This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action.

Similar documents
Trend Micro Deep Discovery Training for Certified Professionals

Trend Micro Deep Discovery Training for Certified Professionals

Trend Micro Deep Discovery Training Advanced Threat Detection 2.0 for Certified. Professionals Course Description

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

CAS Quick Deployment Guide January 2018

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson


The GenCyber Program. By Chris Ralph

ACTIVE DIRECTORY SERVICES WITH WINDOWS SERVER



Cisco Firepower NGFW. Anticipate, block, and respond to threats

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

A: Administering System Center Configuration Manager


Stopping Advanced Persistent Threats In Cloud and DataCenters

Implementing Cisco Network Security (IINS) 3.0

Trend Micro Deep Discovery and Custom Defence

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

CompTIA Mobility+ Certification


Cisco Firepower NGFW. Anticipate, block, and respond to threats

Configuring BIG-IP ASM v12.1 Application Security Manager

Active Directory Services with Windows Server

Maximum Security with Minimum Impact : Going Beyond Next Gen


Securing the Modern Data Center with Trend Micro Deep Security


Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)


COURSE OUTLINE: OD10969B Active Directory Services with Windows Server


Active Directory Services with Windows Server

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

ASACAMP - ASA Lab Camp (5316)

Audience(s) : IT Professionals Level : 300 Technology : Microsoft System Center Configuration Manager Delivery Method : Instructor-led (Classroom)

Sun Mgt Bonus Lab 11: Auto-Tagging in PAN-OS 8.X

Students interested in learning how to implement and manage the advanced NetScaler features using leading practices. Specifically:

CNS-220-1I: CITRIX NETSCALER TRAFFIC MANAGEMENT

Administering System Center Configuration Manager

Symantec Endpoint Protection Family Feature Comparison

(CNS-301) Citrix NetScaler 11 Advance Implementation

1 Introduction Requirements Architecture Feature List... 4

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

Administering System Center Configuration Manager

"Charting the Course... MOC B Active Directory Services with Windows Server Course Summary

Trend Micro Professional Services Partner Program

TREND MICRO SMART PROTECTION SUITES

Introducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

TREND MICRO SMART PROTECTION SUITES

Citrix NetScaler Essentials and Unified Gateway

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

Course Outline. Course Outline :: 20744A::


NE Administering System Center Configuration Manager and Intune

Microsoft Azure Integration and Security. Course Code: AZ-101; Duration: 4 days; Instructorled

Seqrite Endpoint Security

At a Glance: Symantec Security.cloud vs Microsoft O365 E3

Administering System Center Configuration Manager

Incident Play Book: Phishing

Trend Micro and IBM Security QRadar SIEM

SIEM Solution Integration With Control Manager

Kim Due Andersen Channel Account Manager,

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

Ransomware A case study of the impact, recovery and remediation events

BUILDING AND MAINTAINING SOC

Implementing and Maintaining Microsoft SQL Server 2008 Integration Services

Agile Security Solutions


Trend Micro OfficeScan XG

Apigee Edge Developer Training


Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Forescout. Configuration Guide. Version 8.1

SOLUTION MANAGEMENT GROUP

CNS-220-1I: Citrix NetScaler Traffic Management Essentials

Course Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack.

Course A: Administering System Center Configuration Manager

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

Active Directory Services with Windows Server

Edge Foundational Training

Understanding Cisco Cybersecurity Fundamentals

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Reduce Your Network's Attack Surface


System Center Course Administering System Center Configuration Manager. Length. Audience. 5 days

Network Security Protection Alternatives for the Cloud

Planning and Deploying System Center 2012 Configuration Manager

Transcription:

Trend Micro Trend Micro Deep Discovery Training for Certified Professionals Course ID: TMCPDD Course Overview Course Duration: 3 Days Trend Micro Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro Deep Discovery threat protection solution using: Trend Micro Deep Discovery Inspector Trend Micro Deep Discovery Analyzer Trend Micro Deep Discovery Email Inspector Participants explore key concepts and methodologies of using a blend of Deep Discovery solutions for a more complete approach to network security. This course details the architecture, deployment options, threat management and system administration fundamentals, as well as troubleshooting and best practices, for all three products. This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action. This course is taught by Trend Micro-certified trainers. Upon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Discovery. Who Needs to Attend This course is designed for IT professionals who are responsible for protecting networks from any kinds of networked, endpoint, or cloud security threats. The individuals who will typically benefit the most includes: System administrators Network engineers Support engineers Integration engineers Solution & security architects

Course Certifications Trend Micro Certified Professional for Deep Discovery Prerequisites Before you take this course, trend micro recommends that you have a working knowledge of their products and services as well as basic networking concepts and principles. You should also have a working knowledge of the following products: Windows servers and clients Firewalls, Web Application Firewalls, Packet Inspection devices General understanding of malware Course Content Module 1: Introduction Evolving Threats Traditional Security Anatomy of a Targeted Attack Point of Entry - Spear Phishing How Long Can Targeted Attacks Stay Hidden? Why Monitor Your Network? Why Deep Discovery? Module 2: Deep Discovery Solution Overview What is Deep Discovery? Deep Discovery Attack Detection Deep Discovery Threat Detection Technologies Deep Discovery Solution Map - Trend Micro Deep Discovery Inspector - Trend Micro Deep Discovery Analyzer - Trend Micro Deep Discovery Email Inspector - Control Manager - Custom Threat Defense - Deep Discovery Director Module 3: Deep Discovery Inspector Key Features and Benefits Network Setup Form Factors Deep Discovery Inspector Models

Module 4: Deep Discovery Inspector Installation and Configuration Installation Design Deployment Example and Scenarios System Requirements Installing Deep Discovery Inspector - Information Provisioning for Setup - Defining Architecture and Traffic to Capture - Obtaining ISOs, Hot Fixes/Patches - Performing an Installation - Configuring Initial System Settings (Pre-Configuration Console) - Finalizing Deep Discovery Inspector Configuration (Web Console) - Testing the Deployment - Viewing Installation Logs - Connecting Deep Discovery Inspector to Deep Discovery Director Module 5: Threat Detect Technologies Network Content Inspection Engine (NCIE / VSAPI) Advanced Threat Scan Engine (ATSE / VSAPI) Network Content Inspection Engine (NCIE / VSAPI) Network Content Correlation Engine (NCCE / CAV) Virtual Analyzer Census Certified Safe Software Service (CSSS / GRID) Trend Micro URL Filtering Engine (TMUFE) Network Reputation with Smart Protection Network Mobile Application Reputation Service (MARS) Module 6: Deep Discovery Inspector Management and Administration Administration Methods Default Accounts Threat Management and Configuration System Management and Configuration Monitoring System Performance and Resources Troubleshooting Resource Issues Module 7: Deep Discovery Inspector Logs and Reports Accessing System Logs Debug Logs Determining Log Entities Reporting Logs - Event Classification Debug Portal Threat Reports

Module 8: Virtual Analyzer What is Virtual Analyzer Looking For? Virtual Analyzer Components Process Flow for Samples Overall Sample Ratings and Risk Level Virtual Analyzer Outputs Virtual Analyzer Report How to Explain a Malicious Result Sending Files to Virtual Analyzer for Analysis Virtual Analyzer Feedback in Deep Discovery Inspector Importing a Custom Sandbox into Deep Discovery Inspector for use by the Virtual Analyzer Module 9: Deep Discovery Analyzer Installation and Configuration Information Provisioning Defining the Architecture Obtaining ISOs, Hot Fixes/Patches Performing the Installation Configuring Initial System Settings Configuring Final Settings for Deep Discovery Analyzer Testing the Deployment Module 10: Deep Discovery Analyzer Administration Console Overview General Administrative Tasks Troubleshooting Module 11: Deep Discovery Email Inspector Functionality Supported Hardware Deployment Modes Ports Used Summary of Operation Modes Threat Detection in Deep Discovery Email Inspector Module 12: Deep Discovery Email Inspector Installation and Configuration Information Provisioning Defining the Architecture Obtain ISOs, Hot Fixes/Patches Performing the Installation Completing Pre-Configuration Configuring Final Deep Discovery Email Inspector Settings Testing the Deployment

Module 13: Deep Discovery Email Inspector Administration Management Console Overview How to View Detections Configuring Policies Setting up Recipient Notifications Defining Email Message Tags Configuring Redirects (Non-Scannable Attachments) Adding Policy Exceptions Configuring Alerts Generating Reports Accessing Log Files System Administration and Management Performing System Maintenance Tasks Module 14: Threat Connect Content Using Threat Connect Report Content Module 15: Connected Threat Defense Integration is Key to Effective Security Connected Threat Defense Requirements Connected Threat Defense Components Suspicious Objects Handling Suspicious Objects Trend Micro Control Manager Integrating Deep Discovery Inspector with Control Manager Integration Module 16: Open Architecture Deep Discovery Inspector Integration Integration with Syslog Servers and SIEM Systems Third-Party Blocking Integration Deep Discovery Analyzer Integration Copyright 2018 Trainocate. All rights reserved.