Trend Micro Deep Discovery Training for Certified Professionals

Similar documents
This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action.

Trend Micro Deep Discovery Training for Certified Professionals

Trend Micro Deep Discovery Training Advanced Threat Detection 2.0 for Certified. Professionals Course Description

Fundamentals of IBM Lotus Domino Application Development

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux


Citrix NetScaler Basic and Advanced Administration Bootcamp


Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

CompTIA CSA+ Cybersecurity Analyst

CAS Quick Deployment Guide January 2018

A: Administering System Center Configuration Manager

Advanced Windows Store App Development Using C#


ACTIVE DIRECTORY SERVICES WITH WINDOWS SERVER

CompTIA Mobility+ Certification

Cisco Firepower NGFW. Anticipate, block, and respond to threats

The GenCyber Program. By Chris Ralph


Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Implementing Cisco Network Security (IINS) 3.0


Course Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack.

Maximum Security with Minimum Impact : Going Beyond Next Gen

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Configuring BIG-IP ASM v12.1 Application Security Manager

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

1 Introduction Requirements Architecture Feature List... 4

Active Directory Services with Windows Server


The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Administering System Center Configuration Manager



(CNS-301) Citrix NetScaler 11 Advance Implementation

Trend Micro Deep Discovery and Custom Defence

Stopping Advanced Persistent Threats In Cloud and DataCenters

CNS-220-1I: CITRIX NETSCALER TRAFFIC MANAGEMENT

Symantec Endpoint Protection Family Feature Comparison

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Administering System Center Configuration Manager

COURSE OUTLINE: OD10969B Active Directory Services with Windows Server

Sun Mgt Bonus Lab 11: Auto-Tagging in PAN-OS 8.X

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

Administering System Center Configuration Manager

Introducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led


Trend Micro Professional Services Partner Program

Microsoft Azure Integration and Security. Course Code: AZ-101; Duration: 4 days; Instructorled

Course Outline. Course Outline :: 20744A::

Active Directory Services with Windows Server

NE Administering System Center Configuration Manager and Intune

Securing the Modern Data Center with Trend Micro Deep Security

Core Solutions of Microsoft Exchange Server 2013

CNS-220-1I: Citrix NetScaler Traffic Management Essentials

TREND MICRO SMART PROTECTION SUITES

Course A: Administering System Center Configuration Manager

Audience(s) : IT Professionals Level : 300 Technology : Microsoft System Center Configuration Manager Delivery Method : Instructor-led (Classroom)

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar

Active Directory Services with Windows Server

TREND MICRO SMART PROTECTION SUITES

Students interested in learning how to implement and manage the advanced NetScaler features using leading practices. Specifically:

System Center Course Administering System Center Configuration Manager. Length. Audience. 5 days

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Cybersecurity Auditing in an Unsecure World

"Charting the Course... MOC B Active Directory Services with Windows Server Course Summary

At a Glance: Symantec Security.cloud vs Microsoft O365 E3

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation

Copyright 2011 Trend Micro Inc.

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Understanding Cisco Cybersecurity Fundamentals

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

ASACAMP - ASA Lab Camp (5316)

Citrix NetScaler Essentials and Unified Gateway

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data


SOLUTION MANAGEMENT GROUP

Trend Micro and IBM Security QRadar SIEM

McAfee Web Gateway Administration

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Network Security Platform Administration Course

Administering System Center Configuration Manager ( A)

BUILDING AND MAINTAINING SOC

Ransomware A case study of the impact, recovery and remediation events

"Charting the Course... MOC A Planning, Deploying and Managing Microsoft Forefront TMG Course Summary

Ingram Micro Cyber Security Portfolio

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

Network Security Protection Alternatives for the Cloud

Microsoft Administering System Center Configuration Manager

Incident Play Book: Phishing

Securing Windows Server 2016

Implementing and Maintaining Microsoft SQL Server 2008 Integration Services



Reduce Your Network's Attack Surface

Transcription:

