TRNN1040 – Deep Discovery Advanced Threat Detection 4.0 Edition 3 Training For Certified Professionals

  • Duration: 10 weeks
Categories:

Trend Micro Product Overview

  • Product Portfolios
  • Network Detection
  • Trend Micro™ Deep Discovery™ Product Family

Deep Discovery Analyzer

  • Network Setup
  • What is Deep Discovery Analyzer Looking For?
  • Creating and Importing a Sandbox Images
  • Deep Discovery Analyzer Tools
  • Submitting Samples to Deep Discovery Analyzer
  • Suspicious Objects List Management
  • MITRE ATT&CK™ Framework Tactics and Techniques

Deep Discovery Inspector

  • Network Service Diagnostics
  • Deep Discovery Inspector Deployment Topologies
  • Phases of a Targeted Attack
  • Case Study: APT36 (Earth Karkaddan) Attack Chain and Malware Arsenal
  • Indicators of Compromise
  • Deep Discovery Threat Detection Technologies

Deep Discovery Inspector Best Practice and Configuration

  • Deploying Deep Discovery Inspector
  • Configuring Initial Network Settings
  • Best Practice Configurations and Management
  • Working with Logs and Reports
  • Troubleshooting (Packet Capturing)

Analyzing Detected Threats in Deep Discovery Inspector

  • Working with Threat Dashboards
  • Obtaining Key Information for Analyzing Threat Detections
  • Viewing Hosts with Command-and-Control Callbacks
  • Connecting to a Virtual Analyzer for Sandbox Analysis
  • Dealing with Aggressive or False Positive Detections

Deep Discovery Email Inspector

  • Deployment Topologies
  • Email Scanning Technologies
  • Integration with Trend Miro Products

Deploying Deep Discovery Email Inspector

  • Installing and Configuring Deep Discovery Email Inspector
  • Network Configuration
  • Virtual Analyzer Sandbox Configuration
  • Troubleshooting

Deep Discovery Email Inspector Administration

  • Analyzing Detections
  • Policy Management
  • Configuring Scanning / Analysis
  • Policy Management
  • Configuring Virtual Analyzer for Sandbox Analysis
  • Using Debug Functions

Deep Discovery Director

  • Installing Deep Discovery Director
  • Connecting Deep Discovery Products to Deep Discovery Director
  • Sending Logs to a Syslog Server
  • Deployment Plans
  • Managing Threat Detections through Deep Discovery Director
  • Viewing Email Messages with Malicious or Suspicious Content
  • Configuring Rules for Detection
  • Threat Intelligence Interoperability (STIX, TAXII)

Trend Micro Vision One™ Overview

  • Trend Micro XDR
  • Trend Micro Vision One
  • Trend Micro Vision One Apps
  • Trend Micro™ Managed XDR Service

Deep Discovery Inspector and Trend Micro Vision One

  • Deploying Network Inventory Service
  • Downloading the Deep Discovery Inspector Image
  • Creating a Virtual Machine for Deep Discovery Inspector on VMware ESXi
  • Configuring Deep Discovery Inspector Network Settings
  • Connecting Deep Discovery Inspector with Trend Micro Vision One
  • Deploying Trend Micro Service Gateway
  • Connecting Deep Discovery Inspector with Service Gateway

Appendices

  • Deep Discovery Threat Detection Technologies
  • Trend Micro Product Integration
  • Creating Sandboxes

Leave feedback about this