Courses

Curriculum

  • Sl. No.
  • Chapter
  • Chapter - 1
  • Introduction
  • Chapter - 1.1
  • Evolving Threats
  • Chapter - 1.2
  • Traditional Security
  • Chapter - 1.3
  • Anatomy of a Targeted Attack
  • Chapter - 1.4
  • Point of Entry - Spear Phishing
  • Chapter - 1.5
  • How Long Can Targeted Attacks Stay Hidden?
  • Chapter - 1.6
  • Why Monitor Your Network?
  • Chapter - 1.7
  • Why Deep Discovery?
  • Chapter - 2
  • Deep Discovery Solution Overview
  • Chapter - 2.1
  • What is Deep Discovery?
  • Chapter - 2.2
  • Deep Discovery Attack Detection
  • Chapter - 2.3
  • Deep Discovery Threat Detection Technologies
  • Chapter - 2.4
  • Deep Discovery Solution Map
  • Chapter - 2.5
  • Trend Micro Deep Discovery Inspector
  • Chapter - 2.6
  • Trend Micro Deep Discovery Analyzer
  • Chapter - 2.7
  • Trend Micro Deep Discovery Email Inspector
  • Chapter - 2.8
  • Control Manager
  • Chapter - 2.9
  • Custom Threat Defense
  • Chapter - 2.10
  • Deep Discovery Director
  • Chapter - 3
  • Deep Discovery Inspector
  • Chapter - 3.1
  • Key Features and Benefits
  • Chapter - 3.2
  • Network Setup
  • Chapter - 3.3
  • Form Factors
  • Chapter - 3.4
  • Deep Discovery Inspector Models
  • Chapter - 4
  • Deep Discovery Inspector Installation and Configuration
  • Chapter - 4.1
  • Installation Design
  • Chapter - 4.2
  • Deployment Example and Scenarios
  • Chapter - 4.3
  • System Requirements
  • Chapter - 4.4
  • Installing Deep Discovery Inspector
  • Chapter - 4.5
  • Information Provisioning for Setup
  • Chapter - 4.6
  • Defining Architecture and Traffic to Capture
  • Chapter - 4.7
  • Obtaining ISOs, Hot Fixes/Patches
  • Chapter - 4.8
  • Performing an Installation
  • Chapter - 4.9
  • Configuring Initial System Settings (Pre-Configuration Console)
  • Chapter - 4.10
  • Finalizing Deep Discovery Inspector Configuration (Web Console)
  • Chapter - 4.11
  • Testing the Deployment
  • Chapter - 4.12
  • Viewing Installation Logs
  • Chapter - 4.13
  • Linking Deep Discovery Inspector to Deep Discovery Director
  • Chapter - 5
  • Threat Detect Technologies
  • Chapter - 5.1
  • Network Content Inspection Engine (NCIE / VSAPI)
  • Chapter - 5.2
  • Advanced Threat Scan Engine (ATSE / VSAPI)
  • Chapter - 5.3
  • Network Content Inspection Engine (NCIE / VSAPI)
  • Chapter - 5.4
  • Network Content Correlation Engine (NCCE / CAV)
  • Chapter - 5.5
  • Virtual Analyzer
  • Chapter - 5.6
  • Census
  • Chapter - 5.7
  • Certified Safe Software Service (CSSS / GRID)
  • Chapter - 5.8
  • Trend Micro URL Filtering Engine (TMUFE)
  • Chapter - 5.9
  • Network Reputation with Smart Protection Network
  • Chapter - 5.10
  • Mobile Application Reputation Service (MARS)
  • Chapter - 6
  • Deep Discovery Inspector Management and Administration
  • Chapter - 6.1
  • Administration Methods
  • Chapter - 6.2
  • Default Accounts
  • Chapter - 6.3
  • Threat Management and Configuration
  • Chapter - 6.4
  • System Management and Configuration
  • Chapter - 6.5
  • Monitoring System Performance and Resources
  • Chapter - 6.6
  • Troubleshooting Resource Issues
  • Chapter - 6.7
  • Deep Discovery Inspector Logs and Reports
  • Chapter - 6.8
  • Accessing System Logs
  • Chapter - 6.9
  • Debug Logs
  • Chapter - 6.10
  • Determining Log Entities
  • Chapter - 6.11
  • Reporting Logs - Event Classification
  • Chapter - 6.12
  • Debug Portal
  • Chapter - 6.13
  • Threat Reports
  • Chapter - 7
  • Virtual Analyzer
  • Chapter - 7.1
  • What is Virtual Analyzer Looking For?
  • Chapter - 7.2
  • Virtual Analyzer Components
  • Chapter - 7.3
  • Process Flow for Samples
