Vendors

Overview

Trend Micro™ Deep Discovery™ Advanced Threat Detection 4.0 Training for Certified Professionals is a  three-day, instructor-led training course where participants will learn how to use Deep Discovery Advanced  Threat Protection solutions to detect, analyze, and respond to advanced threats and targeted attacks.

Participants explore key concepts and methodologies using the following blend of Deep Discovery  products for a more complete approach to network security:

  • Trend Micro™ Deep Discovery™ Analyzer
  • Trend Micro™ Deep Discovery™ Inspector
  • Trend Micro™ Deep Discovery™ Email Inspector
  • Trend Micro™ Deep Discovery™ Director

This course provides a variety of hands-on lab exercises allowing each student to put the lesson content  into action. There will be an opportunity to set up and configure various Deep Discovery management  and administration features and explore their functionality using a virtual lab environment.

A comprehensive look at the purpose, features, and capabilities of Deep Discovery Advanced Threat  Protection solutions. This includes recommendations on best practices and general troubleshooting  steps for a successful implementation, along with long-term maintenance of Deep Discovery solutions  in your environment.

The course also explores various deployment considerations and requirements needed to tie Deep  Discovery into various other Trend Micro solutions, like Trend Micro Vision One™, to enhance threat  hunting and intelligence sharing, for better threat detection functionality.

img-course-overview.jpg

What You'll Learn

Upon completion of this course, students will be able to:

  • Describe the purpose, features, and capabilities of Deep Discovery Advanced Threat Detection solution
  • Deploy and configure the following Deep Discovery products:
    • Deep Discovery Analyzer
    • Deep Discovery Inspector
    • Deep Discovery Email Inspector
    • Deep Discovery Director
  • Analyze detected threats and share threat intelligence with Incident Response/Security Ops Centers
  • Create custom sandboxes for virtual analysis of suspicious objects
  • Manage suspicious objects and share threat intelligence with integrated security products
  • Centrally manage firmware and component updates through Deep Discovery Director

Who Should Attend

This course is designed for IT professionals who are responsible for protecting networks from any kind of network, endpoint, or cloud security threats.

The individuals who will typically benefit the most include:

  • System administrators
  • Network engineers
  • Support engineers
  • Integration engineers
  • Solution and security architects
img-who-should-learn.png

Prerequisites

Before you take this course, Trend Micro recommends that you have a working knowledge of their products and services, as well as basic networking concepts and principles. Experience with the following products and technologies is also necessary:

  • Windows® servers and clients
  • Firewalls, web application firewalls, packet inspection devices
  • General understanding of malware

Participants are required to bring a laptop computer with a recommended screen resolution of at least 1980 x 1080 or above, and a display size of 15” or above

Learning Journey

Coming Soon...

Trend Micro Product Overview

  • Product Portfolios
  • Network Detection
  • Trend Micro™ Deep Discovery™ Product Family

Deep Discovery Analyzer

  • Network Setup
  • What is Deep Discovery Analyzer Looking For?
  • Creating and Importing a Sandbox Images
  • Deep Discovery Analyzer Tools
  • Submitting Samples to Deep Discovery Analyzer
  • Suspicious Objects List Management
  • MITRE ATT&CK™ Framework Tactics and Techniques

Deep Discovery Inspector

  • Network Service Diagnostics
  • Deep Discovery Inspector Deployment Topologies
  • Phases of a Targeted Attack
  • Case Study: APT36 (Earth Karkaddan) Attack Chain and Malware Arsenal
  • Indicators of Compromise
  • Deep Discovery Threat Detection Technologies

Deep Discovery Inspector Best Practice and Configuration

  • Deploying Deep Discovery Inspector
  • Configuring Initial Network Settings
  • Best Practice Configurations and Management
  • Working with Logs and Reports
  • Troubleshooting (Packet Capturing)

Analyzing Detected Threats in Deep Discovery Inspector

  • Working with Threat Dashboards
  • Obtaining Key Information for Analyzing Threat Detections
  • Viewing Hosts with Command-and-Control Callbacks
  • Connecting to a Virtual Analyzer for Sandbox Analysis
  • Dealing with Aggressive or False Positive Detections

Deep Discovery Email Inspector

  • Deployment Topologies
  • Email Scanning Technologies
  • Integration with Trend Miro Products

