Courses
Curriculum
- Sl. No.
- Chapter
- Chapter - 1
- Introduction
- Chapter - 1.1
- Evolving Threats
- Chapter - 1.2
- Traditional Security
- Chapter - 1.3
- Anatomy of a Targeted Attack
- Chapter - 1.4
- Point of Entry - Spear Phishing
- Chapter - 1.5
- How Long Can Targeted Attacks Stay Hidden?
- Chapter - 1.6
- Why Monitor Your Network?
- Chapter - 1.7
- Why Deep Discovery?
- Chapter - 2
- Deep Discovery Solution Overview
- Chapter - 2.1
- What is Deep Discovery?
- Chapter - 2.2
- Deep Discovery Attack Detection
- Chapter - 2.3
- Deep Discovery Threat Detection Technologies
- Chapter - 2.4
- Deep Discovery Solution Map
- Chapter - 2.5
- Trend Micro Deep Discovery Inspector
- Chapter - 2.6
- Trend Micro Deep Discovery Analyzer
- Chapter - 2.7
- Trend Micro Deep Discovery Email Inspector
- Chapter - 2.8
- Control Manager
- Chapter - 2.9
- Custom Threat Defense
- Chapter - 2.10
- Deep Discovery Director
- Chapter - 3
- Deep Discovery Inspector
- Chapter - 3.1
- Key Features and Benefits
- Chapter - 3.2
- Network Setup
- Chapter - 3.3
- Form Factors
- Chapter - 3.4
- Deep Discovery Inspector Models
- Chapter - 4
- Deep Discovery Inspector Installation and Configuration
- Chapter - 4.1
- Installation Design
- Chapter - 4.2
- Deployment Example and Scenarios
- Chapter - 4.3
- System Requirements
- Chapter - 4.4
- Installing Deep Discovery Inspector
- Chapter - 4.5
- Information Provisioning for Setup
- Chapter - 4.6
- Defining Architecture and Traffic to Capture
- Chapter - 4.7
- Obtaining ISOs, Hot Fixes/Patches
- Chapter - 4.8
- Performing an Installation
- Chapter - 4.9
- Configuring Initial System Settings (Pre-Configuration Console)
- Chapter - 4.10
- Finalizing Deep Discovery Inspector Configuration (Web Console)
- Chapter - 4.11
- Testing the Deployment
- Chapter - 4.12
- Viewing Installation Logs
- Chapter - 4.13
- Linking Deep Discovery Inspector to Deep Discovery Director
- Chapter - 5
- Threat Detect Technologies
- Chapter - 5.1
- Network Content Inspection Engine (NCIE / VSAPI)
- Chapter - 5.2
- Advanced Threat Scan Engine (ATSE / VSAPI)
- Chapter - 5.3
- Network Content Inspection Engine (NCIE / VSAPI)
- Chapter - 5.4
- Network Content Correlation Engine (NCCE / CAV)
- Chapter - 5.5
- Virtual Analyzer
- Chapter - 5.6
- Census
- Chapter - 5.7
- Certified Safe Software Service (CSSS / GRID)
- Chapter - 5.8
- Trend Micro URL Filtering Engine (TMUFE)
- Chapter - 5.9
- Network Reputation with Smart Protection Network
- Chapter - 5.10
- Mobile Application Reputation Service (MARS)
- Chapter - 6
- Deep Discovery Inspector Management and Administration
- Chapter - 6.1
- Administration Methods
- Chapter - 6.2
- Default Accounts
- Chapter - 6.3
- Threat Management and Configuration
- Chapter - 6.4
- System Management and Configuration
- Chapter - 6.5
- Monitoring System Performance and Resources
- Chapter - 6.6
- Troubleshooting Resource Issues
- Chapter - 6.7
- Deep Discovery Inspector Logs and Reports
- Chapter - 6.8
- Accessing System Logs
- Chapter - 6.9
- Debug Logs
- Chapter - 6.10
- Determining Log Entities
- Chapter - 6.11
- Reporting Logs - Event Classification
- Chapter - 6.12
- Debug Portal
- Chapter - 6.13
- Threat Reports
- Chapter - 7
- Virtual Analyzer
- Chapter - 7.1
- What is Virtual Analyzer Looking For?
