Select a different country or region to see content specific to your location and make online purchases.
x
GB
/
GBP
Image
Filter Events

Trend Micro TippingPoint Security Solutions 1.0 Training for Certified Professionals

WGAC-TRM-TIPPINGPOINT-E

Trend Micro Training Courses Certification

Schedule

See all events for this courseSee all Courses
Open
Trend Micro

Trend Micro TippingPoint Security Solutions 1.0 Training for Certified Professionals

WGAC-TRM-TIPPINGPOINT-E

Virtual ILT

Language: English

CEST UTC+02:00

Start date:03 Oct 2022 09:00
End date:05 Oct 2022 17:00
Duration:3 days

$ 1,850

Open
Trend Micro

Trend Micro TippingPoint Security Solutions 1.0 Training for Certified Professionals

WGAC-TRM-TIPPINGPOINT-E

Virtual ILT

Language: English

CET UTC+01:00

Start date:23 Nov 2022 09:30
End date:25 Nov 2022 17:30
Duration:3 days

$ 1,850

Description

Trend Micro™ TippingPoint® Security Solutions 1.0 Training for Certified Professionals is a three-day, instructor-led training course that teaches the concepts and best practices necessary for installation, configuration, security management, and system administration of Trend Micro TippingPoint solutions. Through interactive lectures and hands-on activities, students will learn to implement the inspection device and the Security Management System (SMS). Taught by Trend Micro certified trainers, this course incorporates a variety of hands-on lab exercises, allowing participants to put the lesson content into action.

Target Audience:

This course is designed for security and IT professionals who are responsible for protecting networks from any kind of network, endpoint, or cloud security threats. The individuals who will typically benefit the most include:

• System Administrators

• Network Engineers

• Support Engineers

• Integration Engineers

• Solution and Security Architects

• Technical Account Manager

There are no prerequisites to attend this course, however, a working knowledge of Trend Micro products and services, as well as an understanding of basic networking concepts and principles will be helpful.

Basic knowledge of the following topics is beneficial:

• Windows and Linux Operating Systems

• Network switching and routing

• Firewalls and Packet Inspection Devices

• Virtualization Technologies with emphasis on VMware

• Other Trend Micro solutions beneficial 

Upon completion of this course, students will acquire knowledge of Trend Micro TippingPoint solutions including:

• Trend Micro Threat Research and TippingPoint Solutions

• Inspection Device Setup and Configuration

• Security Management System Setup and Configuration

• Inspection Device Management

• Security Profile Management

• Traffic Management and Bypass Rules

• Quarantine

• SMS Events and Reports

• SMS Dashboard

• Maintenance and Performance

• Best Practices • Troubleshooting

• Cloud Networking Protection 

WHY CHOOSE TREND MICRO EDUCATION:

• Hands-on instruction from Trend Micro certified trainers

• With Trend Micro product certifications, you have the skills to deploy and manage our leading security solutions

• On demand or in a classroom—we have the right courses for you

• By sharpening your skills, you are in a position to better detect and respond to the latest attacks

DETAILED COURSE OUTLINE:

The course topics in this training are divided into the following lessons:

Introduction to Trend Micro and TippingPoint 

• Trend Micro Overview

• TippingPoint Solutions Overview

• Trend Micro Threat Research 

Portfolio Overview

• TippingPoint inspection device platforms

• SMS features and functionalities

• Common deployment scenarios

Inspection Device Setup

• Introduction to License Manager

• Device setup Out-of-Box-Experience

• Local Security Manager (LSM) Introduction 

Security Management System 

• Setup and Basic Configuration

• Communication Settings

• Threat Insight Portal

• SMS Management

Inspection Device Management

• Device configuration

• Network configuration and High Availability

• TippingPoint Operating System (TOS)

Security Profile Management

• Digital Vaccine (DV)

• Profile Versioning, Rollback, and Auditing

• Profile Search

• Managing Multiple Profiles

Traffic Management and Bypass Rules

• Flow based vs. non-flow based DV filters

• Traffic Management Filters

• Inspection Bypass Rules

Quarantine

• Blocking vs. Thresholds

• Quarantine Considerations

SMS Events and Reports

• SMS Event Management

• SMS Reports 

SMS Dashboard

• SMS Dashboard Customization

• Geo Locator Database 

Maintenance and Performance

• Analyze System Health Details

• Inspection Tier Stats

Best Practices 

• System Architecture

• Deployment Considerations

• System Administration 

Troubleshooting 

• Analyze System Health Details

• Inspection Tier Stats

Cloud Network Protection

• What is Cloud Network Protection

• Deployment Models 

We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.