Security Management
Deep Security
Overview:
Introduction:
This training program offers comprehensive instruction on Trend Micro's security solution, Deep Security 12, covering its purpose, features, functions, and installation components. By attending it, individuals become proficient professionals capable of implementing and managing Deep Security to enhance organizational security posture.
Program Objectives:
At the end of this program, participants will be able to:
-
Describe the purpose, features, functions, and capabilities of Trend Micro Deep Security 12.
-
Define and install components that make up Deep Security.
-
Maintain Deep Security by keeping it up to date.
-
Implement measures to block unapproved software.
-
Become proficient professionals for Deep Security.
Targeted Audience:
-
IT professionals responsible for protecting endpoint computers from data breaches and targeted attacks.
-
Employees involved in Operations, Deployment,Security Response and Compliance.
Program Outline:
Unit 1:
Product Overview:
-
Introduction to Deep Security.
-
Deep Security protection modules.
-
Deep Security deployment options.
-
Deep Security components.
Unit 2:
Deep Security Agents:
-
Deep Security Agent architecture.
-
Deploying Deep Security Agents.
-
Viewing computer protection status.
-
Upgrading Deep Security Agents.
-
Organizing computers using groups.
-
Smart Folders.
Unit 3:
Keeping Deep Security Up to Date:
-
Security updates.
-
Software updates.
-
Deep Security relays.
Unit 4:
Blocking Unapproved Software:
-
Enforcement modes.
-
Enabling application control.
-
Detecting software changes.
-
Creating an inventory of approved software.
-
Pre-approving software changes.
Unit 5:
Automating Deep Security Operations:
-
Scheduled tasks.
-
Event-based tasks.
-
Quick start templates.
-
Baking the Deep Security Agent into an Amazon® machine image.
-
Application programming interface.