Registration
Upcoming Sessions and Registration:
Trend Micro Partners – by request only
Trend Micro Customers – by request only
1-day Update Course Trend Micro Partners
1-day Update Course Trend Micro Customers
Please purchase training seats prior to registration.
Anmeldung
Bevorstehende Schulungen und Anmeldung:
Trend Micro Partners – by request only
Trend Micro Customers – by request only
1-day Update Course Trend Micro Partners
1-day Update Course Trend Micro Customers
Schulungsplätze bitte vor der Anmeldung erwerben.
Target Audience
This course is designed for IT professionals responsible for protecting endpoint computers from data breaches and targeted attacks.
This includes those involved with:
- Operations
- Deployment
- Security Response
- Compliance
Zielgruppe
Dieser Kurs richtet sich an IT-Experten, die für den Schutz von Endgeräten vor Datenverletzungen und gezielte Angriffe zuständig sind.
Dazu gehören Personen aus den Unternehmensbereichen
- Betrieb
- Bereitstellung
- Sicherheitsreaktion
- Einhaltung der Vorschriften
CERTIFICATIONS AND RELATED EXAMINATIONS:
Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a
Trend Micro Certified Professional for Apex One.
ZERTIFIZIERUNGEN UND ZUGEHÖRIGE PRÜFUNGEN:
Nach Abschluss dieses Kurses können die Teilnehmer die Zertifizierungsprüfung ablegen, um um den Titel Trend Micro Certified Professional für Apex One zu erhalten.
Course Description
In this course, you will learn how to use Trend Micro Apex One™. The course details basic architecture, protection functionality, deployment scenarios and troubleshooting.
Through hands-on labs, participants practice configuring Trend Micro Apex One™ protection features, along with the administration options needed for a successful deployment.
Taught by Trend Micro certified trainers, this course incorporates a variety of practical lab exercises, allowing participants to put the lesson content into action.
Kursbeschreibung
In diesem Kurs lernen Sie die Verwendung von Trend Micro Apex One™ und erfahren mehr über die grundlegende Architektur, Schutzfunktionen, Deployment Optionen und Troubleshooting.
Anhand praktischer Übungen üben die Teilnehmer die Konfiguration der Trend Micro Apex One™ Schutzfunktionen Schutzfunktionen sowie die für eine erfolgreiche Bereitstellung erforderlichen Verwaltungsoptionen.
Der Kurs wird von Trend Micro zertifizierten Trainern gehalten und beinhaltet eine Vielzahl praktischer Übungen, die es den Teilnehmern ermöglichen, die Lerninhalte in die Praxis umzusetzen.
Prerequisites
There are no prerequisites to attend this course, however, a working knowledge of Trend Micro platforms and solutions, as well as an understanding of basic networking concepts and principles, will be helpful.
Basic knowledge of the following topics is also beneficial:
- Windows servers and clients
- Microsoft® Internet Information Server (IIS)
-
General understanding of malware
Participants are required to bring a laptop with a recommended screen resolution of at least 1980 x 1080 or above and a display size of 15” or above.
A second screen is advantageous for labs i.e. lab guide on one screen and virtual environment on the other.
Voraussetzungen
Für die Teilnahme an diesem Kurs sind keine Voraussetzungen erforderlich, jedoch sind Kenntnisse über Trend Micro-Plattformen und -Lösungen sowie ein Verständnis der grundlegenden Netzwerkkonzepte und Prinzipien hilfreich.
Grundlegende Kenntnisse zu den folgenden Themen sind ebenfalls von Vorteil:
- Windows Server and Clients
- Microsoft® Internet Information Server (IIS)
-
Grundkenntnisse von Malware
Die Teilnehmer benötigen einen eigenen Laptop mit einer empfohlenen Bildschirmauflösung von mindestens 1980 x 1080 oder höher und einer Bildschirmgröße von 15″ oder höher.
Ein zweiter Bildschirm ist für die Übungen von Vorteil, d.h. Laboranleitung auf einem Bildschirm und virtuelle Umgebung auf dem anderen.
