Trend Micro™ Deep Discovery Inspector (DDI) Training
Startdata en plaatsen
Beschrijving
Course Outline
In this course, you will learn how to use Trend Micro™ Deep Discovery Inspector.
This course provides information about the basic architecture, deployment
scenarios, installation, configuration, and administration options, and
troubleshooting details that an administrator needs to know for successful
implementation and long-term maintenance.
Prerequisites & Audience
Target Audience:
This course is designed for IT professionals who are responsible for protecting
networks from any kind of networked, endpoint, or cloud security threats.
The individuals who will typically benefit the most include:
-
System administrators
-
Network engineers
-
Support Engineers
-
Integration Engine…
Veelgestelde vragen
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Course Outline
In this course, you will learn how to use Trend Micro™ Deep Discovery Inspector.
This course provides information about the basic architecture, deployment
scenarios, installation, configuration, and administration options, and
troubleshooting details that an administrator needs to know for successful
implementation and long-term maintenance.
Prerequisites & Audience
Target Audience:
This course is designed for IT professionals who are responsible for protecting
networks from any kind of networked, endpoint, or cloud security threats.
The individuals who will typically benefit the most include:
-
System administrators
-
Network engineers
-
Support Engineers
-
Integration Engineers
-
Solution & Security Architects
Course Prerequisites
Before you take this course, Trend Micro recommends that you have a working
knowledge of their products and services, as well as basic networking concepts and
principles.
You should also have a working knowledge of the following products:
? Windows 2003 / 2008 / 2012 / 7 / 8 servers and clients
? Firewalls, WAFs, Packet Inspection devices
? General understanding of malware
Course Topics
Overview
-
Advanced Threat Detection
-
Custom Defense Products and Strategies
-
Architecture
-
Components and Positioning
-
Connectivity Requirements
-
Administration Methods
-
Installation and Configuration
-
Threat Detection Technologies
-
ATSE, NCIE/VSAPI2, TMUFE, NCCE/CAV, Virtual Analyser
-
Network Packet Detection Flow
-
Virtual Analyzer
-
Components and Process flow
-
Decision rules and File Submission rules
-
Results and Reports
-
Virtual Analyzer Feedback
-
C&C Callback Attempts
-
Suspicious Object List
-
Logs and Reports
-
Debug Portal and Troubleshooting Portal
-
Updating
-
C&C Retro Scan
-
Sharing Threat Intelligence
-
Threat Connect
-
System and Resources
Blijf op de hoogte van nieuwe ervaringen
Deel je ervaring
Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.