TM-DS – DEEP SECURITY™ 20 TRAINING FOR CERTIFIED PROFESSIONALS

  • Duration: 10 weeks
Categories:

1. Product Overview

  •  Introduction to Deep Security
  •  Deep Security protection modules
  •  Deep Security deployment options
  •  Deep Security components

2. Trend Micro™ Deep Security™ Manager

  •  Server, operating system, and database requirements
  •  Deep Security Manager architecture
  •  Installing and upgrading Deep Security Manager

3. Deploying Deep Security Agents

  •  Deep Security agent architecture
  •  Deploying Deep Security agents

4. Managing Deep Security Agents

  •  Command line operations
  •  Resetting agents
  •  Protecting agents
  •  Viewing computer protection status
  •  Upgrading Deep Security agents
  •  Organizing computers using groups and Smart Folders

5. Keeping Deep Security Up to Date

  •  Security updates
  •  Software updates
  •  Deep Security relays

6. Trend Micro™ Smart Protection™

  •  Smart Protection services used by Deep Security
  •  Configuring the Smart Protection source

7. Policies

  •  Policy inheritance and overrides
  •  Creating new policies
  •  Running recommendation scans

8. Protecting Servers from Malware

  •  Anti-malware scanning techniques
  •  Enabling anti-malware protection
  •  Smart Scan

9. Blocking Malicious Websites

  •  Enabling web reputation
  •  Setting the security level

10. Filtering Traffic Using the Firewall

  •  Enabling the Deep Security firewall
  •  Firewall rules
  •  Traffic analysis
  •  Traffic order of analysis
  •  Port scan

11. Protecting Servers from Vulnerabilities

  •  Virtual patching
  •  Detecting suspicious network activity
  •  Web application protection
  •  Enabling intrusion prevention
  •  Intrusion prevention rules
  •  Security Sockets Layer (SSL) filtering
  •  Protecting web applications

12. Detecting Changes to Protected Servers

  •  Enabling integrity monitoring
  •  Running recommendation scans
  •  Detection changes to baseline objects

13. Blocking Unapproved Software

  •  Enforcement modes
  •  Enabling application control
  •  Detecting software changes
  •  Creating an inventory of approved

14. Inspecting Logs on Protected Servers

  •  Enabling log inspection
  •  Running recommendation scans

15. Events and Alerts

  •  Event forwarding
  •  Alerts
  •  Event tagging
  •  Reporting

16. Protecting Containers

  •  Continuous integration/continuous deployment
  •  Software development using containers
  •  Protecting containers with Deep Security

17. Automating Deep Security Operations

  •  Scheduled tasks
  •  Event-based tasks
  •  Quick start templates
  •  Baking the Deep Security agent into an Amazon® Machine Image
  •  Application programming interface

18. Detecting Emerging Malware Through Connected Threat Defense

  •  Connected Threat Defense phases
  •  Trend Micro™ Deep Discovery™ Analyzer
  •  Trend Micro Apex Central™
  •  Configuring Deep Security for Connected Threat Defense
  •  Tracking submissions

19. Appendix Topics

  •  Activating and managing multiple tenants
  •  Protecting virtual machines using the Deep Security virtual appliance
  •  Troubleshooting common Deep Security issues

Leave feedback about this