Trend Micro Deep Security

Trend Micro Deep Security

In this Trend Micro Deep Security Training course, Participants will learn how to use Trend Micro Deep Security for advanced hybrid cloud security on physical, virtual, and cloud-based servers.

Course Overivew

Trend Micro Deep Security Training for Certified Professionals is a three-day, instructor-led training course.
Participants will learn how to use Trend Micro Deep Security for advanced hybrid cloud security on physical, virtual, and cloud-based servers.
This Trend Micro Deep Security course details the basic architecture of the Deep Security solution, deployment options, protection modules, policy configuration, and administration of the system.
As part of the course, participants will install Deep Security Manager in a virtual lab environment, deploy Deep Security Agents on a variety of Windows server computers, and configure protection.
Best practices and troubleshooting details for successful implementation and long-term maintenance of the system are also discussed.

Read More
Read Less
Course Benefits:

Product Overview

  • Introduction to Deep Security
  • Deep Security protection modules
  • Deep Security components

Deep Security Manager

  • Server, operating system, and database requirements
  • Deep Security Manager components
  • Automating tasks
  • Installing or upgrading Deep Security Manager

Deep Security Agent

  • Deep Security Agent architecture
  • Installing Deep Security Agents
  • Adding computers
  • Activating Deep Security Agents
  • Upgrading Deep Security Agents to Relays
  • Distributing software and security updates
  • Viewing computer protection status
  • Organizing computers using groups and smart folders Policies
  • Policy inheritance and overrides
  • Creating new policies

Protecting Servers from Malware

  • Enabling anti-malware protection
  • Anti-malware scanning techniques
  • Smart scan

Blocking Malicious Web Sites

  • Enabling web reputation
  • Setting the security level

Filtering Traffic Using Firewall Rules

  • Enabling the Deep Security firewall
  • Firewall rules
  • Traffic analysis
  • Rule order of analysis
  • Stateful and pseudo-stateful filtering
  • Port scanning

Protecting Servers from Vulnerabilities

  • Virtual patching
  • Protocol hygiene
  • Protocol control
  • Web application protection
  • Enabling intrusion prevention
  • Running recommendation scans
  • Intrusion prevention rules
  • Security Sockets Layer (SSL) filtering
  • Protecting web applications
  • Detecting changes to protected servers

Enabling Integrity Monitoring

  • Running recommendation scans
  • Detection changes to the baseline object
  • Event tagging
  • Blocking Unapproved Software
  • Enforcement modes
  • Enabling Application Control
  • Detecting software changes
  • Creating an inventory of approved software

Inspecting Logs on Protected Servers

  • Enabling log inspection
  • Running recommendation scans

Logging and Reports

  • Enabling diagnostic logging
  • Creating diagnostic packages
  • Event forwarding
  • Reporting
  • Filtering report data

Activating and Managing Multiple Tenants

  • Enabling multi-tenancy
  • Creating and managing tenants
  • Activating Deep Security Agents on tenants
  • Usage monitoring

Detecting Emerging Malware Through Connected Threat Defense

  • Connected Threat Defense requirements
  • Trend Micro™ Deep Discovery™ Analyzer
  • Trend Micro Control Manager™
  • Integrating Deep Security into Trend Micro’s Connected Threat Defense

Protecting Virtual Machines using the Deep Security Virtual Appliance

  • Agentless protection
  • Deploying Deep Security in VMWare ESXi environments

The course topics in this training are divided into the following lessons:

  • Describe the purpose, features, functions, and capabilities of Trend Micro Deep Security 11.0
  • Define and install components that make up Deep Security
  • Implement security by enabling protection modules
  • Review available configuration and administration options
  • Attempt the Trend Micro Certified Professional for Deep Security Certification Exam

This course is designed for IT professionals who are responsible for protecting users, networks, data centers, and cloud resources from data breaches and targeted attacks.
This includes those involved with:

  • Operations
  • Deployment
  • Security Response
  • Compliance
Download
Course
Brochure

Prerequisites

This course is available at :

Classroom Training

Cairo
Giza
Onsite

Online Training

Virtual Interactive Instructor LED
Self-Paced Training

WHY CHOOSE CLS

Experience

We have been in the market since 1995, and we kept accumulating experience in the training business, and providing training for more than 100,000 trainees ever since, in Egypt, and the MENA region.

Premium Facilities

CLS facilities are well-equipped with strong hardware and software technologies that aid both students and trainers lead very effective smooth training programs.

Customer Support

We provide our clients with the best solutions, customized to their specific needs and goals. Our team is highly qualified to answer whatever questions you have.

Global Accredited

CLS is an authorized and accredited partner by technology leaders. This means that our training programs are of the highest quality source materials.

Up To Date

We keep tabs on every change in the market and the technology field, so our training programs will always be updated up to the World-class latest standards, and adapted to the global shape-shifting job market.

Certified Instructors

We select the best instructors, who are certified from trustworthy international vendors. They share their professional experience with the Trainees, so they can have a clear hands-on experience.

Over 200,000 Gradutes From CLS

Play Video
Amr Mostafa
An employee of the Security Department at the Ministry of Electricity

I`m attending now CEH Training with Eng Mohamed Hamdy ,CISSP Training with Eng Mohamed Gohar, I really learned a lot from him , everything here in CLS  is very satisfying including facilities .

Play Video
Lamiaa Medhat
CIO

We took a series of courses as the digital Transformation Unit of the ministry . we just finished CRISC Certification Training with DR Adel Abdel Meneim . Thank you CLS for all your efforts, we really appreciate it

Play Video
Ahmed Salah
Senior Cyber Security Engineer

Me and my colleagues are working in a government Organization, We took a no. of cyber security trainings with CLS starting with CEH and CISSP. we liked every thing the instructors, the stuff and whole environment

Play Video
Ferras Hassan
Head of the Programming Department at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Mohamed Ahmed Ali
Systems management specialist

Qualifying the cadres of digital transformation units in government agencies moving to the administrative capital .Thanks CLS

Play Video
Zeinab Salah
Software Developer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Ibrahim Khalaf
IT Infrastructure and Security Manger

I`m attending now CRISC Training with DR Adel Abdel Meneim , I really learned a lot from him , everything here in CLS  is very satisfying including facilities , locations and the team.

Play Video
Samar Shams ElDin
Programmer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Student Application For

Trend Micro Deep Security
Full Name *
Email *
Phone *
Full Phone
Training Location *
Additional Request

Business Application For

Trend Micro Deep Security
Full Name *
Company Name *
Job Title *
Number of Employees
Email *
Phone *
Full Phone
Training Location *
Additional Request