- Duration: 10 weeks
Categories: Trend Micro
Trend Micro Product Overview
- Product Portfolios
- Network Detection
- Trend Micro™ Deep Discovery™ Product Family
Deep Discovery Analyzer
- Network Setup
- What is Deep Discovery Analyzer Looking For?
- Creating and Importing a Sandbox Images
- Deep Discovery Analyzer Tools
- Submitting Samples to Deep Discovery Analyzer
- Suspicious Objects List Management
- MITRE ATT&CK™ Framework Tactics and Techniques
Deep Discovery Inspector
- Network Service Diagnostics
- Deep Discovery Inspector Deployment Topologies
- Phases of a Targeted Attack
- Case Study: APT36 (Earth Karkaddan) Attack Chain and Malware Arsenal
- Indicators of Compromise
- Deep Discovery Threat Detection Technologies
Deep Discovery Inspector Best Practice and Configuration
- Deploying Deep Discovery Inspector
- Configuring Initial Network Settings
- Best Practice Configurations and Management
- Working with Logs and Reports
- Troubleshooting (Packet Capturing)
Analyzing Detected Threats in Deep Discovery Inspector
- Working with Threat Dashboards
- Obtaining Key Information for Analyzing Threat Detections
- Viewing Hosts with Command-and-Control Callbacks
- Connecting to a Virtual Analyzer for Sandbox Analysis
- Dealing with Aggressive or False Positive Detections
Deep Discovery Email Inspector
- Deployment Topologies
- Email Scanning Technologies
- Integration with Trend Miro Products
Deploying Deep Discovery Email Inspector
- Installing and Configuring Deep Discovery Email Inspector
- Network Configuration
- Virtual Analyzer Sandbox Configuration
- Troubleshooting
Deep Discovery Email Inspector Administration
- Analyzing Detections
- Policy Management
- Configuring Scanning / Analysis
- Policy Management
- Configuring Virtual Analyzer for Sandbox Analysis
- Using Debug Functions
Deep Discovery Director
- Installing Deep Discovery Director
- Connecting Deep Discovery Products to Deep Discovery Director
- Sending Logs to a Syslog Server
- Deployment Plans
- Managing Threat Detections through Deep Discovery Director
- Viewing Email Messages with Malicious or Suspicious Content
- Configuring Rules for Detection
- Threat Intelligence Interoperability (STIX, TAXII)
Trend Micro Vision One™ Overview
- Trend Micro XDR
- Trend Micro Vision One
- Trend Micro Vision One Apps
- Trend Micro™ Managed XDR Service
Deep Discovery Inspector and Trend Micro Vision One
- Deploying Network Inventory Service
- Downloading the Deep Discovery Inspector Image
- Creating a Virtual Machine for Deep Discovery Inspector on VMware ESXi
- Configuring Deep Discovery Inspector Network Settings
- Connecting Deep Discovery Inspector with Trend Micro Vision One
- Deploying Trend Micro Service Gateway
- Connecting Deep Discovery Inspector with Service Gateway
Appendices
- Deep Discovery Threat Detection Technologies
- Trend Micro Product Integration
- Creating Sandboxes
Leave feedback about this
You must be logged in to post a comment.