07 Trend Micro™ Apex One™ Training for Certified Professionals / Update Course

Registration

Upcoming Sessions and Registration:

Trend Micro Partners – by request only

Trend Micro Customers – by request only

1-day Update Course Trend Micro Partners

1-day Update Course Trend Micro Customers

Please purchase training seats prior to registration.

Anmeldung

Bevorstehende Schulungen und Anmeldung:

Trend Micro Partners – by request only

Trend Micro Customers – by request only

1-day Update Course Trend Micro Partners

1-day Update Course Trend Micro Customers

Schulungsplätze bitte vor der Anmeldung erwerben.

Target Audience

This course is designed for IT professionals responsible for protecting endpoint computers from data breaches and targeted attacks.
This includes those involved with:

  • Operations
  • Deployment
  • Security Response
  • Compliance

Zielgruppe

Dieser Kurs richtet sich an IT-Experten, die für den Schutz von Endgeräten vor Datenverletzungen und gezielte Angriffe zuständig sind.
Dazu gehören Personen aus den Unternehmensbereichen

  • Betrieb
  • Bereitstellung
  • Sicherheitsreaktion
  • Einhaltung der Vorschriften

CERTIFICATIONS AND RELATED EXAMINATIONS:

Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a
Trend Micro Certified Professional for Apex One.

ZERTIFIZIERUNGEN UND ZUGEHÖRIGE PRÜFUNGEN:

Nach Abschluss dieses Kurses können die Teilnehmer die Zertifizierungsprüfung ablegen, um um den Titel Trend Micro Certified Professional für Apex One zu erhalten.

Course Description

In this course, you will learn how to use Trend Micro Apex One™. The course details basic architecture, protection functionality, deployment scenarios and troubleshooting.

Through hands-on labs, participants practice configuring Trend Micro Apex One™ protection features, along with the administration options needed for a successful deployment.

Taught by Trend Micro certified trainers, this course incorporates a variety of practical lab exercises, allowing participants to put the lesson content into action.

Kursbeschreibung

In diesem Kurs lernen Sie die Verwendung von Trend Micro Apex One™ und erfahren mehr über die grundlegende Architektur, Schutzfunktionen, Deployment Optionen und Troubleshooting.

Anhand praktischer Übungen üben die Teilnehmer die Konfiguration der Trend Micro Apex One™ Schutzfunktionen Schutzfunktionen sowie die für eine erfolgreiche Bereitstellung erforderlichen Verwaltungsoptionen.

Der Kurs wird von Trend Micro zertifizierten Trainern gehalten und beinhaltet eine Vielzahl praktischer Übungen, die es den Teilnehmern ermöglichen, die Lerninhalte in die Praxis umzusetzen.

Prerequisites

There are no prerequisites to attend this course, however, a working knowledge of Trend Micro platforms and solutions, as well as an understanding of basic  networking concepts and principles, will be helpful.

Basic knowledge of the following topics is also beneficial:

  • Windows servers and clients
  • Microsoft® Internet Information Server (IIS)
  • General understanding of malware

Participants are required to bring a laptop with a recommended screen resolution of at least 1980 x 1080 or above and a display size of 15” or above.
A second screen is advantageous for labs i.e. lab guide on one screen and virtual environment on the other.

Voraussetzungen

Für die Teilnahme an diesem Kurs sind keine Voraussetzungen erforderlich, jedoch sind Kenntnisse über Trend Micro-Plattformen und -Lösungen sowie ein  Verständnis der grundlegenden Netzwerkkonzepte und Prinzipien hilfreich.

Grundlegende Kenntnisse zu den folgenden Themen sind ebenfalls von Vorteil:

  • Windows Server and Clients
  • Microsoft® Internet Information Server (IIS)
  • Grundkenntnisse von Malware

Die Teilnehmer benötigen einen eigenen Laptop mit einer empfohlenen Bildschirmauflösung von mindestens 1980 x 1080 oder höher und einer Bildschirmgröße von 15″ oder höher.
Ein zweiter Bildschirm ist für die Übungen von Vorteil, d.h. Laboranleitung auf einem Bildschirm und virtuelle Umgebung auf dem anderen.

