Trend Micro Deep Discovery Training for Certified Professionals
|
|
- Karin Andrews
- 6 years ago
- Views:
Transcription
1 Trend Micro Deep Discovery Training for Certified Professionals Duration: 3 Days Course Code: TMDD Overview: Trend Micro Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro Deep Discovery threat protection solution using: Trend Micro Deep Discovery Inspector Trend Micro Deep Discovery Analyzer Trend Micro Deep Discovery Inspector Participants explore key concepts and methodologies of using a blend of Deep Discovery solutions for a more complete approach to network security. This course details the architecture, deployment options, threat management and system administration fundamentals, as well as troubleshooting and best practices, for all three products. This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action. This course is taught by Trend Micro-certified trainers. Upon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Discovery. Target Audience: This course is designed for IT professionals who are responsible for protecting networks from any kind of networked, endpoint, or cloud security threats. The individuals who will typically benefit the most include: System administratorsnetwork engineerssupport EngineersIntegration EngineersSolution & Security Architects Prerequisites: Before you take this course, Trend Micro recommends that you have a working knowledge of their products and services, as well as basic networking concepts and principles. You should also have a working knowledge of the following products: Windows servers and clients Firewalls, Web Application Firewalls, Packet Inspection devices General understanding of malware Participants are required to bring a laptop computer with a screen resolution of at least 1980 x 1080 or above; a display size of 15" or above is recommended.
2 Content: Introduction Evolving Threats Network Content Inspection Engine Network Content Inspection Engine (NCIE Traditional Security (NCIE / / Anatomy of a Targeted Attack Advanced Threat Scan Engine (ATSE / Advanced Threat Scan Engine (ATSE / Point of Entry - Spear Phishing How Long Can Targeted Attacks Stay Network Content Inspection Engine Network Content Inspection Engine (NCIE Hidden? (NCIE / / Why Monitor Your Network? Network Content Correlation Engine Network Content Correlation Engine Why Deep Discovery? (NCCE / CAV) (NCCE / CAV) Deep Discovery Solution Overview Census Census Certified Safe Software Service (CSSS / Certified Safe Software Service (CSSS / What is Deep Discovery? GRID) GRID) Deep Discovery Attack Detection Trend Micro URL Filtering Engine Trend Micro URL Filtering Engine Deep Discovery Threat Detection (TMUFE) (TMUFE) Technologies Network Reputation with Smart Network Reputation with Smart Protection Deep Discovery Solution Map Protection Network Network - Trend Micro Deep Discovery Inspector Mobile Application Reputation Service Mobile Application Reputation Service - Trend Micro Deep Discovery Analyzer (MARS (MARS - Trend Micro Deep Discovery Administration Methods Administration Methods Inspector Default Accounts Default Accounts - Threat Management and Configuration Threat Management and Configuration - Custom Threat Defense - Deep Discovery Director Monitoring System Performance and Monitoring System Performance and Deep Discovery Inspector Key Features and Benefits Supported Hardware Supported Hardware Network Setup Deployment Modes Deployment Modes Form Factors Ports Used Ports Used Deep Discovery Inspector Models Summary of Operation Modes Summary of Operation Modes Threat Detection in Deep Discovery Threat Detection in Deep Discovery Deep Discovery Inspector Installation and Inspector Inspector Configuration Information Provisioning Information Provisioning Installation Design Obtain ISOs, Hot Fixes/Patches Obtain ISOs, Hot Fixes/Patches Deployment Example and Scenarios Performing the Installation Performing the Installation System Requirements Installing Deep Discovery Inspector Configuring Final Deep Discovery Configuring Final Deep Discovery - Information Provisioning for Setup Inspector Settings Inspector Settings - Defining Architecture and Traffic to Capture Content Content - Obtaining ISOs, Hot Fixes/Patches - Performing an Installation - Configuring Initial System Settings Integration is Key to Effective Security Integration is Key to Effective Security (Pre-Configuration Console) Connected Threat Defense Requirements Connected Threat Defense Requirements - Finalizing Deep Discovery Inspector Connected Threat Defense Components Connected Threat Defense Components Configuration (Web Console) - Handling Handling - Viewing Installation Logs Trend Micro Trend Micro - Connecting Deep Discovery Inspector to Integrating Deep Discovery Inspector with Integrating Deep Discovery Inspector with Deep Discovery Director Threat Detect Technologies Deep Discovery Inspector Logs and Reports Deep Discovery Inspector Administration Accessing System Logs Debug Logs Management Console Overview Determining Log Entities How to View Detections Network Content Inspection Engine (NCIE / Reporting Logs - Event Classification Configuring Policies Debug Portal Setting up Recipient Notifications Advanced Threat Scan Engine (ATSE / Threat Reports Defining Message Tags Configuring Redirects (Non-Scannable Network Content Inspection Engine (NCIE / Attachments)
