Shaping the future of IT skills

Maximising IT performance through learning

Trend Micro™ Certified Professional Deep Security 20 - DEEPSEC


Trend Micro


Show Tabs
Prerequisites & Audience

There are no prerequisites to attend this course, however, a working knowledge of Trend Micro products and services, as well as an understanding of basic networking concepts and principles will be helpful.

Basic knowledge of the following topics is also beneficial:

  • Windows servers and clients
  • Firewalls and packet inspection devices
  • VMware® ESXi/vCenter/NSX
  • Amazon AWS/Microsoft® Azure™/VMware vCloud
  • Virtualization technologies

  • Participants are required to bring a laptop computer with a recommended screen resolution of at least 1980 x 1080 or above and a display size of 15” or above.

    Course Benefits

    After completing this training course, participants will be able to:

  • Describe the purpose, features, functions, and capabilities of Trend Micro Deep Security 12
  • Define and install components that make up Deep Security Implement security by enabling protection modules
  • Describe available configuration and administration options
  • Attempt the Trend Micro Certified Professional for Deep Security Certification Exam.
  • Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a Trend Micro Certified Professional for Deep Security.
  • Course Topics

    Product Overview

  • Introduction to Deep Security
  • Deep Security protection modules
  • Deep Security deployment options
  • Deep Security components

  • Trend Micro™ Deep Security™ Manager

  • Server, operating system, and database requirements
  • Deep Security Manager architecture
  • Installing and upgrading Deep Security Manager

  • Deep Security Agents

  • Deep Security Agent architecture
  • Deploying Deep Security Agents
  • Viewing computer protection status
  • Upgrading Deep Security Agents
  • Organizing computers using groups and
  • Smart Folders

    Keeping Deep Security Up to Date

  • Security updates
  • Software updates
  • Deep Security relays

  • Trend Micro™ Smart Protection™

  • Smart Protection services used by Deep Security
  • Configuring the Smart Protection source

  • Policies

  • Policy inheritance and overrides
  • Creating new policies
  • Protecting Servers from Malware

  • Anti-malware scanning techniques
  • Enabling anti-malware protection
  • Smart Scan

  • Blocking Malicious Websites

  • Enabling web reputation
  • Setting the security level

  • Filtering Traffic Using the Firewall

  • Enabling the Deep Security firewall
  • Firewall rules
  • Traffic analysis
  • Traffic order of analysis
  • Port scan

  • Protecting Servers from Vulnerabilities

  • Virtual patching
  • Protocol hygiene
  • Protocol control
  • Web application protection
  • Enabling intrusion prevention
  • Running recommendation scans
  • Intrusion prevention rules
  • Security Sockets Layer (SSL) filtering
  • Protecting web applications
  • Detecting Changes to Protected Servers

  • Enabling integrity monitoring
  • Running recommendation scans
  • Detection changes to baseline objects

  • Blocking Unapproved Software
  • Enforcement modes
  • Enabling application control
  • Detecting software changes
  • Creating an inventory of approved software
  • Pre-approving software changes

  • Inspecting Logs on Protected Servers

  • Enabling log inspection
  • Running recommendation scans

  • Events and Alerts

  • Event forwarding
  • Alerts
  • Event tagging
  • Reporting

  • Protecting Containers

  • Continuous integration/continuous deployment
  • Software development using containers
  • Protecting containers with Deep Security

  • Automating Deep Security Operations

  • Scheduled tasks
  • Event-based tasks
  • Quick start templates
  • Baking the Deep Security Agent into an Amazon® machine image
  • Application programming interface

  • Activating and Managing Multiple Tenants

  • Segmentation using multi-tenancy
  • Enabling multi-tenancy
  • Creating and managing tenants
  • Activating Deep Security Agents on tenants
  • Usage monitoring

  • Detecting Emerging Malware Through

    Connected Threat Defense

  • Connected Threat Defense phases
  • Trend Micro™ Deep Discovery™ Analyzer
  • Trend Micro Apex Central™
  • Configuring Deep Security for Connected Threat Defense
  • Tracking submission

  • Protecting Virtual Machines Using the Deep Security Virtual Appliance

  • Deep Security Virtual Appliance
  • Virtual Appliance deployment models
  • Virtual appliance deployment and activation
  • Certification
    Trend Micro Certified Professional for Deep Security Certification Exam

    Trend Micro courses

    Trend Micro™ Certified Professional Deep Security 20 - DEEPSEC
    Trend Micro™ Deep Discovery Advanced Threat Detection 3.3 - DEEPDISC
    Trend Micro™ Trend Micro Apex One - APEX
    Trend Micro TippingPoint Security Solutions 1.0 Training for Certified Professionals
    We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.