Deploying Deep Discovery Email Inspector

  • Installing and Configuring Deep Discovery Email Inspector
  • Network Configuration
  • Virtual Analyzer Sandbox Configuration
  • Troubleshooting

Deep Discovery Email Inspector Administration

  • Analyzing Detections
  • Policy Management
  • Configuring Scanning / Analysis
  • Policy Management
  • Configuring Virtual Analyzer for Sandbox Analysis
  • Using Debug Functions

Deep Discovery Director

  • Installing Deep Discovery Director
  • Connecting Deep Discovery Products to Deep Discovery Director
  • Sending Logs to a Syslog Server
  • Deployment Plans
  • Managing Threat Detections through Deep Discovery Director
  • Viewing Email Messages with Malicious or Suspicious Content
  • Configuring Rules for Detection
  • Threat Intelligence Interoperability (STIX, TAXII)

Trend Micro Vision One™ Overview

  • Trend Micro XDR
  • Trend Micro Vision One
  • Trend Micro Vision One Apps
  • Trend Micro™ Managed XDR Service

Deep Discovery Inspector and Trend Micro Vision One

  • Deploying Network Inventory Service
  • Downloading the Deep Discovery Inspector Image
  • Creating a Virtual Machine for Deep Discovery Inspector on VMware ESXi
  • Configuring Deep Discovery Inspector Network Settings
  • Connecting Deep Discovery Inspector with Trend Micro Vision One
  • Deploying Trend Micro Service Gateway
  • Connecting Deep Discovery Inspector with Service Gateway

Appendices

  • Deep Discovery Threat Detection Technologies
  • Trend Micro Product Integration
  • Creating Sandboxes

Instructors

Scott Duffy

Bestselling Azure & TOGAF® Trainer, Microsoft Azure MVP

4.8 (4.1k)
|
10 Courses
profile-instructor-a.png
Scott Duffy

Bestselling Azure & TOGAF® Trainer, Microsoft Azure MVP

4.8 (4.1k)
|
10 Courses
profile-instructor-a.png
Upon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Discovery Advanced Threat Detection.


Frequently Asked Questions (FAQs)

  • Why get Trend Micro certified?

    Trend Micro certifications validate your expertise in cybersecurity and your ability to implement and manage Trend Micro's industry-leading security solutions.

    These certifications demonstrate your commitment to staying ahead of the ever-evolving threat landscape and your proficiency in safeguarding organizations from cyberattacks.

    Trend Micro-certified professionals are highly sought after by employers seeking to strengthen their security posture and protect their digital assets.

  • What to expect for the examination?

    Trend Micro certification exams are designed to assess your knowledge and skills in specific Trend Micro products and solutions.

    Exams typically consist of multiple-choice questions and may include scenario-based questions that test your ability to apply your knowledge in real-world situations.

    Note: Certification requirements and policies may be updated by Trend Micro from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • How long is Trend Micro certification valid for?

    Trend Micro certifications are valid for two years.

    To maintain your certification, you will need to recertify before it expires.

    Note: Certification requirements and policies may be updated by Trend Micro from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • Why take this course with Trainocate?

    Here’s what sets us apart:

    - Global Reach, Localized Accessibility: Benefit from our geographically diverse training hubs in 16 countries (and counting!).

    - Top-Rated Instructors: Our team of subject matter experts (with high average CSAT and MTM scores) are passionate to help you accelerate your digital transformation.

    - Customized Training Solutions: Choose from on-site, virtual classrooms, or self-paced learning to fit your organization and individual needs.

    - Experiential Learning: Dive into interactive training with our curated lesson plans. Participate in hands-on labs, solve real-world challenges, and take on comprehensive assessments.

    - Learn From The Best: With 30+ authorized training partnerships and countless awards from Microsoft, AWS, Google – you're guaranteed learning from the industry's elite.

    - Your Bridge To Success: We provide up-to-date course materials, helpful exam guides, and dedicated support to validate your expertise and elevate your career.

Keep Exploring

Course Curriculum

Training Schedule

Exam & Certification

Frequently Asked Questions

img-improve-career.jpg

Improve yourself and your career by taking this course.

img-get-info.jpg

Ready to Take Your Business from Great to Awesome?

Level-up by partnering with Trainocate. Get in touch today.

Name
Email
Phone
I'm inquiring for
Inquiry Details

By providing your contact details, you agree to our Privacy Policy.