Euro-training Center
 Deep Security Training Y2198 QR Code
Share   Like Download Brochure (PDF) Dates and locations

Deep Security Training

Overview:

Introduction

This course covers the Deep Security solution's fundamental architecture, deployment options, security modules, policy setup, and system administration. For a successful implementation and ongoing maintenance of the system, best practices and troubleshooting information are discussed.

Course Objectives

At the end of this course, participants will be able to:

  • Describe the purpose, features, functions, and capabilities of Trend Micro Deep Security 12
  • Define and install components that  makeup Deep Security
  • Keeping Deep Security Up to Date
  • Block Unapproved Software 
  • Professional for Deep Security

Targeted Audience

This course is designed for IT professionals responsible for protecting endpoint computers from data breaches and targeted attacks.

This includes those involved with: Operations - Deployment - Security Response - Compliance.

Course Outline

Unit 1: Product Overview 

  • Introduction to Deep Security
  • Deep Security protection modules
  • Deep Security deployment options
  • Deep Security components

Unit 2: Deep Security Agents 

  • Deep Security Agent architecture
  • Deploying Deep Security Agents
  • Viewing computer protection status
  • Upgrading Deep Security Agents
  • Organizing computers using groups and
  • Smart Folders

Unit 3: Keeping Deep Security Up to Date

  • Security updates
  • Software updates
  • Deep Security relays

Unit 4: Blocking Unapproved Software 

  • Enforcement modes
  • Enabling application control
  • Detecting software changes
  • Creating an inventory of approved software
  • Pre-approving software changes

Unit 5: Automating Deep Security Operations 

  • Scheduled tasks
  • Event-based tasks
  • Quick start templates
  • Baking the Deep Security Agent into an
  • Amazon® machine image
  • Application programming interface

Select training course venue