Course Objectives
After completing this course, participants will be able to:
- Describe the purpose, features, functions, and capabilities of Apex One
- Define the components that make up Apex One
- Implement security using Security Agents
- Configure and administer Apex One Servers and Agents
- Deploy Apex One policies using Trend Micro Apex Central
- Troubleshoot common issues
- Attempt the Trend Micro Certified Professional for Apex One Certification Exam
Ziel des Kurses
Nach Abschluss dieses Kurses sind die Teilnehmer in der Lage:
- den Zweck, die Merkmale, Funktionen und Möglichkeiten von Trend Micro Apex One zu beschreiben
- die Komponenten zu definieren, aus denen Trend Micro Apex One besteht
- Schutz durch Sicherheitsagenten zu implementieren
- Apex One Server und Agenten zu konfigurieren und verwalten
- Apex One-Richtlinien mit Trend Micro Apex Central bereitstellen
- Teilnahme an der Zertifizierungsprüfung Trend Micro Certified Professional for Apex One
Training Outline
Überblick über den Kurs
Apex One Overview
Trend Micro solutions
Key features of Apex One
Apex One components
Deployment methods
Threat detection
Apex One Server
Apex One Server tasks
Apex One Server services and components
Configuration repositories
Installing/upgrading Apex One Server
Apex One plug-ins and utilities
Apex One Web Management Console
Logging into the console
Integrating with Active Directory
Creating new administrative accounts
Security Agents
Security Agent tasks
Security Agent services and components
Security Agent tree
Installing Agents
Migrating from other endpoint security software
Agent-to-Server/Server-to-Agent communication
Endpoint location
Moving Security Agents
Uninstalling Security Agents
Agent settings and grouping
Agent self-protection
Agent privileges
Managing Off-Premise Agents
Protection features
Installing the Apex One Edge Relay Server
Registering the Apex One Edge Relay Server
Edge Relay Server and external Agent communication
Edge Relay Server digital certificates
Keeping Apex One Updated
Active Update
Updating the Apex One Server
Updating Security Agents
Update Agents
Security compliance
Trend Micro Smart Protection
Smart Protection services and sources
Configuring the Smart Protection source
Protecting Endpoint Computers from Malware
Scanning for malware
Scan settings
Quarantining malware
Smart Scan
Spyware/gray ware protection
Preventing outbreaks
Protecting Endpoint Computers Through Behavior Monitoring
Malware behavior blocking
Ransomware protection
Anti-exploit protection
Fileless malware protection
Newly encountered program detection
Event monitoring
Protecting Endpoint Computers from Unknown Threats
Common Vulnerabilities and Exposures exploits
Predictive machine learning
Offline predictive machine learning
Detecting Emerging Malware Through Trend Micro Connected Threat Defense
Connected Threat Defense requirements
Deep Discovery Analyzer
SuspiciousObjects
Blocking Web Threats
Web reputation
Detecting suspicious connections
Protecting against browser exploits
Protecting Endpoint Computers Through Traffic Filtering
Firewall filtering
Application filtering
Certified Safe Software list
Stateful inspection
Intrusion Detection System
Firewall policies and profiles
Preventing Data Leaks on Endpoint Computers
Data Loss protection
Installing Data Loss protection
Configuring data identifiers, dataloss prevention templates and policies
Device control
Deploying Policies Through Apex Central
Apex Central
Apex Central management modes
Managing Apex One policies in Apex Central
Data Discovery policies
Blocking Unapproved Applications on Endpoint Computers
Integrated Application Control
Application Control criteria
Implementing Application Control
User-based Application Control
LockdownMode
Best practices
Protecting Endpoint Computers from Vulnerabilities
Integrated Vulnerability Protection
Vulnerability Protection Pattern
Implementing Vulnerability Protection
Network Engine settings
Detecting and Investigating Security Incidents on Endpoint Computers
Integrated Endpoint Sensor
Endpoint Detection and Response
Apex One Incident Response Model
Managed Detection and Response
Troubleshooting Apex One
Debugging the Apex One Server and Agents
Troubleshooting communication issues
Troubleshooting virus infection
Troubleshooting Apex One services
Troubleshooting sample submission