- Chapter - 7.2
- Virtual Analyzer Components
- Chapter - 7.3
- Process Flow for Samples
- Chapter - 7.4
- Overall Sample Ratings and Risk Level
- Chapter - 7.5
- Virtual Analyzer Outputs
- Chapter - 7.6
- Virtual Analyzer Report
- Chapter - 7.7
- How to Explain a Malicious Result
- Chapter - 7.8
- Sending Files to Virtual Analyzer for Analysis
- Chapter - 7.9
- Virtual Analyzer Feedback in Deep Discovery Inspector
- Chapter - 7.10
- Introducing a Tradition Sandbox into Deep Discovery Inspector for usage by the Virtual Analyzer
- Chapter - 8
- Deep Discovery Analyzer Installation and Configuration
- Chapter - 8.1
- Information Provisioning
- Chapter - 8.2
- Defining the Architecture
- Chapter - 8.3
- Obtaining ISOs, Hot Fixes/Patches
- Chapter - 8.4
- Performing the Installation
- Chapter - 8.5
- Configuring Initial System Settings
- Chapter - 8.6
- Configuring Final Settings for Deep Discovery Analyzer
- Chapter - 8.7
- Testing the Deployment
- Chapter - 9
- Deep Discovery Analyzer Administration
- Chapter - 9.1
- Console Overview
- Chapter - 9.2
- General Administrative Tasks
- Chapter - 9.3
- Troubleshooting
- Chapter - 10
- Deep Discovery Email Inspector
- Chapter - 10.1
- Functionality
- Chapter - 10.2
- Supported Hardware
- Chapter - 10.3
- Deployment Modes
- Chapter - 10.4
- Ports Used
- Chapter - 10.5
- Summary of Operation Modes
- Chapter - 10.6
- Threat Detection in Deep Discovery Email Inspector
- Chapter - 11
- Deep Discovery Email Inspector Installation and Configuration
- Chapter - 11.1
- Information Provisioning
- Chapter - 11.2
- Defining the Architecture
- Chapter - 11.3
- Obtain ISOs, Hot Fixes/Patches
- Chapter - 11.4
- Performing the Installation
- Chapter - 11.5
- Completing Pre-Configuration
- Chapter - 11.6
- Configuring Final Deep Discovery Email Inspector Settings
- Chapter - 11.7
- Testing the Deployment
- Chapter - 12
- Deep Discovery Email Inspector Administration
- Chapter - 12.1
- Management Console Overview
- Chapter - 12.2
- How to View Detections
- Chapter - 12.3
- Configuring Policies
- Chapter - 12.4
- Setting up Recipient Notifications
- Chapter - 12.5
- Defining Email Message Tags
- Chapter - 12.6
- Configuring Redirects (Non-Scanable Attachments)
- Chapter - 12.7
- Adding Policy Exceptions
- Chapter - 12.8
- Configuring Alerts
- Chapter - 12.9
- Generating Reports
- Chapter - 12.10
- Accessing Log Files
- Chapter - 12.11
- System Administration and Management
- Chapter - 12.12
- Performing System Maintenance Tasks
- Chapter - 13
- Threat Connect
- Chapter - 13.1
- Content
- Chapter - 13.2
- Using Threat Connect
- Chapter - 13.3
- Report Content
- Chapter - 14
- Connected Threat Defense
- Chapter - 14.1
- Integration is Key to Effective Security
- Chapter - 14.2
- Connected Threat Defense Requirements
- Chapter - 14.3
- Connected Threat Defense Components
- Chapter - 14.4
- Suspicious Objects
- Chapter - 14.5
- Handling Suspicious Objects
- Chapter - 14.6
- Trend Micro Control Manager
- Chapter - 14.7
- Integrating Deep Discovery Inspector with Control Manager
- Chapter - 15
- Integration
- Chapter - 15.1
- Open Architecture
- Chapter - 15.2
- Deep Discovery Inspector Integration
- Chapter - 15.3
- Integration with Syslog Servers and SIEM Systems
- Chapter - 15.4
- Third-Party Blocking Integration
- Chapter - 15.5
- Deep Discovery Analyzer Integration
Contact Us
- Public Batches Phone No.: +1-844-889-4054 Email: support@careerera.com
- Private Batches Phone No.: +1-844-889-4054 Email: Sandeep@careerera.com
- Corporate Batches Phone No.: +1-844-889-4054 Email: aditya@careerera.com