Trend Micro Certification Training

BY
Careerera

Mode

Online

Duration

24 Hours

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study, Virtual Classroom +1 more
Mode of Delivery Video and Text Based

Course and certificate fees

certificate availability

Yes

certificate providing authority

Careerera

The syllabus

Chapter - 1: Introduction

Chapter - 1.1: Evolving Threats

Chapter - 1.2: Traditional Security

Chapter - 1.3: Anatomy of a Targeted Attack

Chapter - 1.4: Point of Entry - Spear Phishing

Chapter - 1.5: How Long Can Targeted Attacks Stay Hidden?

Chapter - 1.6: Why Monitor Your Network?

Chapter - 1.7: Why Deep Discovery?

Chapter - 2: Deep Discovery Solution Overview

Chapter - 2.1: What is Deep Discovery?

Chapter - 2.2: Deep Discovery Attack Detection

Chapter - 2.3: Deep Discovery Threat Detection Technologies

Chapter - 2.4: Deep Discovery Solution Map

Chapter - 2.5: Trend Micro Deep Discovery Inspector

Chapter - 2.6: Trend Micro Deep Discovery Analyzer

Chapter - 2.7: Trend Micro Deep Discovery Email Inspector

Chapter - 2.8: Control Manager

Chapter - 2.9: Custom Threat Defense

Chapter - 2.10: Deep Discovery Director

Chapter - 3: Deep Discovery Inspector

Chapter - 3.1: Key Features and Benefits

Chapter - 3.2: Network Setup

Chapter - 3.3: Form Factors

Chapter - 3.4: Deep Discovery Inspector Models

Chapter - 4: Deep Discovery Inspector Installation and Configuration

Chapter - 4.1: Installation Design

Chapter - 4.2: Deployment Example and Scenarios

Chapter - 4.3: System Requirements

Chapter - 4.4: Installing Deep Discovery Inspector

Chapter - 4.5: Information Provisioning for Setup

Chapter - 4.6: Defining Architecture and Traffic to Capture

Chapter - 4.7: Obtaining ISOs, Hot Fixes/Patches

Chapter - 4.8: Performing an Installation

Chapter - 4.9: Configuring Initial System Settings (Pre-Configuration Console)

Chapter - 4.10: Finalizing Deep Discovery Inspector Configuration (Web Console)

Chapter - 4.11: Testing the Deployment

Chapter - 4.12: Viewing Installation Logs

Chapter - 4.13: Linking Deep Discovery Inspector to Deep Discovery Director

Chapter - 5: Threat Detect Technologies

Chapter - 5.1: Network Content Inspection Engine (NCIE / VSAPI)

Chapter - 5.2: Advanced Threat Scan Engine (ATSE / VSAPI)

Chapter - 5.3: Network Content Inspection Engine (NCIE / VSAPI)

Chapter - 5.4: Network Content Correlation Engine (NCCE / CAV)

Chapter - 5.5: Virtual Analyzer

Chapter - 5.6: Census

Chapter - 5.7: Certified Safe Software Service (CSSS / GRID)

Chapter - 5.8: Trend Micro URL Filtering Engine (TMUFE)

Chapter - 5.9: Network Reputation with Smart Protection Network

Chapter - 5.10: Mobile Application Reputation Service (MARS)

Chapter - 6: Deep Discovery Inspector Management and Administration

Chapter - 6.1: Administration Methods

Chapter - 6.2: Default Accounts

Chapter - 6.3: Threat Management and Configuration

Chapter - 6.4: System Management and Configuration

Chapter - 6.5: Monitoring System Performance and Resources

Chapter - 6.6: Troubleshooting Resource Issues

Chapter - 6.7: Deep Discovery Inspector Logs and Reports

Chapter - 6.8: Accessing System Logs

Chapter - 6.9: Debug Logs

Chapter - 6.10: Determining Log Entities

Chapter - 6.11: Reporting Logs - Event Classification

Chapter - 6.12: Debug Portal

Chapter - 6.13: Threat Reports

Chapter - 7: Virtual Analyzer

Chapter - 7.1: What is Virtual Analyzer Looking For?

