Trend Micro Deep Discovery Training for Certified Professionals Duration: 3 Days Course Code: TMDD Overview: Trend Micro Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro Deep Discovery threat protection solution using: Trend Micro Deep Discovery Inspector Trend Micro Deep Discovery Analyzer Trend Micro Deep Discovery Email Inspector Participants explore key concepts and methodologies of using a blend of Deep Discovery solutions for a more complete approach to network security. This course details the architecture, deployment options, threat management and system administration fundamentals, as well as troubleshooting and best practices, for all three products. This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action. This course is taught by Trend Micro-certified trainers. Upon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Discovery. Target Audience: This course is designed for IT professionals who are responsible for protecting networks from any kind of networked, endpoint, or cloud security threats. The individuals who will typically benefit the most include: System administratorsnetwork engineerssupport EngineersIntegration EngineersSolution & Security Architects Prerequisites: Before you take this course, Trend Micro recommends that you have a working knowledge of their products and services, as well as basic networking concepts and principles. You should also have a working knowledge of the following products: Windows servers and clients Firewalls, Web Application Firewalls, Packet Inspection devices General understanding of malware Participants are required to bring a laptop computer with a screen resolution of at least 1980 x 1080 or above; a display size of 15" or above is recommended.
Content: Introduction Evolving Threats Network Content Inspection Engine Network Content Inspection Engine (NCIE Traditional Security (NCIE / / Anatomy of a Targeted Attack Advanced Threat Scan Engine (ATSE / Advanced Threat Scan Engine (ATSE / Point of Entry - Spear Phishing How Long Can Targeted Attacks Stay Network Content Inspection Engine Network Content Inspection Engine (NCIE Hidden? (NCIE / / Why Monitor Your Network? Network Content Correlation Engine Network Content Correlation Engine Why Deep Discovery? (NCCE / CAV) (NCCE / CAV) Deep Discovery Solution Overview Census Census Certified Safe Software Service (CSSS / Certified Safe Software Service (CSSS / What is Deep Discovery? GRID) GRID) Deep Discovery Attack Detection Trend Micro URL Filtering Engine Trend Micro URL Filtering Engine Deep Discovery Threat Detection (TMUFE) (TMUFE) Technologies Network Reputation with Smart Network Reputation with Smart Protection Deep Discovery Solution Map Protection Network Network - Trend Micro Deep Discovery Inspector Mobile Application Reputation Service Mobile Application Reputation Service - Trend Micro Deep Discovery Analyzer (MARS (MARS - Trend Micro Deep Discovery Email Administration Methods Administration Methods Inspector Default Accounts Default Accounts - Threat Management and Configuration Threat Management and Configuration - Custom Threat Defense - Deep Discovery Director Monitoring System Performance and Monitoring System Performance and Deep Discovery Inspector Key Features and Benefits Supported Hardware Supported Hardware Network Setup Deployment Modes Deployment Modes Form Factors Ports Used Ports Used Deep Discovery Inspector Models Summary of Operation Modes Summary of Operation Modes Threat Detection in Deep Discovery Threat Detection in Deep Discovery Email Deep Discovery Inspector Installation and Email Inspector Inspector Configuration Information Provisioning Information Provisioning Installation Design Obtain ISOs, Hot Fixes/Patches Obtain ISOs, Hot Fixes/Patches Deployment Example and Scenarios Performing the Installation Performing the Installation System Requirements Installing Deep Discovery Inspector Configuring Final Deep Discovery Email Configuring Final Deep Discovery Email - Information Provisioning for Setup Inspector Settings Inspector Settings - Defining Architecture and Traffic to Capture Content Content - Obtaining ISOs, Hot Fixes/Patches - Performing an Installation - Configuring Initial System Settings Integration is Key to Effective Security Integration is Key to Effective Security (Pre-Configuration Console) Connected Threat Defense Requirements Connected Threat Defense Requirements - Finalizing Deep Discovery Inspector Connected Threat Defense Components Connected Threat Defense Components Configuration (Web Console) - Handling Handling - Viewing Installation Logs Trend Micro Trend Micro - Connecting Deep Discovery Inspector to Integrating Deep Discovery Inspector with Integrating Deep Discovery Inspector with Deep Discovery Director Threat Detect Technologies Deep Discovery Inspector Logs and Reports Deep Discovery Email Inspector Administration Accessing System Logs Debug Logs Management Console Overview Determining Log Entities How to View Detections Network Content Inspection Engine (NCIE / Reporting Logs - Event Classification Configuring Policies Debug Portal Setting up Recipient Notifications Advanced Threat Scan Engine (ATSE / Threat Reports Defining Email Message Tags Configuring Redirects (Non-Scannable Network Content Inspection Engine (NCIE / Attachments)
