Vendors

Trend Micro™ TippingPoint® Security Solutions 5.0 Training for Certified Experts is a handson, five-day course that teaches the expert-level concepts and best practices necessary for implementation, planning, installation, configuration, security management, and system administration of TippingPoint solutions. Through interactive lectures and hands-on labs, students will learn to implement TippingPoint inspection devices and the Security Management System (SMS) using the standard interface modes. Students will also acquire in-depth expert knowledge on tuning and configuring a TippingPoint inspection device for optimum performance, as well as advanced configuration management of multiple devices using the SMS.

img-course-overview.jpg

What You'll Learn

Upon completion of this course, students will acquire knowledge of the TippingPoint solutions including:

  • Security device setup and configuration
  • SMS setup and configuration
  • Administrative best practices
  • Policy management

Who Should Attend

This course is designed for security and IT professionals responsible for protecting networks network, endpoint, or cloud security threats. The individuals who will typically benefit the most include::

  • Network Engineers
  • Network Administrators
  • Network Technicians
  • Security Administrators
  • Systems Engineers
  • System Administrators
  • Network Security Strategist and Planning Architects
img-who-should-learn.png

Prerequisites

TippingPoint Certified Professional Training (three-day instructor-led training) or TippingPoint Essentials (modular web-based training), plus equivalent hands-on experience using TippingPoint solutions.

Learning Journey

Coming Soon...

Device Setup and Configuration

  • TippingPoint product portfolio
  • Inspection device and SMS setup
  • License manager
  • Trend Micro™ TippingPoint™ Digital Vaccine™ Labs (DVLabs) overview

Policy Management - DVLabs

  • Basic policy management
  • Digital Vaccine™ (DV) contents
  • Profile management
  • Deployment modes
  • Trend Micro™ TippingPoint™ ThreatLinQ

Advanced Inspection Device Management

  • Discuss network segments and ports
  • Discuss intrusion prevention system (IPS) segment concepts (Layer 2 Fallback (L2FB) configuration and link down synchronization)
  • Zero power high availability (ZPHA)
  • Discuss terms of service (ToS) versioning and updating

SMS Network Configuration

  • SMS communication
  • Network configuration
  • Device configuration
  • Terms of service (ToS) updates and snapshots

DV Filters and Policy

  • Flow-based vs. non-flow-based
  • Threat suppression engine
  • Profile configuration
  • Filter search nomenclature

User Configurable Filters

  • Non-flow-based inspection filters
  • Port scan and host sweep filters
  • Traffic management filters
  • Threat suppression engine

Enterprise Vulnerability Remediation (EVR)

  • Common vulnerabilities and exposures (CVE)
  • Importing vulnerability scans
  • Profile tuning

ThreatDV

  • Reputation feed
  • Malware filter package
  • RepFeed scoring
  • Adding tag categories
  • IP/DNS/URL reputation
  • Domain generation algorithm (DGA) filters
  • Editing/Creating entries
  • Monitoring events

DV Toolkit

  • Creating a new filter
  • Searching filters
  • Testing filters
  • Real-world example using file transfer protocol (FTP) PUT
  • Digital video technology (DVT) converter tool

SMS Management

  • SMS hardware and virtual machine
  • Dashboard introduction
  • Geo locator
  • Maintenance
  • High availability
  • Event management
  • SMS reports

Advanced DDoS

  • Syn flood attacks
  • Connection-based attacks
  • Platform support
  • Configuration
  • Events and reports

Quarantine

  • Blocking
  • Thresholds
  • Action sets

Advanced Deployments

  • Policy by direction
  • Policy by virtual LAN (VLAN)
  • Policy by classless inter-domain routing
  • (CIDR)
  • Policy precedence and application

Optimizing Performance

  • Automatic optimization
  • L2FB
  • VLAN, multiprotocol label switching (MPLS), and tunneling

Deployment and Architecture

  • Common deployment scenarios
  • Understanding hardware architecture
  • Thread types
  • SSL packet flow

SMS Responder

  • Thresholds example
  • Quarantine and SMS responder together
  • Correlation and thresholding
  • Use cases
  • Custom responses
  • Action sets

Secure Sockets Layer (SSL) Inspection

  • Transparent proxy
  • SSL inbound inspection
  • Configuring licenses
  • Ciphers and protocols
  • Profile configuration

SMS and Trend Micro™ Deep Discovery™ Integration

  • Terminology
  • URL forwarding overview
  • Configuring Deep Discovery and SMS integration

Frequently Asked Questions (FAQs)

  • Why get Trend Micro certified?

    Trend Micro certifications validate your expertise in cybersecurity and your ability to implement and manage Trend Micro's industry-leading security solutions.

    These certifications demonstrate your commitment to staying ahead of the ever-evolving threat landscape and your proficiency in safeguarding organizations from cyberattacks.

    Trend Micro-certified professionals are highly sought after by employers seeking to strengthen their security posture and protect their digital assets.

  • What to expect for the examination?

    Trend Micro certification exams are designed to assess your knowledge and skills in specific Trend Micro products and solutions.

    Exams typically consist of multiple-choice questions and may include scenario-based questions that test your ability to apply your knowledge in real-world situations.

    Note: Certification requirements and policies may be updated by Trend Micro from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • How long is Trend Micro certification valid for?

    Trend Micro certifications are valid for two years.

    To maintain your certification, you will need to recertify before it expires.

    Note: Certification requirements and policies may be updated by Trend Micro from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • Why take this course with Trainocate?

    Here’s what sets us apart:

    - Global Reach, Localized Accessibility: Benefit from our geographically diverse training hubs in 24 countries (and counting!).

    - Top-Rated Instructors: Our team of subject matter experts (with high average CSAT and MTM scores) are passionate to help you accelerate your digital transformation.

    - Customized Training Solutions: Choose from on-site, virtual classrooms, or self-paced learning to fit your organization and individual needs.

    - Experiential Learning: Dive into interactive training with our curated lesson plans. Participate in hands-on labs, solve real-world challenges, and take on comprehensive assessments.

    - Learn From The Best: With 30+ authorized training partnerships and countless awards from Microsoft, AWS, Google – you're guaranteed learning from the industry's elite.

    - Your Bridge To Success: We provide up-to-date course materials, helpful exam guides, and dedicated support to validate your expertise and elevate your career.

Keep Exploring

Course Curriculum

Course Curriculum

Training Schedule

Training Schedule

Exam & Certification

Exam & Certification

FAQs

Frequently Asked Questions

img-improve-career.jpg

Improve yourself and your career by taking this course.

img-get-info.jpg

Ready to Take Your Business from Great to Awesome?

Level-up by partnering with Trainocate. Get in touch today.

Name
Email
Phone
I'm inquiring for
Inquiry Details

By submitting this form, you consent to Trainocate processing your data to respond to your inquiry and provide you with relevant information about our training programs, including occasional emails with the latest news, exclusive events, and special offers.

You can unsubscribe from our marketing emails at any time. Our data handling practices are in accordance with our Privacy Policy.