Skip Navigation LinksHome > Vendors > Trend-Micro > TRNM0003

Trend Micro Apex One Training for Certified Professionals (TRNM0003)


In this course, you will learn how to use Trend Micro Apex One™. This course details basic architecture, protection functionality, deployment scenarios, and troubleshooting. Through hands-on labs, participants practice configuring Apex One protection features, along with the administration options needed for a successful implementation and longterm maintenance.


After completing this course, participants will be able to:
  • Describe the purpose, features, functions, and capabilities of Apex One
  • Define the components that make up Apex One
  • Implement security using Security Agents
  • Configure and administer Apex One Servers and Agents
  • Deploy Apex One policies using Trend Micro Apex Central
  • Troubleshoot common issues
  • Attempt the Trend Micro Certified Professional for Apex One Certification Exam


Course Outline

1. Apex One Overview

  • Trend Micro solutions

  • Key features of Apex One

  • Apex One components

  • Deployment methods

  • Threat detection

2. Apex One Server

  • Apex One Server tasks

  • Apex One Server servicesand components

  • Configurationrepositories

  • Installing/upgradingApex One Server

  • Apex One plug-ins andutilities

3. Apex One Web Management Console

  • Logging into the console

  • Integrating with ActiveDirectory

  • Creating newadministrative accounts

4. Security Agents

  • Security Agent tasks

  • Security Agent servicesand components

  • Security Agent tree

  • Installing Agents

  • Migrating from otherendpoint security software

  • Agent-to-Server/Server-to-Agentcommunication

  • Endpoint location

  • Moving Security Agents

  • Uninstalling SecurityAgents

  • Agent settings andgrouping

  • Agent self-protection

  • Agent privileges

5. Managing Off-Premise Agents

  • Protection features

  • Installing the Apex OneEdge Relay Server

  • Registering the Apex OneEdge Relay Server

  • Edge Relay Server andexternal Agent communication

  • Edge Relay Serverdigital certificates

6. Keeping Apex One Updated

  • Active Update 

  • Updating the Apex OneServer

  • Updating Security Agents

  • Update Agents

  • Security compliance

7. Trend Micro Smart Protection

  • Smart Protectionservices and sources

  • Configuring the SmartProtection source

8. Protecting Endpoint Computers from Malware

  • Scanning for malware

  • Scan settings

  • Quarantining malware

  • Smart Scan

  • Spyware/graywareprotection

  • Preventing outbreaks

9. Protecting Endpoint Computers ThroughBehavior Monitoring

  • Malware behaviorblocking

  • Ransomware protection

  • Anti-exploit protection

  • Fileless malwareprotection

  • Newly encounteredprogram detection

  • Event monitoring

  • Behavior monitoringexceptions

10. Protecting Endpoint Computers from UnknownThreats

  • Common Vulnerabilitiesand Exposures exploits 

  • Predictive machinelearning

  • Offline predictivemachine learning

11. Detecting Emerging Malware Through TrendMicro™ Connected Threat Defense

  • Connected Threat Defenserequirements

  • Deep Discovery Analyzer

  • Suspicious Objects

12. Blocking Web Threats

  • Web reputation

  • Detecting suspiciousconnections

  • Protecting againstbrowser exploits

13. Protecting Endpoint Computers Through TrafficFiltering

  • Firewall filtering

  • Application filtering

  • Certified Safe Softwarelist

  • Stateful inspection

  • Intrusion DetectionSystem

  • Firewall policies andprofiles

14. Preventing Data Leaks on Endpoint Computers

  • Data Loss protection

  • Installing Data Lossprotection

  • Configuring dataidentifiers, data loss prevention templates and policies

  • Device control

15. Deploying Policies Through Apex Central

  • Apex Central

  • Apex Central managementmodes

  • Managing Apex Onepolicies in Apex Central

  • Data Discovery policies

16. Blocking Unapproved Applications on EndpointComputers

  • Integrated ApplicationControl

  • Application Controlcriteria

  • Implementing ApplicationControl

  • User-based Application Control

  • Lockdown Mode

  • Best practices

17. Protecting Endpoint Computers fromVulnerabilities

  • Integrated VulnerabilityProtection

  • Vulnerability ProtectionPattern

  • ImplementingVulnerability Protection

  • Network Engine settings

18. Detecting and Investigating SecurityIncidents on Endpoint Computers

  • Integrated EndpointSensor

  • Endpoint Detection andResponse

  • Apex One IncidentResponse Model

  • Managed Detection andResponse

19. Troubleshooting Apex One

  • Debugging the Apex OneServer and Agents

  • Troubleshootingcommunication issues

  • Troubleshooting virusinfection

  • Troubleshooting Apex Oneservices

  • Troubleshooting samplesubmission


This course is designedfor IT professionals responsible for protecting endpoint computers from databreaches and targeted attacks.


There are no prerequisites to attend this course, however, a working knowledge of Trend Micro products and services, as well as an understanding of basic networking concepts and principles will be helpful. Basic knowledge of the following topics is also beneficial: 
  • Windows® servers and clients
  • Microsoft® Internet Information Server (IIS)
  • General understanding of malware
Participants are required to bring a laptop computer with a recommended screen resolution of at least 1980 x 1080 or above, and a display size of 15” or above. 


Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a Trend Micro Certified Professional for Apex One. 


Course ID:

Show Schedule for: