Trend Micro Deep Discovery Training for Certified Professionals

Similar documents
This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action.

Trend Micro Deep Discovery Training for Certified Professionals

Trend Micro Deep Discovery Training Advanced Threat Detection 2.0 for Certified. Professionals Course Description


EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux


Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson



CAS Quick Deployment Guide January 2018

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar




Stopping Advanced Persistent Threats In Cloud and DataCenters

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference


A: Administering System Center Configuration Manager


The GenCyber Program. By Chris Ralph

Sun Mgt Bonus Lab 11: Auto-Tagging in PAN-OS 8.X

Audience(s) : IT Professionals Level : 300 Technology : Microsoft System Center Configuration Manager Delivery Method : Instructor-led (Classroom)



Trend Micro Deep Discovery and Custom Defence

Maximum Security with Minimum Impact : Going Beyond Next Gen


Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

1 Introduction Requirements Architecture Feature List... 3


Administering System Center Configuration Manager

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

Administering System Center Configuration Manager

Cisco Firepower NGFW. Anticipate, block, and respond to threats

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Symantec Endpoint Protection Family Feature Comparison

CNS-220-1I: CITRIX NETSCALER TRAFFIC MANAGEMENT

Trend Micro and IBM Security QRadar SIEM

ACTIVE DIRECTORY SERVICES WITH WINDOWS SERVER

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro


CompTIA Mobility+ Certification

Incident Play Book: Phishing

Implementing Cisco Network Security (IINS) 3.0

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Compare Security Analytics Solutions


Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

vrealize Automation Management Pack 2.0 Guide

Planning and Deploying System Center 2012 Configuration Manager

McAfee Web Gateway Administration

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Securing the Modern Data Center with Trend Micro Deep Security

Course A: Administering System Center Configuration Manager

Configuring BIG-IP ASM v12.1 Application Security Manager

System Center Course Administering System Center Configuration Manager. Length. Audience. 5 days

McAfee Network Security Platform Administration Course


Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010

Information Security Specialist. IPS effectiveness

(CNS-301) Citrix NetScaler 11 Advance Implementation

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

INTEGRATING OKTA: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

CNS-220-1I: Citrix NetScaler Traffic Management Essentials

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

Designing and Building a Cybersecurity Program

1 Introduction Requirements Architecture Feature List... 4

ACTIONABLE SECURITY INTELLIGENCE

Administering System Center Configuration Manager ( A)

COURSE OUTLINE: OD10969B Active Directory Services with Windows Server

Security, Internet Access, and Communication Ports


Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Bitdefender GravityZone. Supreme protection against active threats for the SMB market

Juniper Sky Advanced Threat Prevention

TREND MICRO SMART PROTECTION SUITES

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

JUNIPER SKY ADVANCED THREAT PREVENTION

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

IBM CLOUD APP ANALYTICS FOR QRADAR

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

TREND MICRO SMART PROTECTION SUITES

Security, Internet Access, and Communication Ports

Copyright 2011 Trend Micro Inc.

Administering System Center Configuration Manager

Course Outline. CCNA Cyber Ops SECOPS Official Cert Guide (Course & Labs)

Active Directory Services with Windows Server

Security by Default: Enabling Transformation Through Cyber Resilience


Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Security, Internet Access, and Communication Ports

Trend Micro Deep Security

Trend Micro Professional Services Partner Program

Course Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack.

How Vectra Cognito enables the implementation of an adaptive security architecture

Transcription:

Trend Micro Deep Discovery Training for Certified Professionals Length Courseware 3 days Hard or soft copy provided. Course Description Trend Micro Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro Deep Discovery threat protection solution using: Trend Micro Deep Discovery Inspector Trend Micro Deep Discovery Analyser Trend Micro Deep Discovery Email Inspector Participants explore key concepts and methodologies of using a blend of Deep Discovery solutions for a more complete approach to network security. This course details the architecture, deployment options, threat management and system administration fundamentals, as well as troubleshooting and best practices, for all three products. This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action. This course is taught by Trend Micro-certified trainers. Upon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Discovery. Target Audience This course is designed for IT professionals who are responsible for protecting networks from any kind of networked, endpoint, or cloud security threats. The individuals who will typically benefit the most include: System administrators Network engineers Support Engineers Integration Engineers Solution & Security Architects Course Prerequisites Before you take this course, Trend Micro recommends that you have a working knowledge of their products and services, as well as basic networking concepts and principles. You should also have a working knowledge of the following products: Windows servers and clients Firewalls, Web Application Firewalls, Packet Inspection devices General understanding of malware Participants are required to bring a laptop computer with a screen resolution of at least 1980 x 1080 or above; a display size of 15" or above is recommended.

