Detailed Course Outline
Course Topics Product Overview
- Introduction to Deep Security
- Deep Security protection modules
- Deep Security deployment options
- Deep Security components
Trend Micro™ Deep Security™ Manager
- Server, operating system, and database requirements
- Deep Security Manager architecture
- Installing and upgrading Deep Security Manager
Deep Security Agents
- Deep Security Agent architecture
- Deploying Deep Security Agents
- Viewing computer protection status
- Upgrading Deep Security Agents
- Organizing computers using groups and
- Smart Folders
Keeping Deep Security Up to Date
- Security updates
- Software updates
- Deep Security relays
Trend Micro™ Smart Protection™
- Smart Protection services used by Deep Security
- Configuring the Smart Protection source
Policies
- Policy inheritance and overrides
- Creating new policies
Protecting Servers from Malware
- Anti-malware scanning techniques
- Enabling anti-malware protection
- Smart Scan
Blocking Malicious Websites
- Enabling web reputation
- Setting the security level
Filtering Traffic Using the Firewall
- Enabling the Deep Security firewall
- Firewall rules
- Traffic analysis
- Traffic order of analysis
- Port scan
Protecting Servers from Vulnerabilities
- Virtual patching
- Protocol hygiene
- Protocol control
- Web application protection
- Enabling intrusion prevention
- Running recommendation scans
- Intrusion prevention rules
- Security Sockets Layer (SSL) filtering
- Protecting web applications
Detecting Changes to Protected Servers
- Enabling integrity monitoring
- Running recommendation scans
- Detection changes to baseline objects
Blocking Unapproved Software
- Enforcement modes
- Enabling application control
- Detecting software changes
- Creating an inventory of approved software
- Pre-approving software changes
Inspecting Logs on Protected Servers
- Enabling log inspection
- Running recommendation scans
Events and Alerts
- Event forwarding
- Alerts
- Event tagging
- Reporting
Protecting Containers
- Continuous integration/continuous deployment
- Software development using containers
- Protecting containers with Deep Security
Automating Deep Security Operations
- Scheduled tasks
- Event-based tasks
- Quick start templates
- Baking the Deep Security Agent into an Amazon® machine image
- Application programming interface
Activating and Managing Multiple Tenants
- Segmentation using multi-tenancy
- Enabling multi-tenancy
- Creating and managing tenants
- Activating Deep Security Agents on tenants
- Usage monitoring
Detecting Emerging Malware Through
Connected Threat Defense
- Connected Threat Defense phases
- Trend Micro™ Deep Discovery™ Analyzer
- Trend Micro Apex Central™
- Configuring Deep Security for Connected Threat Defense
- Tracking submission
Protecting Virtual Machines Using the Deep Security Virtual Appliance
- Deep Security Virtual Appliance
- Virtual Appliance deployment models
- Virtual appliance deployment and activation
- Certification
- Trend Micro Certified Professional for Deep Security Certification Exam