Deep Security
Course Overview
Trend Micro™ Deep Security 10 Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to use Trend Micro™ Deep Security for advanced server security of physical, virtual and cloud-based computers. This course details the basic architecture of the Deep Security solution, deployment options, protection modules, policy configuration, and administration of the system. As part of the course, participants will install Deep Security in a virtual lab environment deploy agent endpoint computers and configure protection on these computers. Best practices and troubleshooting details for successful implementation and long-term maintenance of the system is also discussed.
This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action.
This course is taught by Trend Micro-certified trainers. Upon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Security.
Details
System administrators
Network engineers
Support Engineers
Integration Engineers
Solution and Security Architects
There are no prerequisites to attend this course, however, a working knowledge of Trend Microproducts and services, as well as an understanding of basic networking concepts and principles will be helpful.
Basic knowledge of the following topics is also beneficial:
• Windows servers and clients
• Firewalls and packet inspection devices
• VMware ESXi / vCenter / NSX
• Amazon AWS / Microsoft Azure / VMware vCloud
• Virtualization technologies
Participants are required to bring a laptop computer with a screen resolution of at least 1980 x 1080 or above; a display size of 15" or above is recommended.
Product Overview
Deep Security Manager
Deep Security Agent
Policies
Anti-Malware
Web Reputation
Firewall
Intrusion Prevention
Integrity Monitoring
Application Control
Log Inspection
Logging and Reports
Multi-Tenancy
Connected Threat Defense
Protecting Cloud Environments
Deep Security Virtual Appliance