Chapter - 7.2: Virtual Analyzer Components

Chapter - 7.3: Process Flow for Samples

Chapter - 7.4: Overall Sample Ratings and Risk Level

Chapter - 7.5: Virtual Analyzer Outputs

Chapter - 7.6: Virtual Analyzer Report

Chapter - 7.7: How to Explain a Malicious Result

Chapter - 7.8: Sending Files to Virtual Analyzer for Analysis

Chapter - 7.9: Virtual Analyzer Feedback in Deep Discovery Inspector

Chapter - 7.10: Introducing a Tradition Sandbox into Deep Discovery Inspector for usage by the Virtual Analyzer

Chapter - 8: Deep Discovery Analyzer Installation and Configuration

Chapter - 8.1: Information Provisioning

Chapter - 8.2: Defining the Architecture

Chapter - 8.3: Obtaining ISOs, Hot Fixes/Patches

Chapter - 8.4: Performing the Installation

Chapter - 8.5: Configuring Initial System Settings

Chapter - 8.6: Configuring Final Settings for Deep Discovery Analyzer

Chapter - 8.7: Testing the Deployment

Chapter - 9: Deep Discovery Analyzer Administration

Chapter - 9.1: Console Overview

Chapter - 9.2: General Administrative Tasks

Chapter - 9.3: Troubleshooting

Chapter - 10: Deep Discovery Email Inspector

Chapter - 10.1: Functionality

Chapter - 10.2: Supported Hardware

Chapter - 10.3: Deployment Modes

Chapter - 10.4: Ports Used

Chapter - 10.5: Summary of Operation Modes

Chapter - 10.6: Threat Detection in Deep Discovery Email Inspector

Chapter - 11: Deep Discovery Email Inspector Installation and Configuration

Chapter - 11.1: Information Provisioning

Chapter - 11.2: Defining the Architecture

Chapter - 11.3: Obtain ISOs, Hot Fixes/Patches

Chapter - 11.4: Performing the Installation

Chapter - 11.5: Completing Pre-Configuration

Chapter - 11.6: Configuring Final Deep Discovery Email Inspector Settings

Chapter - 11.7: Testing the Deployment

Chapter - 12: Deep Discovery Email Inspector Administration

Chapter - 12.1: Management Console Overview

Chapter - 12.2: How to View Detections

Chapter - 12.3: Configuring Policies

Chapter - 12.4: Setting up Recipient Notifications

Chapter - 12.5: Defining Email Message Tags

Chapter - 12.6: Configuring Redirects (Non-Scanable Attachments)

Chapter - 12.7: Adding Policy Exceptions

Chapter - 12.8: Configuring Alerts

Chapter - 12.9: Generating Reports

Chapter - 12.10: Accessing Log Files

Chapter - 12.11: System Administration and Management

Chapter - 12.12: Performing System Maintenance Tasks

Chapter - 13: Threat Connect

Chapter - 13.1: Content

Chapter - 13.2: Using Threat Connect

Chapter - 13.3: Report Content

Chapter - 14: Connected Threat Defense

Chapter - 14.1: Integration is Key to Effective Security

Chapter - 14.2: Connected Threat Defense Requirements

Chapter - 14.3: Connected Threat Defense Components

Chapter - 14.4: Suspicious Objects

Chapter - 14.5: Handling Suspicious Objects

Chapter - 14.6: Trend Micro Control Manager

Chapter - 14.7: Integrating Deep Discovery Inspector with Control Manager

Chapter - 15: Integration

Chapter - 15.1: Open Architecture

Chapter - 15.2: Deep Discovery Inspector Integration

Chapter - 15.3: Integration with Syslog Servers and SIEM Systems

Chapter - 15.4: Third-Party Blocking Integration

Chapter - 15.5: Deep Discovery Analyzer Integration

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books