Course Topics Introduction Evolving Threats Anatomy of a Targeted Attack Point of Entry - Spear Phishing How Long Can Targeted Attacks Stay Hidden? Why Monitor Your Network? Why Deep Discovery? Deep Discovery Solution Overview What is Deep Discovery? Deep Discovery Attack Detection Deep Discovery Threat Detection Overview Deep Discovery Solution Map o Trend Micro Deep Discovery Inspector o Trend Micro Deep Discovery Analyser o Trend Micro Deep Discovery Email Inspector o Control Manager o Custom Threat Defence o Deep Discovery Director Deep Discovery Inspector Overview Architecture Key Features and Benefits Network Setup Form Factors Deep Discovery Inspector Models Deep Discovery Inspector Requirements Installation Design Positioning Deep Discover Inspector in the Network What s new in Deep Discover Inspector 3.8 SP5? Deep Discovery Inspector Installation and Configuration Information Provisioning for Setup Defining Architecture and Traffic to Capture Obtaining ISOs, Hot Fixes/Patches Performing an Installation Configuring Initial System Settings (Pre-Configuration Console) Finalizing Deep Discovery Inspector Configuration (Web Console) Viewing Installation Logs Enabling IP Rewriting Connecting Deep Discovery Inspector to Deep Discovery Director

Threat Detect Technologies Acronyms Detection Logic Engines versus Detections Network Content Inspection Engine (NCIE / VSAPI) Advanced Threat Scan Engine (ATSE / VSAPI) Network Content Correlation Engine (NCCE / CAV) Virtual Analyser Community File Reputation (Census) Certified Safe Software Service (CSSS / GRID) Trend Micro URL Filtering Engine (TMUFE) Network Reputation with Smart Protection Network Mobile Application Reputation Service (MARS) Summary - Detection Events and Actions Virtual Analyzer Virtual Analyzer Functionality What is Virtual Analyzer Looking For? Virtual Analyzer Components Communications Flow for Samples Overall Sample Ratings and Risk Level Virtual Analyzer Outputs File Processing Time Supported File Types How to Explain a Malicious Result Sending Files to Virtual Analyzer for Analysis Virtual Analyzer Feedback in Deep Discovery Inspector Importing a Custom Sandbox into Deep Discovery Inspector for use by the Virtual Analyzer Troubleshooting Deep Discovery Inspector Administration Default Accounts Dashboard Analyzing Detected Threats Running Reports and Obtaining Threat Detection Metrics Report Examples System Management and Configuration Accessing Log Files Monitoring System Performance and Resources Deep Discovery Analyzer Product Overview Key Features Network Setup Form Factors Required Services and Port Information Uniquely Identifying Samples

Integration What s New in Deep Discovery Analyzer 5.8? Deep Discovery Analyzer Installation and Configuration Information Provisioning Defining the Architecture Obtaining ISOs, Hot Fixes/Patches Performing the Installation Configuring Initial System Settings Configuring Final Settings for Deep Discovery Analyzer Deep Discovery Analyzer Administration Accessing the Web Console Console Overview Analyzing Events Submitting Samples to Deep Discovery Analyzer Deep Discovery Analyzer Reports Managing Suspicious Objects List Exceptions Deep Discovery Analyzer Sandbox Management Reports Alerts System Management and Configuration Deep Discovery Email Inspector Key Functionality Supported Hardware Deployment Modes Ports Used Summary of Operation Modes Threat Detection in Deep Discovery Email Inspector Engine Architecture Overview What s New in Deep Discovery Email Inspector 2.6? Deep Discovery Email Inspector Installation and Configuration Information Provisioning Defining the Architecture Obtain ISOs, Hot Fixes/Patches Performing the Installation Configuring Initial System Settings using the Pre-Configuration Tool Configuring Final Deep Discovery Email Inspector Settings Connecting Deep Discovery Email Inspector to Deep Discovery Director

Deep Discovery Email Inspector Administration Management Console Overview Analyzing Threat Detections Configuring Policies Setting up Recipient Notifications Defining Email Message Tags Configuring Redirects (Non-Scannable Attachments) Adding Policy Exceptions Configuring Alerts Generating Reports Accessing Log Files System Administration Performing System Maintenance Tasks Threat Connect Content Using Threat Connect Report Content Connected Threat Defense Integration Integration is Key to Effective Security Connected Threat Defense Requirements Connected Threat Defense Components Integrating Deep Discovery Inspector with Control Manager Suspicious Objects Handling with Control Manager Open Architecture Deep Discovery Inspector Integration Integration with Syslog Servers and SIEM Systems Third-Party Blocking Integration o Check Point Open Platform for Security o HP TippingPoint Security Management System o IBM Security Network Protection o Palo Alto Firewalls Blue Coat ProxySG Deep Discovery Analyzer Integration