

Deep Security Training
Overview:
Introduction
This course covers the Deep Security solution's fundamental architecture, deployment options, security modules, policy setup, and system administration. For a successful implementation and ongoing maintenance of the system, best practices and troubleshooting information are discussed.
Course Objectives
At the end of this course, participants will be able to:
- Describe the purpose, features, functions, and capabilities of Trend Micro Deep Security 12
- Define and install components that makeup Deep Security
- Keeping Deep Security Up to Date
- Block Unapproved Software
- Professional for Deep Security
Targeted Audience
This course is designed for IT professionals responsible for protecting endpoint computers from data breaches and targeted attacks.
This includes those involved with: Operations - Deployment - Security Response - Compliance.
Course Outline
Unit 1: Product Overview
- Introduction to Deep Security
- Deep Security protection modules
- Deep Security deployment options
- Deep Security components
Unit 2: Deep Security Agents
- Deep Security Agent architecture
- Deploying Deep Security Agents
- Viewing computer protection status
- Upgrading Deep Security Agents
- Organizing computers using groups and
- Smart Folders
Unit 3: Keeping Deep Security Up to Date
- Security updates
- Software updates
- Deep Security relays
Unit 4: Blocking Unapproved Software
- Enforcement modes
- Enabling application control
- Detecting software changes
- Creating an inventory of approved software
- Pre-approving software changes
Unit 5: Automating Deep Security Operations
- Scheduled tasks
- Event-based tasks
- Quick start templates
- Baking the Deep Security Agent into an
- Amazon® machine image
- Application programming interface