Arrow Education reçoit la certification QUALIOPI
La certification QUALIOPI permet à nos clients de faire financer les formations de leurs collaborateurs par les organismes financeurs.
CODE: TRM_DD
DURÉE: 21 Hours (3 Jours)
PRIX H.T.: €2 250,00
Trend Micro™ Deep Discovery™ Advanced Threat Detection 4.0 Training for Certified Professionals is a
three-day, instructor-led training course where participants will learn how to use Deep Discovery Advanced
Threat Protection solutions to detect, analyze, and respond to advanced threats and targeted attacks.
Participants explore key concepts and methodologies using the following blend of Deep Discovery
products for a more complete approach to network security:
•
Trend Micro™ Deep Discovery™ Analyzer•
Trend Micro™ Deep Discovery™ Inspector•
Trend Micro™ Deep Discovery™ Email Inspector•
Trend Micro™ Deep Discovery™ DirectorThis course provides a variety of hands-on lab exercises allowing each student to put the lesson content
into action. There will be an opportunity to set up and configure various Deep Discovery management
and administration features and explore their functionality using a virtual lab environment.
A comprehensive look at the purpose, features, and capabilities of Deep Discovery Advanced Threat
Protection solutions. This includes recommendations on best practices and general troubleshooting
steps for a successful implementation, along with long-term maintenance of Deep Discovery solutions
in your environment.
The course also explores various deployment considerations and requirements needed to tie Deep
Discovery into various other Trend Micro solutions, like Trend Micro Vision One™, to enhance threat
hunting and intelligence sharing, for better threat detection functionality.
Upon completion of this course, students will be able to:
•
Describe the purpose, features, and capabilities of Deep Discovery Advanced Threat Detection solution•
Deploy and configure the following Deep Discovery products:•
Deep Discovery Analyzer•
Deep Discovery Inspector•
Deep Discovery Email Inspector•
Deep Discovery Director•
Analyze detected threats and share threat intelligence with Incident Response/Security Ops Centers•
Create custom sandboxes for virtual analysis of suspicious objects•
Manage suspicious objects and share threat intelligence with integrated security products•
Centrally manage firmware and component updates through Deep Discovery Director
This course is designed for IT professionals who are responsible for protecting networks from any kind of network, endpoint, or cloud security threats.
The individuals who will typically benefit the most include:
• System administrators
• Network engineers
• Support engineers
• Integration engineers
• Solution and security architects
Before you take this course,
Trend Micro recommends that you have a working knowledge of their products and services, as well as basic networking concepts and principles.
Experience with the following products and technologies is also necessary:
• Windows® servers and clients
• Firewalls, web application firewalls, packet inspection devices
• General understanding of malware
Participants are required to bring a laptop computer with a recommended screen resolution of at least 1980 x 1080 or above, and a display size of 15” or above.
The course topics in this training are divided into the following lessons:
Trend Micro Product Overview
•
Product Portfolios•
Network Detection•
Trend Micro™ Deep Discovery™ Product FamilyDeep Discovery Analyzer
•
Network Setup•
What is Deep Discovery Analyzer Looking For?•
Creating and Importing a Sandbox Images•
Deep Discovery Analyzer Tools•
Submitting Samples to Deep Discovery Analyzer•
Suspicious Objects List Management•
MITRE ATT&CK™ Framework Tacticsand Techniques
Deep Discovery Inspector
•
Network Service Diagnostics•
Deep Discovery Inspector DeploymentTopologies
•
Phases of a Targeted Attack•
Case Study: APT36 (Earth Karkaddan)Attack Chain and Malware Arsenal
•
Indicators of Compromise•
Deep Discovery Threat DetectionTechnologies
Deep Discovery Inspector Best Practice
and Configuration
•
Deploying Deep Discovery Inspector•
Configuring Initial Network Settings•
Best Practice Configurations andManagement
•
Working with Logs and Reports•
Troubleshooting (Packet Capturing)Analyzing Detected Threats in
Deep Discovery Inspector
•
Working with Threat Dashboards•
Obtaining Key Information for AnalyzingThreat Detections
•
Viewing Hosts with Command-and-ControlCallbacks
•
Connecting to a Virtual Analyzer forSandbox Analysis
•
Dealing with Aggressive or FalsePositive Detections
Deep Discovery Email Inspector
•
Deployment Topologies•
Email Scanning Technologies•
Integration with Trend Miro ProductsDeploying Deep Discovery
Email Inspector
•
Installing and Configuring Deep DiscoveryEmail Inspector
•
Network Configuration•
Virtual Analyzer Sandbox Configuration•
TroubleshootingDeep Discovery Email Inspector
Administration
•
Analyzing Detections•
Policy Management•
Configuring Scanning / Analysis•
Policy Management•
Configuring Virtual Analyzer forSandbox Analysis
•
Using Debug FunctionsDeep Discovery Director
•
Installing Deep Discovery Director•
Connecting Deep Discovery Products toDeep Discovery Director
•
Sending Logs to a Syslog Server•
Deployment Plans•
Managing Threat Detections through DeepDiscovery Director
•
Viewing Email Messages with Malicious orSuspicious Content
•
Configuring Rules for Detection•
Threat Intelligence Interoperability (STIX,TAXII)
Trend Micro Vision One™ Overview
•
Trend Micro XDR•
Trend Micro Vision One•
Trend Micro Vision One Apps•
Trend Micro™ Managed XDR ServiceDeep Discovery Inspector and
Trend Micro Vision One
•
Deploying Network Inventory Service•
Downloading the Deep Discovery InspectorImage
•
Creating a Virtual Machine for DeepDiscovery Inspector on VMware ESXi
•
Configuring Deep Discovery InspectorNetwork Settings
•
Connecting Deep Discovery Inspector withTrend Micro Vision One
•
Deploying Trend Micro Service Gateway•
Connecting Deep Discovery Inspector withService Gateway
Appendices
•
Deep Discovery ThreatDetection Technologies
•
Trend Micro Product Integration•
Creating SandboxesUpon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Discovery Advanced Threat Detection.