Trend Micro™ TippingPoint® Security Solutions 1.0 Training for Certified Professionals is a three-day, instructor-led training course that teaches the concepts and best practices necessary for installation, configuration, security management, and system administration of Trend Micro TippingPoint solutions. Through interactive lectures and hands-on activities, students will learn to implement the inspection device and the Security Management System (SMS). Taught by Trend Micro certified trainers, this course incorporates a variety of hands-on lab exercises, allowing participants to put the lesson content into action.

Duration: 3.0 days

Enquire Now

Start learning today!

Click Hereto customize your Training


• Trend Micro Threat Research and TippingPoint Solutions
• Inspection Device Setup and Configuration
• Security Management System Setup and Configuration
• Inspection Device Management
• Security Profile Management
• Traffic Management and Bypass Rules
• Quarantine
• SMS Events and Reports
• SMS Dashboard
• Maintenance and Performance
• Best Practices
• Troubleshooting
• Cloud Networking Protection


Module 1: Introduction to Trend Micro and TippingPoint
  •  Trend Micro overview 
  •  TippingPoint solutions overview 
  •  Trend Micro Threat Research
Module 2: Product Overview
  •  TippingPoint inspection device platforms SMS features and functionalities
  •  Common deployment scenarios
Module 3: Inspection Device Set Up
  •  Introduction to License Manager
  •  Device set up: out of box experience
  •  Local Security Manager (LSM) introduction
Module 4: Security Management System
  •  Set up and basic configuration
  •  Communication settings
  •  Threat insight portal 
  •  SMS management
Module 5: Inspection Device Management
  •  Device configuration
  •  Network configuration and high availability
  •  TippingPoint Operating System (TOS)
Module 6: Security Profile Management
  •  Digital Vaccine (DV)
  •  Profile versioning, rollback, and auditing
  •  Profile search
  •  Managing multiple profiles
Module 7: Traffic Management and Bypass Rules
  •  Flow based vs. non-flow based DV filters
  •  Traffic management filters
  •  Inspection bypass rules
Module 8: Quarantine
  •  Blocking vs. thresholds
  •  Quarantine considerations
Module 9: SMS Events and Reports
  •  SMS event management
  •  SMS reports
Module 10: SMS Dashboard
  •  SMS dashboard customization
  •  Geo locator database
Module 11: Maintenance and Performance
  •  Analyze system health details
  •  Inspection tier stats
Module 12: Best Practices
  •  System architecture
  •  Deployment considerations
  •  System administration
Module 13: Troubleshooting
  •  Analyze system health details
  •  Inspection tier stats
Module 14: Cloud Network Protection
  •  What is cloud network protection?
  •  Deployment models


This course is designed for security and IT professionals who are responsible for protecting networks from any kind of network, endpoint, or cloud security threats. The individuals who will typically benefit the most include:

• System Administrators
• Network Engineers
• Support Engineers
• Integration Engineers
• Solution and Security Architects
• Technical Account Managers


There are no prerequisites to attend this course, however, a working knowledge of Trend Micro products and services, as well as an understanding of basic networking concepts and principles will be helpful.

Basic knowledge of the following topics is beneficial:
  •  Microsoft® Windows® and Linux® operating systems 
  •  Network switching and routing  
  •  Firewalls and packet inspection devices 
  •  Virtualization technologies, with emphasis on VMware® 
  •  Other Trend Micro solutions


Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a Trend Micro Certified Professional for TippingPoint

Course Benefits

  • Career growth
  • Broad Career opportunities
  • Worldwide recognition from leaders
  • Up-to Date technical skills
  • Popular Certification Badges
Enquire Now
By clicking "Submit", I agree to the Terms Of Use and Privacy Policy