Trend Micro Deep Discovery Training for Certified Professionals Duration: 3 Days Course Code: TMDD Overview: Trend Micro Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro Deep Discovery threat protection solution using: Trend Micro Deep Discovery Inspector Trend Micro Deep Discovery Analyzer Trend Micro Deep Discovery Email Inspector Participants explore key concepts and methodologies of using a blend of Deep Discovery solutions for a more complete approach to network security. This course details the architecture, deployment options, threat management and system administration fundamentals, as well as troubleshooting and best practices, for all three products. This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action. This course is taught by Trend Micro-certified trainers. Upon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Discovery. Target Audience: This course is designed for IT professionals who are responsible for protecting networks from any kind of networked, endpoint, or cloud security threats. The individuals who will typically benefit the most include: System administratorsnetwork engineerssupport EngineersIntegration EngineersSolution & Security Architects Prerequisites: Before you take this course, Trend Micro recommends that you have a working knowledge of their products and services, as well as basic networking concepts and principles. You should also have a working knowledge of the following products: Windows servers and clients Firewalls, Web Application Firewalls, Packet Inspection devices General understanding of malware Participants are required to bring a laptop computer with a screen resolution of at least 1980 x 1080 or above; a display size of 15" or above is recommended.

Content: Introduction Evolving Threats Network Content Inspection Engine Network Content Inspection Engine (NCIE Traditional Security (NCIE / / Anatomy of a Targeted Attack Advanced Threat Scan Engine (ATSE / Advanced Threat Scan Engine (ATSE / Point of Entry - Spear Phishing How Long Can Targeted Attacks Stay Network Content Inspection Engine Network Content Inspection Engine (NCIE Hidden? (NCIE / / Why Monitor Your Network? Network Content Correlation Engine Network Content Correlation Engine Why Deep Discovery? (NCCE / CAV) (NCCE / CAV) Deep Discovery Solution Overview Census Census Certified Safe Software Service (CSSS / Certified Safe Software Service (CSSS / What is Deep Discovery? GRID) GRID) Deep Discovery Attack Detection Trend Micro URL Filtering Engine Trend Micro URL Filtering Engine Deep Discovery Threat Detection (TMUFE) (TMUFE) Technologies Network Reputation with Smart Network Reputation with Smart Protection Deep Discovery Solution Map Protection Network Network - Trend Micro Deep Discovery Inspector Mobile Application Reputation Service Mobile Application Reputation Service - Trend Micro Deep Discovery Analyzer (MARS (MARS - Trend Micro Deep Discovery Email Administration Methods Administration Methods Inspector Default Accounts Default Accounts - Threat Management and Configuration Threat Management and Configuration - Custom Threat Defense - Deep Discovery Director Monitoring System Performance and Monitoring System Performance and Deep Discovery Inspector Key Features and Benefits Supported Hardware Supported Hardware Network Setup Deployment Modes Deployment Modes Form Factors Ports Used Ports Used Deep Discovery Inspector Models Summary of Operation Modes Summary of Operation Modes Threat Detection in Deep Discovery Threat Detection in Deep Discovery Email Deep Discovery Inspector Installation and Email Inspector Inspector Configuration Information Provisioning Information Provisioning Installation Design Obtain ISOs, Hot Fixes/Patches Obtain ISOs, Hot Fixes/Patches Deployment Example and Scenarios Performing the Installation Performing the Installation System Requirements Installing Deep Discovery Inspector Configuring Final Deep Discovery Email Configuring Final Deep Discovery Email - Information Provisioning for Setup Inspector Settings Inspector Settings - Defining Architecture and Traffic to Capture Content Content - Obtaining ISOs, Hot Fixes/Patches - Performing an Installation - Configuring Initial System Settings Integration is Key to Effective Security Integration is Key to Effective Security (Pre-Configuration Console) Connected Threat Defense Requirements Connected Threat Defense Requirements - Finalizing Deep Discovery Inspector Connected Threat Defense Components Connected Threat Defense Components Configuration (Web Console) - Handling Handling - Viewing Installation Logs Trend Micro Trend Micro - Connecting Deep Discovery Inspector to Integrating Deep Discovery Inspector with Integrating Deep Discovery Inspector with Deep Discovery Director Threat Detect Technologies Deep Discovery Inspector Logs and Reports Deep Discovery Email Inspector Administration Accessing System Logs Debug Logs Management Console Overview Determining Log Entities How to View Detections Network Content Inspection Engine (NCIE / Reporting Logs - Event Classification Configuring Policies Debug Portal Setting up Recipient Notifications Advanced Threat Scan Engine (ATSE / Threat Reports Defining Email Message Tags Configuring Redirects (Non-Scannable Network Content Inspection Engine (NCIE / Attachments)

