CC Otwarte Systemy Komputerowe Sp. z o.o.

szkolenia i warsztaty (Palo Alto Networks, Juniper, Check Point, inne)

Trend Micro Deep Security Update

Szkolenie autoryzowane

Trend Micro Deep Security Updatejęzyk: pl,
wolne: 7 miejsc
480,- eurRejestracja

This course is based on Deep Security 11 This course is taught by Trend Micro-certified trainers. Upon completion of this course, participants may complete the certification examination in order to validate their Trend Micro Certified Professional for Deep Security for another 2 years.

Target audience and Course Prerequisites This course is designed for IT professionals who have already been certified on Deep Security within the last 2 years. Participants are required to bring a laptop computer with a screen resolution of at least 1980 x 1080 or above; a display size of 15" or above is recommended.


Dzień 1 9:00 - 17:00

What's new - Overview • Deep Security 11 Product Overview • Key Business Drivers • New Deep Security Protection Module (Application Control) • New Deep Security components • Connected Threat Defense Components Deep Security Manager • Server and operating system requirements • Database requirements • Upgrading to DS 11 Deep Security Agent • Upgrading Deep Security Agents to Relays (new method in 10.3) • Organizing computers using Groups and Smart Folders • Upgrading to DS 11 Protecting Servers from Malware • New Protection Features o Process Memory Scanning o Behaviour Monitoring o Predictive Machine Learning • Connected Threat Defense Filtering Traffic Using Firewall Rules • Failure Response Behaviour • Anti-Evasion Posture • Advance Network Engine Options Blocking Unapproved Software • Enabling Application Control • Detecting software changes • Creating an inventory of approved software • Viewing Application Control-related events • Creating diagnostic packages Detecting Emerging Malware Through Connected Threat Defense • Connected Threat Defense requirements • Deep Discovery Analyzer • Trend Micro Control Manager • Integrating Deep Security into Connected Threat Defense Protecting Virtual Machines Using the Deep Security Virtual Appliance • Deploying Deep Security in VMWare ESXi environments



Zarejestruj się