Trend Micro Deep SecurityCourse Description: In this course, you will learn how to use Trend Micro™ Deep Security. This course provides information about the basic architecture, deployment scenarios, installation processes, policy configuration and administration options, as well as troubleshooting details that a network administrator needs to know for successful implementation and long-term maintenance.https://clico.pl/trainings/templates/trend-micro-deep-securityhttps://clico.pl/logo.png
Trend Micro Deep Security
Course Description: In this course, you will learn how to use Trend Micro™ Deep Security. This course provides information about the basic architecture, deployment scenarios, installation processes, policy configuration and administration options, as well as troubleshooting details that a network administrator needs to know for successful implementation and long-term maintenance.
Trend Micro Deep Security
Trend Micro
3
1 600,0
EUR
no
yes
Target Audience:
This course is designed for IT professionals who are responsible for protecting networks from any kind of networked, endpoint, or cloud security threats.
The individuals who will typically benefit the most include:
- System administrators
- Network engineers
- Support Engineers
- Integration Engineers
- Solution & Security Architects
Course Prerequisites:
Before you take this course, Trend Micro recommends that you have a working knowledge of their products and services, as well as basic networking concepts and principles.
You should also have a working knowledge or understanding of the following:
- Windows servers and clients
- Firewalls, WAFs, Packet Inspection devices
- Microsoft Internet Information Server (IIS), Apache
- VMware ESXi / vCenter / vShield
- Amazon AWS / Microsoft Azure / VMware vCloud
- Virtualisation techniques and technologies
10:00 - 17:00
• Overview
o Key Functionality
o Components and Architecture
• Installation Planning and Deployment
• Product In-Depth
o Deep Security Manager and Agent
o Update and Software Management
o Integration
• Endpoint Management
o Detection Methods and Agent Activation
o Deep Security Relays
o Security Updates
• Policy Management
o Inheritance, Hierarchy, and Overrides
o Common Objects
9:00 - 17:00
Anti-Malware Solution Platform (AMSP)
o Anti-Malware Scan Engines
o Scans and Quarantine
o Smart Protection
• Web Reputation
o Security Levels and Exceptions
o Web Reputation Communication
o Analysis Process
• Firewall
o Firewall Rules
o Reconnaissance Scans
o Traffic Analysis
• Intrusion Prevention
o Virtual Patching
o Protocol Hygiene
o Application Control
o Web Application Protection
o Recommendation Scans
9:00 - 17:00
• Integrity Monitoring
o Event Tagging
• Log Inspection
• Logging and Reports
• Multi-Tenancy
• Agentless Protection
• Cloud Computing
o Amazon AWS, Microsoft Azure and VMware vCloud