3 Adding Policy Exceptions Network Content Correlation Engine (NCCE What is Looking For? Configuring Alerts / CAV) Components Generating Reports Process Flow for Samples Accessing Log Files Census Overall Sample Ratings and Risk Level System Administration and Management Certified Safe Software Service (CSSS / Outputs Performing System Maintenance Tasks GRID) Report Trend Micro URL Filtering Engine (TMUFE) How to Explain a Malicious Result Threat Connect Network Reputation with Smart Protection Sending Files to for Network Analysis Mobile Application Reputation Service Feedback in Deep (MARS Discovery Inspector Administration Methods Importing a Custom Sandbox into Deep Network Content Inspection Engine (NCIE Default Accounts Discovery Inspector for use by the Virtual / Threat Management and Configuration Analyzer Advanced Threat Scan Engine (ATSE / Monitoring System Performance and Deep Discovery Analyzer Installation and Network Content Inspection Engine (NCIE Configuration / Network Content Correlation Engine Information Provisioning (NCCE / CAV) Supported Hardware Deployment Modes Obtaining ISOs, Hot Fixes/Patches Census Ports Used Performing the Installation Certified Safe Software Service (CSSS / Summary of Operation Modes Configuring Initial System Settings GRID) Threat Detection in Deep Discovery Configuring Final Settings for Deep Trend Micro URL Filtering Engine Inspector Discovery Analyzer (TMUFE) Information Provisioning Network Reputation with Smart Protection Network Obtain ISOs, Hot Fixes/Patches Deep Discovery Analyzer Administration Mobile Application Reputation Service Performing the Installation (MARS Console Overview Administration Methods Configuring Final Deep Discovery General Administrative Tasks Default Accounts Inspector Settings Troubleshooting Threat Management and Configuration Content Deep Discovery Inspector Monitoring System Performance and Integration is Key to Effective Security Connected Threat Defense Requirements Supported Hardware Connected Threat Defense Components Network Content Inspection Engine Deployment Modes (NCIE / Ports Used Handling Advanced Threat Scan Engine (ATSE / Summary of Operation Modes Trend Micro Threat Detection in Deep Discovery Integrating Deep Discovery Inspector with Network Content Inspection Engine Inspector (NCIE / Information Provisioning Network Content Correlation Engine ) (NCCE / CAV) Obtain ISOs, Hot Fixes/Patches Performing the Installation Census Deep Discovery Inspector Management and Certified Safe Software Service (CSSS / Configuring Final Deep Discovery Administration GRID) Inspector Settings Trend Micro URL Filtering Engine (TMUFE) Content Network Reputation with Smart Protection Network Mobile Application Reputation Service Integration is Key to Effective Security (MARS Connected Threat Defense Requirements Administration Methods Connected Threat Defense Components Default Accounts Threat Management and Configuration Handling Trend Micro Monitoring System Performance and Integrating Deep Discovery Inspector with Connected Threat Defense Supported Hardware
4 Deployment Modes Ports Used Summary of Operation Modes Threat Detection in Deep Discovery Network Content Inspection Engine (NCIE Inspector / Information Provisioning Advanced Threat Scan Engine (ATSE / Obtain ISOs, Hot Fixes/Patches Network Content Inspection Engine (NCIE Performing the Installation / Network Content Correlation Engine Configuring Final Deep Discovery (NCCE / CAV) Inspector Settings Census Content Certified Safe Software Service (CSSS / GRID) Trend Micro URL Filtering Engine Integration is Key to Effective Security (TMUFE) Connected Threat Defense Requirements Network Reputation with Smart Protection Connected Threat Defense Components Network Mobile Application Reputation Service Handling (MARS Trend Micro Administration Methods Integrating Deep Discovery Inspector with Default Accounts Threat Management and Configuration Deep Discovery Inspector Installation Monitoring System Performance and and Configuration Supported Hardware Deployment Modes Ports Used Summary of Operation Modes Threat Detection in Deep Discovery Inspector Information Provisioning Obtain ISOs, Hot Fixes/Patches Performing the Installation Configuring Final Deep Discovery Inspector Settings Content Integration is Key to Effective Security Connected Threat Defense Requirements Connected Threat Defense Components Handling Trend Micro Integrating Deep Discovery Inspector with Integration Open Architecture Deep Discovery Inspector Integration Integration with Syslog Servers and SIEM Systems Third-Party Blocking Integration Deep Discovery Analyzer Integration
5 Further Information: For More information, or to book your course, please call us on (0) or training@globalknowledge.com.eg Global Knowledge, 16 Moustafa Refaat St. Block 1137, Sheraton Buildings, Heliopolis, Cairo
This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action.
