Arrow Electronics, Inc.

Trend Micro Advanced Threat Defense Training

CODE: TRM_DS-ATDT

LENGTH: 5 days

PRICE: kr39 500,00

Description

After the 5-day classroom based Advanced Threat Defense training you should have essential knowledge to understand, analyze and build the story of a cyber-attack as well as recommend solutions.

Objectives

Completing this course will enable you to:
• Perform network traffic analysis and discuss Network Security Threats
• Understand and apply principles of incident response and risk management
• Illustrate Advanced Persistent Threat attack methodologies
• Perform incident investigation leveraging Trend Micro solutions

Audience

This course is designed for IT professionals who are responsible for protecting networks from any kind of networked, endpoint, or cloud security threats.
The individuals who will typically benefit the most include:
• System administrators
• Network engineers
• Support Engineers
• Integration Engineers
• Solution and Security Architects

Prerequisites

Before you take this course, Trend Micro recommends attendees to have an understanding of:
• Network and security fundamentals
• CompTIA Security+ or equivalent experience
• Targeted attacks lifecycle and techniques
• Cybercrime Operations and Attack Methodologies
• Basic administration of Deep Discovery, Deep Security and Endpoint Sensor

Programme

Advanced Threat Defense – Network Security Essentials
• Introduction into Advanced Threats
• Networking Essentials
- Wireshark packet analysis
- Reconnaissance, incl. Host Discovery, Banner Grabbing, Port Scanning
• Network Security Threats
- Web, incl. Directory Traversal, SQL Injection, CSRF & XSS
- Man-in-the-Middle attacks, incl. Session Hijacking
• Overview of Security Solutions
• Introduction into Incident Response and Risk Management
• ARP Poisoning Analysis
Advanced Threat Defense – Cybercrime Operations and Attack Methodologies
• Cybercrime Operations, its Ecosystem and Business Model
• Introduction to 6 Stages of APT
• APT Attack Methodologies,
- Remote Access Tools, Credentials Harvesting, Man-in-the-Middle attacks, File-less attacks etc.
• Case Studies
• Hacking Challenge
Advanced Threat Defense – Trend Micro Advanced Threat Response
• Handling an Incident
• Incident Investigation by Trend Micro Solutions and 3rd party tools
• Leveraging Threat Intelligence in Incident Response
• Incident Response Challenge

Session Dates