Module 1: Introduction and Architecture
Understanding TrendAI Vision One ™CECP Architecture
This module introduces the core architecture of TrendAI Vision One™ Email and Collaboration Security. It explains how CECP integrates with cloud-based platforms like Microsoft 365, Google Workspace, Box, and Dropbox. Students will learn the underlying components, communication flows, and security layers that enable robust protection.
The goal is to provide a conceptual foundation for subsequent configuration and operational tasks, ensuring learners appreciate the system’s design and scalability.
Deployment Models and Integration Scenarios
Here, learners explore different deployment models, including API-based integration and sensor-based monitoring. The module covers prerequisites for integration, authentication mechanisms, and permissions required for secure connectivity. By the end, students will understand how to select the most appropriate deployment model for their organization’s needs and compliance requirements.
Module 2: Provisioning and Configuration
Provisioning CECP Instances
This topic walks through the steps of creating and provisioning CECP instances within TrendAI Vision One™. It includes account setup, resource allocation, and initial configuration tasks. Learners will gain hands-on experience in preparing the environment for operational readiness, ensuring all components are correctly initialized for securityenforcement.
Granting Access to Cloud Services
Students will learn how to securely connect CECP to Microsoft 365, Google Workspace, Box, and Dropbox. The module emphasizes OAuth permissions, API scopes, and best practices for minimizing exposure during integration. Practical exercises will reinforce the ability to troubleshoot common connectivity issues and validate successful integration.
Module 3: Policy Management and Security
Controls Configuring Email Sensors
This module focuses on deploying and configuring sensors to monitor email traffic effectively. Learners will understand sensor roles, placement strategies, and how sensors contribute to threat detection accuracy. The session includes troubleshooting techniques for sensor-relatedissues, ensuring uninterrupted monitoring.
Creating and Managing Protection Policies
Students will dive into policy creation for malware filtering, phishing prevention, and data loss protection. The module explains how to apply granular rules across email and collaboration platforms, aligning with organizational compliance standards. Learners will also explore policy testing and optimization to maintain a strong security posture.
Module 4: Advanced Security Operations
Global Settings and System Administration This topic covers system-wide configurations, including alert thresholds, notification settings, and administrative roles. Learners will practice optimizing CECP performance and maintaining consistent security across multiple collaborationplatforms.
Logs, Reports, and Compliance Documentation Students will learn how to interpret logs, generate actionable reports, and create compliance-ready documentation. The module emphasizes usingdashboards for real-time insights and leveraging reporting tools for audits and regulatoryrequirements.
Module 5: Threat Detection and RiskManagement
Cyber Risk Exposure Management (CREM ) for Email Security
This module introduces CREM concepts applied toemail and collaboration accounts. Learners will assess risk scores, identify high-risk accounts, andprioritize remediation strategies. Practical exerciseswill demonstrate how CREM enhances proactivesecurity measures.
XDR Threat Detection for Email Security
Students will gain hands-on experience using XDRtools to investigate email-based threats. The module covers event correlation, attack chain analysis, and executing response actions. By mastering these techniques, learners will beequipped to handle sophisticated attacks effectively.