Trend Micro Trend Micro Deep Discovery Training for Certified Professionals Course ID: TMCPDD Course Overview Course Duration: 3 Days Trend Micro Deep Discovery Training for Certified Professionals is
More informationTrend Micro Deep Discovery Training for Certified Professionals
Trend Micro Deep Discovery Training for Certified Professionals Length Courseware 3 days Hard or soft copy provided. Course Description Trend Micro Deep Discovery Training for Certified Professionals is
More informationTrend Micro Deep Discovery Training Advanced Threat Detection 2.0 for Certified. Professionals Course Description
Trend Micro Deep Discovery Training Advanced Threat Detection 2.0 for Certified Professionals Course Description Length Courseware 3 Day ebooks Trend Micro Deep Discovery Training Advanced Threat Detection
More informationFundamentals of IBM Lotus Domino Application Development
Fundamentals of IBM Lotus Domino 8.5.1 Application Development Duration: 5 Days Course Code: D8L51G Overview: In this course, you will learn to create and modify database applications using IBM Lotus Domino
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationCitrix NetScaler Basic and Advanced Administration Bootcamp
Citrix NetScaler Basic and Advanced Administration Bootcamp Duration: 6.00 Days Course Code: NETBC Overview: This boot camp covers the initial configuration and administration of Citrix NetScaler 9.2.
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationDelivering Integrated Cyber Defense for the Cloud Generation Darren Thomson
Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582
More informationCompTIA CSA+ Cybersecurity Analyst
CompTIA CSA+ Cybersecurity Analyst Duration: 5 Days Course Code: Target Audience: The CompTIA Cybersecurity Analyst (CSA+) examination is designed for IT security analysts, vulnerability analysts, or threat
More informationCAS Quick Deployment Guide January 2018
CAS January 2018 Page 2 of 18 Trend Micro CAS January 2018 This document is to guide TrendMicro SE and Solution Architect team run a successful Cloud App Security POC with prospective customers. It is
More informationA: Administering System Center Configuration Manager
20703-1A: Administering System Center Configuration Manager Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This five-day course describes how to use Configuration Manager and its associated site
More informationAdvanced Windows Store App Development Using C#
Advanced Windows Store App Development Using C# Duration: 5 Days Course Code: M20485 Overview: In this course the students will learn the more advanced programming skills and techniques that they can use
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationACTIVE DIRECTORY SERVICES WITH WINDOWS SERVER
CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: ACTIVE DIRECTORY SERVICES WITH WINDOWS SERVER Course: 10969A; Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN Get hands-on instruction and practice administering
More informationCompTIA Mobility+ Certification
CompTIA Mobility+ Certification Duration: 5 days Price: $4000 Certifications: CompTIA Mobility+ Exams: MB0-001 Course Overview The mobile age is upon us. More and more people are using tablets, smartphones,
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationProteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro
Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro 2 Customer Challenges 3 Most Attacks Include Phishing Emails 5 Advanced Malware Difficult to
More informationAdvanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector
Advanced Threat Defense Certification Testing Report Trend Micro Deep Discovery Inspector ICSA Labs Advanced Threat Defense July 12, 2016 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationImplementing Cisco Network Security (IINS) 3.0
Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationCourse Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack.