Course Objectives

After completing this course, participants will be able to:

  • Describe the purpose, features, functions, and capabilities of Apex One
  • Define the components that make up Apex One
  • Implement security using Security Agents
  • Configure and administer Apex One Servers and Agents
  • Deploy Apex One policies using Trend Micro Apex Central
  • Troubleshoot common issues
  • Attempt the Trend Micro Certified Professional for Apex One Certification Exam

Ziel des Kurses

Nach Abschluss dieses Kurses sind die Teilnehmer in der Lage:

  • den Zweck, die Merkmale, Funktionen und Möglichkeiten von Trend Micro Apex One zu beschreiben
  • die Komponenten zu definieren, aus denen Trend Micro Apex One besteht
  • Schutz durch Sicherheitsagenten zu implementieren
  • Apex One Server und Agenten zu konfigurieren und verwalten
  • Apex One-Richtlinien mit Trend Micro Apex Central bereitstellen
  • Teilnahme an der Zertifizierungsprüfung Trend Micro Certified Professional for Apex One

Training Outline

Überblick über den Kurs

Apex One Overview

Trend Micro solutions

Key features of Apex One

Apex One components

Deployment methods

Threat detection

Apex One Server

Apex One Server tasks

Apex One Server services and components

Configuration repositories

Installing/upgrading Apex One Server

Apex One plug-ins and utilities

Apex One Web Management Console

Logging into the console

Integrating with Active Directory

Creating new administrative accounts

Security Agents

Security Agent tasks

Security Agent services and components

Security Agent tree

Installing Agents

Migrating from other endpoint security software

Agent-to-Server/Server-to-Agent communication

Endpoint location

Moving Security Agents

Uninstalling Security Agents

Agent settings and grouping

Agent self-protection

Agent privileges

Managing Off-Premise Agents

Protection features

Installing the Apex One Edge Relay Server

Registering the Apex One Edge Relay Server

Edge Relay Server and external Agent communication

Edge Relay Server digital certificates

Keeping Apex One Updated

Active Update

Updating the Apex One Server

Updating Security Agents

Update Agents

Security compliance

Trend Micro Smart Protection     

Smart Protection services and sources

Configuring the Smart Protection source

Protecting Endpoint Computers from Malware

Scanning for malware

Scan settings

Quarantining malware

Smart Scan

Spyware/gray ware protection

Preventing outbreaks

Protecting Endpoint Computers Through Behavior Monitoring

Malware behavior blocking

Ransomware protection

Anti-exploit protection

Fileless malware protection

Newly encountered program detection

Event monitoring

Protecting Endpoint Computers from Unknown Threats

Common Vulnerabilities and Exposures exploits

Predictive machine learning

Offline predictive machine learning

Detecting Emerging Malware Through Trend Micro Connected Threat Defense

Connected Threat Defense requirements

Deep Discovery Analyzer

SuspiciousObjects

Blocking Web Threats

Web reputation

Detecting suspicious connections

Protecting against browser exploits

Protecting Endpoint Computers Through Traffic Filtering

Firewall filtering

Application filtering

Certified Safe Software list

Stateful inspection

Intrusion Detection System

Firewall policies and profiles

Preventing Data Leaks on Endpoint Computers

Data Loss protection

Installing Data Loss protection

Configuring data identifiers, dataloss prevention templates and policies

Device control

Deploying Policies Through Apex Central

Apex Central

Apex Central management modes

Managing Apex One policies in Apex Central

Data Discovery policies

Blocking Unapproved Applications on Endpoint Computers

Integrated Application Control

Application Control criteria

Implementing Application Control

User-based Application Control

LockdownMode

Best practices

Protecting Endpoint Computers from Vulnerabilities

Integrated Vulnerability Protection

Vulnerability Protection Pattern

Implementing Vulnerability Protection

Network Engine settings

Detecting and Investigating Security Incidents on Endpoint Computers

Integrated Endpoint Sensor

Endpoint Detection and Response

Apex One Incident Response Model

Managed Detection and Response

Troubleshooting Apex One

Debugging the Apex One Server and Agents

Troubleshooting communication issues

Troubleshooting virus infection

Troubleshooting Apex One services

Troubleshooting sample submission