- Deep Discovery Email Inspector
- Chapter - 10.1
- Functionality
- Chapter - 10.2
- Supported Hardware
- Chapter - 10.3
- Deployment Modes
- Chapter - 10.4
- Ports Used
- Chapter - 10.5
- Summary of Operation Modes
- Chapter - 10.6
- Threat Detection in Deep Discovery Email Inspector
- Chapter - 11
- Deep Discovery Email Inspector Installation and Configuration
- Chapter - 11.1
- Information Provisioning
- Chapter - 11.2
- Defining the Architecture
- Chapter - 11.3
- Obtain ISOs, Hot Fixes/Patches
- Chapter - 11.4
- Performing the Installation
- Chapter - 11.5
- Completing Pre-Configuration
- Chapter - 11.6
- Configuring Final Deep Discovery Email Inspector Settings
- Chapter - 11.7
- Testing the Deployment
- Chapter - 12
- Deep Discovery Email Inspector Administration
- Chapter - 12.1
- Management Console Overview
- Chapter - 12.2
- How to View Detections
- Chapter - 12.3
- Configuring Policies
- Chapter - 12.4
- Setting up Recipient Notifications
- Chapter - 12.5
- Defining Email Message Tags
- Chapter - 12.6
- Configuring Redirects (Non-Scanable Attachments)
- Chapter - 12.7
- Adding Policy Exceptions
- Chapter - 12.8
- Configuring Alerts
- Chapter - 12.9
- Generating Reports
- Chapter - 12.10
- Accessing Log Files
- Chapter - 12.11
- System Administration and Management
- Chapter - 12.12
- Performing System Maintenance Tasks
- Chapter - 13
- Threat Connect
- Chapter - 13.1
- Content
- Chapter - 13.2
- Using Threat Connect
- Chapter - 13.3
- Report Content
- Chapter - 14
- Connected Threat Defense
- Chapter - 14.1
- Integration is Key to Effective Security
- Chapter - 14.2
- Connected Threat Defense Requirements
- Chapter - 14.3
- Connected Threat Defense Components
- Chapter - 14.4
- Suspicious Objects
- Chapter - 14.5
- Handling Suspicious Objects
- Chapter - 14.6
- Trend Micro Control Manager
- Chapter - 14.7
- Integrating Deep Discovery Inspector with Control Manager
- Chapter - 15
- Integration
- Chapter - 15.1
- Open Architecture
- Chapter - 15.2
- Deep Discovery Inspector Integration
- Chapter - 15.3
- Integration with Syslog Servers and SIEM Systems
- Chapter - 15.4
- Third-Party Blocking Integration
- Chapter - 15.5
- Deep Discovery Analyzer Integration
Contact Us
- Public Batches Phone No.: +1-844-889-4054 Email: support@careerera.com
- Private Batches Phone No.: +1-844-889-4054 Email: Sandeep@careerera.com
- Corporate Batches Phone No.: +1-844-889-4054 Email: aditya@careerera.com
Trend Micro Certification Training, this Course and batch also available in other locations View
- Babiciu
- Baldovinesti
- Bals
- Barasti
- Barza
- Bobicesti
- Brancoveni
- Brastavatu
- Brebeni
- Bucinisu
- Caracal
- Carlogani
- Cezieni
- Cilieni
- Colonesti
- Corabia
- Corbu
- Coteana
- Crampoaia
- Cungrea
- Curtisoara
- Daneasa
- Deveselu
- Dobretu
- Dobrosloveni
- Dobroteasa
- Dobrun
- Draganesti-Olt
- Draghiceni
- Fagetelu
- Falcoiu
- Farcasele
- Ganeasa
- Garcovu
- Giuvarasti
- Gostavatu
- Gradinari
- Grojdibodu
- Ianca
- Iancu Jianu
- Icoana
- Izbiceni
- Izvoarele
- Leleasca
- Maruntei
- Mihaesti
- Milcov
- Morunglav
- Movileni
- Nicolae Titulescu
- Obarsia
- Oboga
- Oporelu
- Optasi
- Orlea
- Osica de Sus
- Parscoveni
- Perieti
- Piatra Olt
- Plesoiu
- Poboru
- Potcoava
- Priseaca
- Radomiresti
- Redea
- Rotunda
- Rusanesti
- Samburesti
- Scarisoara
- Schitu
- Scornicesti
- Seaca
- Serbanesti
- Slatina
- Slatioara
- Spineni
- Sprancenata
- Stefan cel Mare
- Stoenesti
- Stoicanesti
- Strejesti
- Studina
- Tatulesti
- Teslui
- Tia Mare
- Topana
- Traian
- Tufeni
- Urzica
- Vadastra
- Vadastrita
- Valcele
- Valea Mare
- Valeni
- Verguleasa
- Visina
- Vitomiresti
- Vladila
- Voineasa
- Vulpeni
- Vulturesti