[MS20537]: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Azure Delivery Method : Instructor-led (Classroom)
More informationMaximum Security with Minimum Impact : Going Beyond Next Gen
SESSION ID: SP03-W10 Maximum Security with Minimum Impact : Going Beyond Next Gen Wendy Moore Director, User Protection Trend Micro @WMBOTT Hyper-competitive Cloud Rapid adoption Social Global Mobile IoT
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationConfiguring BIG-IP ASM v12.1 Application Security Manager
Course Description Configuring BIG-IP ASM v12.1 Application Security Manager Description The BIG-IP Application Security Manager course gives participants a functional understanding of how to deploy, tune,
More informationTHE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson
THE RSA NETWITNESS SUITE REINVENT YOUR SIEM Presented by: Walter Abeson 1 Reality Goals GOALS VERSUS REALITY OF SIEM 1.0 Single compliance & security interface Analyze & prioritize alerts across various
More information1 Introduction Requirements Architecture Feature List... 4
Contents 1 Introduction... 2 1.1 Requirements... 2 1.2 Architecture... 3 1.3 Feature List... 4 1.3.1 Device Compliance status... 4 1.3.2 Auto grouping for devices... 5 1.3.3 Auto grouping for applications...
More informationActive Directory Services with Windows Server
Active Directory Services with Windows Server Duration: 5 Days Course Code: 10969B About this course Get Hands on instruction and practice administering Active Directory technologies in Windows Server
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationThe SANS Institute Top 20 Critical Security Controls. Compliance Guide
The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise
More informationAdministering System Center Configuration Manager
Administering System Center Configuration Manager Duration: 5 Days Course Code: M20703-1 Version: A Overview: This five-day course describes how to use Configuration Manager and its associated site systems
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme
More information(CNS-301) Citrix NetScaler 11 Advance Implementation
(CNS-301) Citrix NetScaler 11 Advance Implementation Overview Designed for students with previous NetScaler experience, this course is best suited for individuals who will be deploying or managing advanced
More informationTrend Micro Deep Discovery and Custom Defence
Trend Micro Deep Discovery and Custom Defence Protection from Targeted Attacks 23 May 2013 James Walker Snr. EMEA Product Marketing Manager How threats have evolved! Patterns Reputation Heuristics Custom
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationCNS-220-1I: CITRIX NETSCALER TRAFFIC MANAGEMENT
ONE STEP AHEAD. CNS-220-1I: CITRIX NETSCALER TRAFFIC MANAGEMENT Designed for students with little or no previous NetScaler experience, this course is best suited for individuals who will be deploying or
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationConsumerization. Copyright 2014 Trend Micro Inc. IT Work Load
Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web
More informationAdministering System Center Configuration Manager
Administering System Center Configuration Manager Course 20703-1A 5 Days Instructor-led, Hands on Course Information This five-day course describes how to use Configuration Manager and its associated site
More informationCOURSE OUTLINE: OD10969B Active Directory Services with Windows Server
Course Name Course Duration Course Structure Course Overview Course Outcome OD10969B Active Directory Services with Windows Server 2 Days Online Get Hands on instruction and practice administering Active
More informationSun Mgt Bonus Lab 11: Auto-Tagging in PAN-OS 8.X
1 Overview Introduced first in PAN-OS 8.0, the Dynamic IP Address and Tag Registration feature makes a significant step forward in the automation of operational, administrative, and, most importantly,
More informationADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER
ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER Course Code: 20703-1a Duration 5 days Introduction This five-day course describes how to use Configuration and its associated site systems to efficiently
More informationAdministering System Center Configuration Manager
Administering System Center Configuration Manager 20703-1; 5 Days; Instructor-led Course Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently
More informationIntroducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led
Introducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led Course Description Introducing Cisco Cloud Administration (CLDADM) is a new 5-day ILT course designed to help students prepare
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationTrend Micro Professional Services Partner Program
Trend Micro Professional Services Partner Program PROGRAM OVERVIEW The Trend Micro Partner Program provides professional services companies with the certification, training, technical support and access
More informationMicrosoft Azure Integration and Security. Course Code: AZ-101; Duration: 4 days; Instructorled
Microsoft Azure Integration and Security Course Code: AZ-101; Duration: 4 days; Instructorled WHAT YOU WILL LEARN This course teaches IT professionals how to discover, assess, plan and implement a migration