Adding Policy Exceptions Network Content Correlation Engine (NCCE What is Looking For? Configuring Alerts / CAV) Components Generating Reports Process Flow for Samples Accessing Log Files Census Overall Sample Ratings and Risk Level System Administration and Management Certified Safe Software Service (CSSS / Outputs Performing System Maintenance Tasks GRID) Report Trend Micro URL Filtering Engine (TMUFE) How to Explain a Malicious Result Threat Connect Network Reputation with Smart Protection Sending Files to for Network Analysis Mobile Application Reputation Service Feedback in Deep (MARS Discovery Inspector Administration Methods Importing a Custom Sandbox into Deep Network Content Inspection Engine (NCIE Default Accounts Discovery Inspector for use by the Virtual / Threat Management and Configuration Analyzer Advanced Threat Scan Engine (ATSE / Monitoring System Performance and Deep Discovery Analyzer Installation and Network Content Inspection Engine (NCIE Configuration / Network Content Correlation Engine Information Provisioning (NCCE / CAV) Supported Hardware Deployment Modes Obtaining ISOs, Hot Fixes/Patches Census Ports Used Performing the Installation Certified Safe Software Service (CSSS / Summary of Operation Modes Configuring Initial System Settings GRID) Threat Detection in Deep Discovery Email Configuring Final Settings for Deep Trend Micro URL Filtering Engine Inspector Discovery Analyzer (TMUFE) Information Provisioning Network Reputation with Smart Protection Network Obtain ISOs, Hot Fixes/Patches Deep Discovery Analyzer Administration Mobile Application Reputation Service Performing the Installation (MARS Console Overview Administration Methods Configuring Final Deep Discovery Email General Administrative Tasks Default Accounts Inspector Settings Troubleshooting Threat Management and Configuration Content Deep Discovery Email Inspector Monitoring System Performance and Integration is Key to Effective Security Connected Threat Defense Requirements Supported Hardware Connected Threat Defense Components Network Content Inspection Engine Deployment Modes (NCIE / Ports Used Handling Advanced Threat Scan Engine (ATSE / Summary of Operation Modes Trend Micro Threat Detection in Deep Discovery Email Integrating Deep Discovery Inspector with Network Content Inspection Engine Inspector (NCIE / Information Provisioning Network Content Correlation Engine ) (NCCE / CAV) Obtain ISOs, Hot Fixes/Patches Performing the Installation Census Deep Discovery Inspector Management and Certified Safe Software Service (CSSS / Configuring Final Deep Discovery Email Administration GRID) Inspector Settings Trend Micro URL Filtering Engine (TMUFE) Content Network Reputation with Smart Protection Network Mobile Application Reputation Service Integration is Key to Effective Security (MARS Connected Threat Defense Requirements Administration Methods Connected Threat Defense Components Default Accounts Threat Management and Configuration Handling Trend Micro Monitoring System Performance and Integrating Deep Discovery Inspector with Connected Threat Defense Supported Hardware

Deployment Modes Ports Used Summary of Operation Modes Threat Detection in Deep Discovery Network Content Inspection Engine (NCIE Email Inspector / Information Provisioning Advanced Threat Scan Engine (ATSE / Obtain ISOs, Hot Fixes/Patches Network Content Inspection Engine (NCIE Performing the Installation / Network Content Correlation Engine Configuring Final Deep Discovery Email (NCCE / CAV) Inspector Settings Census Content Certified Safe Software Service (CSSS / GRID) Trend Micro URL Filtering Engine Integration is Key to Effective Security (TMUFE) Connected Threat Defense Requirements Network Reputation with Smart Protection Connected Threat Defense Components Network Mobile Application Reputation Service Handling (MARS Trend Micro Administration Methods Integrating Deep Discovery Inspector with Default Accounts Threat Management and Configuration Deep Discovery Email Inspector Installation Monitoring System Performance and and Configuration Supported Hardware Deployment Modes Ports Used Summary of Operation Modes Threat Detection in Deep Discovery Email Inspector Information Provisioning Obtain ISOs, Hot Fixes/Patches Performing the Installation Configuring Final Deep Discovery Email Inspector Settings Content Integration is Key to Effective Security Connected Threat Defense Requirements Connected Threat Defense Components Handling Trend Micro Integrating Deep Discovery Inspector with Integration Open Architecture Deep Discovery Inspector Integration Integration with Syslog Servers and SIEM Systems Third-Party Blocking Integration Deep Discovery Analyzer Integration

Further Information: For More information, or to book your course, please call us on 00 20 (0) 2 2269 1982 or 16142 training@globalknowledge.com.eg www.globalknowledge.com.eg Global Knowledge, 16 Moustafa Refaat St. Block 1137, Sheraton Buildings, Heliopolis, Cairo