  • Chapter - 7.4
  • Overall Sample Ratings and Risk Level
  • Chapter - 7.5
  • Virtual Analyzer Outputs
  • Chapter - 7.6
  • Virtual Analyzer Report
  • Chapter - 7.7
  • How to Explain a Malicious Result
  • Chapter - 7.8
  • Sending Files to Virtual Analyzer for Analysis
  • Chapter - 7.9
  • Virtual Analyzer Feedback in Deep Discovery Inspector
  • Chapter - 7.10
  • Introducing a Tradition Sandbox into Deep Discovery Inspector for usage by the Virtual Analyzer
  • Chapter - 8
  • Deep Discovery Analyzer Installation and Configuration
  • Chapter - 8.1
  • Information Provisioning
  • Chapter - 8.2
  • Defining the Architecture
  • Chapter - 8.3
  • Obtaining ISOs, Hot Fixes/Patches
  • Chapter - 8.4
  • Performing the Installation
  • Chapter - 8.5
  • Configuring Initial System Settings
  • Chapter - 8.6
  • Configuring Final Settings for Deep Discovery Analyzer
  • Chapter - 8.7
  • Testing the Deployment
  • Chapter - 9
  • Deep Discovery Analyzer Administration
  • Chapter - 9.1
  • Console Overview
  • Chapter - 9.2
  • General Administrative Tasks
  • Chapter - 9.3
  • Troubleshooting
  • Chapter - 10
  • Deep Discovery Email Inspector
  • Chapter - 10.1
  • Functionality
  • Chapter - 10.2
  • Supported Hardware
  • Chapter - 10.3
  • Deployment Modes
  • Chapter - 10.4
  • Ports Used
  • Chapter - 10.5
  • Summary of Operation Modes
  • Chapter - 10.6
  • Threat Detection in Deep Discovery Email Inspector
  • Chapter - 11
  • Deep Discovery Email Inspector Installation and Configuration
  • Chapter - 11.1
  • Information Provisioning
  • Chapter - 11.2
  • Defining the Architecture
  • Chapter - 11.3
  • Obtain ISOs, Hot Fixes/Patches
  • Chapter - 11.4
  • Performing the Installation
  • Chapter - 11.5
  • Completing Pre-Configuration
  • Chapter - 11.6
  • Configuring Final Deep Discovery Email Inspector Settings
  • Chapter - 11.7
  • Testing the Deployment
  • Chapter - 12
  • Deep Discovery Email Inspector Administration
  • Chapter - 12.1
  • Management Console Overview
  • Chapter - 12.2
  • How to View Detections
  • Chapter - 12.3
  • Configuring Policies
  • Chapter - 12.4
  • Setting up Recipient Notifications
  • Chapter - 12.5
  • Defining Email Message Tags
  • Chapter - 12.6
  • Configuring Redirects (Non-Scanable Attachments)
  • Chapter - 12.7
  • Adding Policy Exceptions
  • Chapter - 12.8
  • Configuring Alerts
  • Chapter - 12.9
  • Generating Reports
  • Chapter - 12.10
  • Accessing Log Files
  • Chapter - 12.11
  • System Administration and Management
  • Chapter - 12.12
  • Performing System Maintenance Tasks
  • Chapter - 13
  • Threat Connect
  • Chapter - 13.1
  • Content
  • Chapter - 13.2
  • Using Threat Connect
  • Chapter - 13.3
  • Report Content
  • Chapter - 14
  • Connected Threat Defense
  • Chapter - 14.1
  • Integration is Key to Effective Security
  • Chapter - 14.2
  • Connected Threat Defense Requirements
  • Chapter - 14.3
  • Connected Threat Defense Components
  • Chapter - 14.4
  • Suspicious Objects
  • Chapter - 14.5
  • Handling Suspicious Objects
  • Chapter - 14.6
  • Trend Micro Control Manager
  • Chapter - 14.7
  • Integrating Deep Discovery Inspector with Control Manager
  • Chapter - 15
  • Integration
  • Chapter - 15.1
  • Open Architecture
  • Chapter - 15.2
  • Deep Discovery Inspector Integration
  • Chapter - 15.3
  • Integration with Syslog Servers and SIEM Systems
  • Chapter - 15.4
  • Third-Party Blocking Integration
  • Chapter - 15.5
  • Deep Discovery Analyzer Integration

Contact Us

Trend Micro Certification Training, this Course and batch also available in other locations View

Top