More informationCourse Outline. Course Outline :: 20744A::
Module Title : 20744A: Securing Windows Server 2016 Duration : 5 days Overview This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that
More informationActive Directory Services with Windows Server
Active Directory Services with Windows Server 10969B; 5 days, Instructor-led Course Description Get hands on instruction and practice administering Active Directory technologies in Windows Server 2012
More informationNE Administering System Center Configuration Manager and Intune
NE-20696 Administering System Center Configuration Manager and Intune Summary Duration 5 Days Audience IT Professionals Level 300 Technology System Center Configuration Manager Delivery Method Instructor-led
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationCore Solutions of Microsoft Exchange Server 2013
Core Solutions of Microsoft Exchange Server 2013 Course: 20341 Course Details Audience(s): IT Professional(s) Technology: Duration: Exchange Server 40 hours ABOUT THIS COURSE This course will provide you
More informationCNS-220-1I: Citrix NetScaler Traffic Management Essentials
CNS-220-1I: Citrix NetScaler Traffic Management Essentials Ready Informatica srl Per contattare il nostro servizio informazioni: 039 921 21 21 Per consultare il calendario corsi: http://www.ready.it/corsi.html
More informationTREND MICRO SMART PROTECTION SUITES
SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum endpoint security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly changing,
More informationCourse A: Administering System Center Configuration Manager
Course 20703-1A: Administering System Center Configuration Manager Overview: This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network
More informationAudience(s) : IT Professionals Level : 300 Technology : Microsoft System Center Configuration Manager Delivery Method : Instructor-led (Classroom)
[MS10748]: Planning and Deploying System Center 2012 Configuration Length : 3 Days Audience(s) : IT Professionals Level : 300 Technology : System Center Configuration Delivery Method : Instructor-led (Classroom)
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 Business drivers and their impact on IT AGILITY Move fast, be nimble and flexible 66% of business owners identify business agility as a priority EFFICIENCY
More informationOrchestrating and Automating Trend Micro TippingPoint and IBM QRadar
Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar Response Automation SOCAutomation is an information security automation and orchestration platform that transforms incident response.
More informationActive Directory Services with Windows Server
Course Code: M10969 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Active Directory Services with Windows Server Overview Get Hands on instruction and practice administering Active Directory technologies
More informationTREND MICRO SMART PROTECTION SUITES
SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum Trend Micro XGen security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly
More informationStudents interested in learning how to implement and manage the advanced NetScaler features using leading practices. Specifically:
Citrix NetScaler Essentials and Unified Gateway About this course Course type: Specialist Course code: CNS2221 Duration: 5 Days Special Notices Designed for students with little or no previous NetScaler,
More informationSystem Center Course Administering System Center Configuration Manager. Length. Audience. 5 days
System Center Course - 207031-1 Administering System Center Configuration Manager Length 5 days Audience This course is for experienced information technology (IT) professionals, typically described as
More informationADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER
CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER Course 10747D; Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This course describes how to configure
More information"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary
MOC 20703-1A: Administering System Center Configuration Manager Course Summary Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently
More informationCybersecurity Auditing in an Unsecure World
About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity
More information"Charting the Course... MOC B Active Directory Services with Windows Server Course Summary
Description Course Summary Get Hands on instruction and practice administering Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2 in this 5-day Microsoft Official Course. You
More informationAt a Glance: Symantec Security.cloud vs Microsoft O365 E3
At a Glance: Symantec Email Security.cloud vs Microsoft O365 E3 Microsoft O365 E3 Security as a Feature Symantec Email Security.cloud Why This Is Important Spam Protection Third-party blacklists subscribed
More informationIntegrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation
Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation Configuration Example March 2018 2018 Juniper Networks, Inc. Juniper Networks, Inc. 1133
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationto protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large
