Course Details

Your Growth, Our Mission

TREND MICRO DEEP DISCOVERY TRAINING FOR CERTIFIED PROFESSIONALS
Course Description
Trend Micro™ Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro™ Deep Discovery threat protection solution using: • Trend Micro™ Deep Discovery Inspector • Trend Micro™ Deep Discovery Analyzer • Trend Micro™ Deep Discovery Email Inspector Participants explore key concepts and methodologies of using a blend of Deep Discovery solutions for a more complete approach to network security. This course details the architecture, deployment options, threat management and system administration fundamentals, as well as troubleshooting and best practices, for all three products. This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action. This course is taught by Trend Micro-certified trainers. Upon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Discovery.

This course is designed for IT professionals who are responsible for protecting networks from any kind of networked, endpoint, or cloud security threats. The individuals who will typically benefit the most include:

  1. System administrators
  2. Network engineers
  3. Support Engineers
  4. Integration Engineers
  5. Solution & Security Architects

Introduction

  1. Evolving Threats
  2. Traditional Security
  3. Anatomy of a Targeted Attack
  4. Point of Entry - Spear Phishing
  5. How Long Can Targeted Attacks Stay Hidden?
  6. Why Monitor Your Network?
  7. Why Deep Discovery?

Deep Discovery Solution Overview

  1. What is Deep Discovery?
  2. Deep Discovery Attack Detection
  3. Deep Discovery Threat Detection Technologies
  4. Deep Discovery Solution Map
  5. Trend Micro Deep Discovery Inspector
  6. Trend Micro Deep Discovery Analyzer
  7. Trend Micro Deep Discovery Email Inspector
  8. Control Manager
  9. Custom Threat Defense
  10. Deep Discovery Director

Deep Discovery Inspector

  1. Key Features and Benefits
  2. Network Setup
  3. Form Factors
  4. Deep Discovery Inspector Models

Deep Discovery Inspector Installation and Configuration

  1. Installation Design
  2. Deployment Example and Scenarios
  3. System Requirements
  4. Installing Deep Discovery Inspector
  5. Information Provisioning for Setup
  6. Defining Architecture and Traffic to Capture
  7. Obtaining ISOs, Hot Fixes/Patches
  8. Performing an Installation
  9. Configuring Initial System Settings (Pre-Configuration Console)
  10. Finalizing Deep Discovery Inspector Configuration (Web Console)
  11. Testing the Deployment
  12. Viewing Installation Logs
  13. Connecting Deep Discovery Inspector to Deep Discovery Director

Threat Detect Technologies

  1. Network Content Inspection Engine (NCIE / VSAPI)
  2. Advanced Threat Scan Engine (ATSE / VSAPI)
  3. Network Content Inspection Engine (NCIE / VSAPI)
  4. Network Content Correlation Engine (NCCE / CAV)
  5. Virtual Analyzer
  6. Census
  7. Certified Safe Software Service (CSSS / GRID)
  8. Trend Micro URL Filtering Engine (TMUFE)
  9. Network Reputation with Smart Protection Network
  10. Mobile Application Reputation Service (MARS)

Deep Discovery Inspector Management and Administration

  1. Administration Methods
  2. Default Accounts
  3. Threat Management and Configuration
  4. System Management and Configuration
  5. Monitoring System Performance and Resources
  6. Troubleshooting Resource Issues

Deep Discovery Inspector Logs and Reports

  1. Accessing System Logs
  2. Debug Logs
  3. Determining Log Entities
  4. Reporting Logs - Event Classification
  5. Debug Portal
  6. Threat Reports

Virtual Analyzer

  1. What is Virtual Analyzer Looking For?
  2. Virtual Analyzer Components
  3. Process Flow for Samples
  4. Overall Sample Ratings and Risk Level
  5. Virtual Analyzer Outputs
  6. Virtual Analyzer Report
  7. How to Explain a Malicious Result
  8.  Sending Files to Virtual Analyzer for Analysis
  9. Virtual Analyzer Feedback in Deep Discovery Inspector
  10. Importing a Custom Sandbox into Deep Discovery Inspector for use by the Virtual Analyzer

Deep Discovery Analyzer Installation and Configuration

  1. Information Provisioning
  2. Defining the Architecture
  3. Obtaining ISOs, Hot Fixes/Patches
  4. Performing the Installation
  5. Configuring Initial System Settings
  6. Configuring Final Settings for Deep Discovery Analyzer
  7. Testing the Deployment

Deep Discovery Analyzer Administration

  1. Console Overview
  2. General Administrative Tasks
  3. Troubleshooting

Deep Discovery Email Inspector

  1. Functionality
  2. Supported Hardware
  3. Deployment Modes
  4. Ports Used
  5. Summary of Operation Modes
  6. Threat Detection in Deep Discovery Email Inspector

Deep Discovery Email Inspector Installation and Configuration

  1. Information Provisioning
  2. Defining the Architecture
  3. Obtain ISOs, Hot Fixes/Patches
  4. Performing the Installation
  5. Completing Pre-Configuration
  6. Configuring Final Deep Discovery Email Inspector Settings
  7. Testing the Deployment

Deep Discovery Email Inspector Administration

  1. Management Console Overview
  2. How to View Detections
  3. Configuring Policies
  4. Setting up Recipient Notifications
  5. Defining Email Message Tags
  6. Configuring Redirects (Non-Scann able Attachments)
  7. Adding Policy Exceptions
  8. Configuring Alerts
  9. Generating Reports
  10. Accessing Log Files
  11. System Administration and Management
  12. Performing System Maintenance Tasks

Threat Connect

  1. Content
  2. Using Threat Connect
  3. Report Content

Connected Threat Defense

  1. Integration is Key to Effective Security
  2. Connected Threat Defense Requirements
  3. Connected Threat Defense Components
  4. Suspicious Objects
  5. Handling Suspicious Objects
  6. Trend Micro Control Manager
  7. Integrating Deep Discovery Inspector with Control Manager

Integration

  1. Open Architecture
  2. Deep Discovery Inspector Integration
  3. Integration with Syslog Servers and SIEM Systems
  4. Third-Party Blocking Integration
  5. Deep Discovery Analyzer Integration

Request Info

Course Rounds

3 Days
Code Date Venue Fees Action

Prices don't include VAT

Related Courses

Your Growth, Our Mission

Contact Us

Contact us to meet all your inquiries and needs, as our professional team is pleased to provide immediate support and advice to ensure you achieve your goals and facilitate your experience with us in the best possible way.

UAE
1st floor, Incubator Building, Masdar City, Abu Dhabi, UAE
Office
00971-2-6446633
Mobile
00971-50-5419377
E-mail
info@btsconsultant.com
Working Hours
Sun to Fri 09:00 AM to 06:00 PM