Adding Policy Exceptions Network Content Correlation Engine (NCCE What is Looking For? Configuring Alerts / CAV) Components Generating Reports Process Flow for Samples Accessing Log Files Census Overall Sample Ratings and Risk Level System Administration and Management Certified Safe Software Service (CSSS / Outputs Performing System Maintenance Tasks GRID) Report Trend Micro URL Filtering Engine (TMUFE) How to Explain a Malicious Result Threat Connect Network Reputation with Smart Protection Sending Files to for Network Analysis Mobile Application Reputation Service Feedback in Deep (MARS Discovery Inspector Administration Methods Importing a Custom Sandbox into Deep Network Content Inspection Engine (NCIE Default Accounts Discovery Inspector for use by the Virtual / Threat Management and Configuration Analyzer Advanced Threat Scan Engine (ATSE / Monitoring System Performance and Deep Discovery Analyzer Installation and Network Content Inspection Engine (NCIE Configuration / Network Content Correlation Engine Information Provisioning (NCCE / CAV) Supported Hardware Deployment Modes Obtaining ISOs, Hot Fixes/Patches Census Ports Used Performing the Installation Certified Safe Software Service (CSSS / Summary of Operation Modes Configuring Initial System Settings GRID) Threat Detection in Deep Discovery Email Configuring Final Settings for Deep Trend Micro URL Filtering Engine Inspector Discovery Analyzer (TMUFE) Information Provisioning Network Reputation with Smart Protection Network Obtain ISOs, Hot Fixes/Patches Deep Discovery Analyzer Administration Mobile Application Reputation Service Performing the Installation (MARS Console Overview Administration Methods Configuring Final Deep Discovery Email General Administrative Tasks Default Accounts Inspector Settings Troubleshooting Threat Management and Configuration Content Deep Discovery Email Inspector Monitoring System Performance and Integration is Key to Effective Security Connected Threat Defense Requirements Supported Hardware Connected Threat Defense Components Network Content Inspection Engine Deployment Modes (NCIE / Ports Used Handling Advanced Threat Scan Engine (ATSE / Summary of Operation Modes Trend Micro Threat Detection in Deep Discovery Email Integrating Deep Discovery Inspector with Network Content Inspection Engine Inspector (NCIE / Information Provisioning Network Content Correlation Engine ) (NCCE / CAV) Obtain ISOs, Hot Fixes/Patches Performing the Installation Census Deep Discovery Inspector Management and Certified Safe Software Service (CSSS / Configuring Final Deep Discovery Email Administration GRID) Inspector Settings Trend Micro URL Filtering Engine (TMUFE) Content Network Reputation with Smart Protection Network Mobile Application Reputation Service Integration is Key to Effective Security (MARS Connected Threat Defense Requirements Administration Methods Connected Threat Defense Components Default Accounts Threat Management and Configuration Handling Trend Micro Monitoring System Performance and Integrating Deep Discovery Inspector with Connected Threat Defense Supported Hardware
Deployment Modes Ports Used Summary of Operation Modes Threat Detection in Deep Discovery Network Content Inspection Engine (NCIE Email Inspector / Information Provisioning Advanced Threat Scan Engine (ATSE / Obtain ISOs, Hot Fixes/Patches Network Content Inspection Engine (NCIE Performing the Installation / Network Content Correlation Engine Configuring Final Deep Discovery Email (NCCE / CAV) Inspector Settings Census Content Certified Safe Software Service (CSSS / GRID) Trend Micro URL Filtering Engine Integration is Key to Effective Security (TMUFE) Connected Threat Defense Requirements Network Reputation with Smart Protection Connected Threat Defense Components Network Mobile Application Reputation Service Handling (MARS Trend Micro Administration Methods Integrating Deep Discovery Inspector with Default Accounts Threat Management and Configuration Deep Discovery Email Inspector Installation Monitoring System Performance and and Configuration Supported Hardware Deployment Modes Ports Used Summary of Operation Modes Threat Detection in Deep Discovery Email Inspector Information Provisioning Obtain ISOs, Hot Fixes/Patches Performing the Installation Configuring Final Deep Discovery Email Inspector Settings Content Integration is Key to Effective Security Connected Threat Defense Requirements Connected Threat Defense Components Handling Trend Micro Integrating Deep Discovery Inspector with Integration Open Architecture Deep Discovery Inspector Integration Integration with Syslog Servers and SIEM Systems Third-Party Blocking Integration Deep Discovery Analyzer Integration
Further Information: For More information, or to book your course, please call us on 00 20 (0) 2 2269 1982 or 16142 training@globalknowledge.com.eg www.globalknowledge.com.eg Global Knowledge, 16 Moustafa Refaat St. Block 1137, Sheraton Buildings, Heliopolis, Cairo