Deep Security

Deep Security


Course Overview

Trend Micro™ Deep Security 10 Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to use Trend Micro™ Deep Security for advanced server security of physical, virtual and cloud-based computers. This course details the basic architecture of the Deep Security solution, deployment options, protection modules, policy configuration, and administration of the system. As part of the course, participants will install Deep Security in a virtual lab environment deploy agent endpoint computers and configure protection on these computers. Best practices and troubleshooting details for successful implementation and long-term maintenance of the system is also discussed.

This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action.

This course is taught by Trend Micro-certified trainers. Upon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Security.



Details

System administrators

Network engineers

Support Engineers

Integration Engineers

Solution and Security Architects


There are no prerequisites to attend this course, however, a working knowledge of Trend Microproducts and services, as well as an understanding of basic networking concepts and principles will be helpful.

Basic knowledge of the following topics is also beneficial:

• Windows servers and clients

• Firewalls and packet inspection devices

• VMware ESXi / vCenter / NSX

• Amazon AWS / Microsoft Azure / VMware vCloud

• Virtualization technologies

Participants are required to bring a laptop computer with a screen resolution of at least 1980 x 1080 or above; a display size of 15" or above is recommended.


Product Overview

Deep Security Manager

Deep Security Agent

Policies

Anti-Malware

Web Reputation

Firewall

Intrusion Prevention

Integrity Monitoring

Application Control

Log Inspection

Logging and Reports

Multi-Tenancy

Connected Threat Defense

Protecting Cloud Environments

Deep Security Virtual Appliance