Executive Summary As a County Government servicing about 1.5 million citizens, we have the utmost responsibility to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large
More informationUnderstanding Cisco Cybersecurity Fundamentals
210-250 Understanding Cisco Cybersecurity Fundamentals NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 210-250 Exam on Understanding Cisco
More informationCombating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi
Combating APTs with the Custom Defense Solution Hans Liljedahl Peter Szendröi RSA Attack Overview : 1. Two spear phishing emails were sent over a two-day period targeted at low to mid- xls attachment with
More informationASACAMP - ASA Lab Camp (5316)
ASACAMP - ASA Lab Camp (5316) Price: $4,595 Cisco Course v1.0 Cisco Security Appliance Software v8.0 Based on our enhanced FIREWALL and VPN courses, this exclusive, lab-based course is designed to provide
More informationCitrix NetScaler Essentials and Unified Gateway
Course Code: CNS2221 Vendor: Citrix Course Overview Duration: 5 RRP: 2,690 Citrix NetScaler Essentials and Unified Gateway Overview Designed for students with little or no previous NetScaler, NetScaler
More informationTrend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data
Trend Micro Deep Discovery for Education Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data 1 Computers, the Internet, and portable devices are now
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationSOLUTION MANAGEMENT GROUP
InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com
More informationTrend Micro and IBM Security QRadar SIEM
Trend Micro and IBM Security QRadar SIEM Ellen Knickle, PM QRadar Integrations Robert Tavares, VP IBM Strategic Partnership February 19, 2014 1 Agenda 1. Nature of the IBM Relationship with Trend Micro
More informationMcAfee Web Gateway Administration
McAfee Web Gateway Administration Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction to the tasks crucial
More informationMcAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
More informationMcAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential
More informationAdministering System Center Configuration Manager ( A)
Administering System Center Configuration Manager (20703-1A) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing the features Configuration Manager and
More informationBUILDING AND MAINTAINING SOC
BUILDING AND MAINTAINING SOC Digit Oktavianto KOMINFO 7 December 2016 digit dot oktavianto at gmail dot com 1 Digit Oktavianto Profile in 1 Page Currently working as a Security Architect Professional Certifications:
More informationRansomware A case study of the impact, recovery and remediation events
Ransomware A case study of the impact, recovery and remediation events Peter Thermos President & CTO Tel: (732) 688-0413 peter.thermos@palindrometech.com Palindrome Technologies 100 Village Court Suite
More information"Charting the Course... MOC A Planning, Deploying and Managing Microsoft Forefront TMG Course Summary
Description Course Summary The goal of this three-day instructor-led course is to provide students with the knowledge and skills necessary to effectively plan, deploy and manage Microsoft Forefront Threat
More informationIngram Micro Cyber Security Portfolio
Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training
More informationImplementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004
Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Introduction This five-day instructor-led course provides students
More informationNetwork Security Protection Alternatives for the Cloud
A Trend Micro White Paper May 2016 Network Security Protection Alternatives for the Cloud» A technical brief summarizing the deployment options that can be used to deploy IDS/IPS protection for cloud instances
More informationMicrosoft Administering System Center Configuration Manager
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20703-1 Administering System Center Configuration Manager Length 5 days Price $4290.00 (inc GST) Version A Overview This five-day course describes how to
More informationIncident Play Book: Phishing
Incident Play Book: Phishing Issue: 1.0 Issue Date: September 12, 2017 Copyright 2017 Independent Electricity System Operator. Some Rights Reserved. The following work is licensed under the Creative Commons
More informationSecuring Windows Server 2016
Course 20744: Securing Windows Server 2016 Page 1 of 7 Securing Windows Server 2016 Course 20744: 4 days; Instructor-Led Introduction This four-day, instructor-led course teaches IT professionals how they
More informationImplementing and Maintaining Microsoft SQL Server 2008 Integration Services
Implementing and Maintaining Microsoft SQL Server 2008 Integration Services Course 6235A: Three days; Instructor-Led Introduction This three-day instructor-led course teaches students how to implement
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationReduce Your Network's Attack Surface
WHITE PAPER Reduce Your Network's Attack Surface Ixia's ThreatARMOR Frees Up Security Resources and Personnel The Threat Landscape When you re dealing with network security, one of the primary measurements
More information