COURSE OVERVIEW | TREND EDUCATION
Trend MicroTM
DEEP SECURITY™ 11.0 TRAINING FOR
CERTIFIED PROFESSIONALS
COURSE DESCRIPTION: Target Audience:
Trend Micro™ Deep Security™ 11.0 Training for Certified Professionals is a three-day,
This course is designed for IT
instructor-led training course. Participants will learn how to use Trend Micro Deep Security professionals who are responsible
for advanced hybrid cloud security on physical, virtual, and cloud-based servers. This for protecting users, networks, data
course details the basic architecture of the Deep Security solution, deployment options, centers, and cloud resources from data
protection modules, policy configuration, and administration of the system. As part of breaches and targeted attacks.
the course, participants will install Deep Security Manager in a virtual lab environment,
deploy Deep Security Agents on a variety of Windows® server computers, and configure This includes those involved with:
protection. Best practices and troubleshooting details for successful implementation and
•• Operations
long-term maintenance of the system are also discussed.
•• Deployment
This course incorporates a variety of hands-on lab exercises, allowing participants to put •• Security Response
the lesson content into action. •• Compliance
This course is taught by Trend Micro certified trainers. Upon completion of this course,
participants may complete the certification examination to obtain designation as a Trend
Micro Certified Professional for Deep Security.
KEY INFORMATION
Course Title: Trend Micro Deep Security 11.0 Training for Certified Professionals
Product ID: TRNN1040 or TRNM0003
Course Length: Three Days
Level: Professional
Delivery Language: English
Existing account holders can visit the Trend Micro Education Portal for a list of
To Enroll: available classes. For more information about how to create an account please visit
trendmicro.com/education
CERTIFICATIONS AND RELATED EXAMINATIONS:
Upon completion of this course, participants may choose to complete the certification
exam to obtain designation as a Trend Micro Certified Professional for Deep Security.
PREREQUISITIES:
There are no prerequisites to attend this course, however, a working knowledge of Trend
Micro products and services, as well as an understanding of basic networking concepts and
principles will be helpful.
Basic knowledge of the following topics is also beneficial:
•• Windows servers and clients
•• Firewalls and packet inspection devices
•• VMware® ESXi/vCenter/NSX
•• Amazon AWS/Microsoft® Azure™/VMware vCloud
•• Virtualization technologies
Participants are required to bring a laptop computer with a recommended screen resolution
of at least 1980 x 1080 or above and a display size of 15” or above.
Page 1 of 2 • DATASHEET • TREND EDUCATION
COURSE OBJECTIVES: For More Information:
The course topics in this training are divided into the following lessons:
Please contact Trend Micro Education
for additional information
•• Describe the purpose, features, functions, and capabilities of Trend Micro Deep Security 11.0
[email protected] •• Define and install components that make up Deep Security
•• Implement security by enabling protection modules
•• Review available configuration and administration options
•• Attempt the Trend Micro Certified Professional for Deep Security Certification Exam
WHY CHOOSE TREND MICRO EDUCATION
•• Hands-on instruction from Trend Micro certified trainers
•• With Trend Micro product certifications, you have the skills to deploy and manage our leading
security solutions
•• By sharpening your skills, you are in a position to better detect and respond to the latest attacks
DETAILED COURSE OUTLINE:
Topics covered:
Product Overview •• Traffic analysis Activating and Managing Multiple
•• Rule order of analysis Tenants
•• Introduction to Deep Security
•• Stateful and pseudo-stateful filtering
•• Deep Security protection modules •• Enabling multi-tenancy
•• Port scanning
•• Deep Security components •• Creating and managing tenants
Protecting Servers from Vulnerabilities •• Activating Deep Security Agents on
Deep Security Manager
•• Virtual patching tenants
•• Server, operating system, and database •• Usage monitoring
•• Protocol hygiene
requirements
•• Protocol control Detecting Emerging Malware Through
•• Deep Security Manager components
•• Web application protection Connected Threat Defense
•• Automating tasks
•• Enabling intrusion prevention
•• Installing or upgrading Deep Security •• Connected Threat Defense requirements
•• Running recommendation scans
Manager •• Trend Micro™ Deep Discovery™ Analyzer
•• Intrusion prevention rules
Deep Security Agent •• Security Sockets Layer (SSL) filtering •• Trend Micro Control Manager™
•• Protecting web applications •• Integrating Deep Security into Trend
•• Deep Security Agent architecture Micro’s Connected Threat Defense
•• Detecting changes to protected servers
•• Installing Deep Security Agents
•• Protecting Virtual Machines using the
Adding computers Enabling Integrity Monitoring
•• Activating Deep Security Agents Deep Security Virtual Appliance
•• Running recommendation scans
•• Upgrading Deep Security Agents to Relays •• Agentless protection
•• Detection changes to the baseline object
•• Distributing software and security updates •• Deploying Deep Security in VMWare ESXi
•• Event tagging
•• Viewing computer protection status environments
•• Organizing computers using groups and Blocking Unapproved Software
smart folders
•• Enforcement modes
Policies •• Enabling Application Control
•• Detecting software changes
•• Policy inheritance and overrides
•• Creating an inventory of approved
•• Creating new policies
software
Protecting Servers from Malware
Inspecting Logs on Protected Servers
•• Enabling anti-malware protection
•• Enabling log inspection
•• Anti-malware scanning techniques
•• Running recommendation scans
•• Smart scan ©2018 by Trend Micro Incorporated. All rights reserved. Trend
Micro, the Trend Micro t-ball logo, and Smart Protection Network
Logging and Reports
Blocking Malicious Web Sites are trademarks or registered trademarks of Trend Micro
Incorporated. All other company and/or product names may be
•• Enabling diagnostic logging trademarks or registered trademarks of their owners. Information
•• Enabling web reputation contained in this document is subject to change without notice.
•• Creating diagnostic packages [DS01_CourseDesciption_DeepSecurity_11_180813US]
•• Setting the security level
•• Event forwarding
Filtering Traffic Using Firewall Rules •• Reporting
•• Filtering report data
•• Enabling the Deep Security firewall
•• Firewall rules
Page 2 of 2 • DATASHEET • TREND EDUCATION