Trend Micro Apex One Training for Certified Professionals
- Course Code TMAO
- Duration 3 days
Course Delivery
Jump to:
Course Delivery
This course is available in the following formats:
-
Public Classroom
Traditional Classroom Learning
-
Virtual Learning
Learning that is virtual
Request this course in a different delivery format.
Course Overview
TopIn this course, you will learn how to use the on-premises edition of Trend Micro Apex One—detailing basic architecture, security agent management, protection functionality, and policy deployment.
Through hands-on labs, participants practice configuring Trend Micro Apex One protection features along with the administration options needed for a successful deployment.
Taught by Trend Micro certified trainers, this course incorporates a variety of practical lab exercises, allowing participants to put the lesson content into action.
Course Schedule
Top-
- Delivery Format: Public Classroom
- Date: 04-06 January, 2026 | 9:00 AM to 5:00 PM
- Location: Cairo-Sheraton (Egypt Stan)
- Language: English
-
- Delivery Format: Virtual Learning
- Date: 04-06 January, 2026 | 9:00 AM to 5:00 PM
- Location: Virtual (Egypt Stan)
- Language: English
-
- Delivery Format: Virtual Learning
- Date: 09-11 February, 2026 | 7:00 AM to 3:00 PM
- Location: Virtual (Egypt Stan)
- Language: English
-
- Delivery Format: Public Classroom
- Date: 09-11 February, 2026 | 9:00 AM to 5:00 PM
- Location: Dubai-Knowledge Village (Arabian St)
- Language: English
-
- Delivery Format: Virtual Learning
- Date: 08-10 March, 2026 | 8:00 AM to 4:00 PM
- Location: Virtual (Egypt Stan)
- Language: English
-
- Delivery Format: Virtual Learning
- Date: 20-22 April, 2026 | 8:00 AM to 4:00 PM
- Location: Virtual (Egypt Stan)
- Language: English
Target Audience
TopThis course is designed for IT professionals responsible for protecting endpoint computers from data breaches and targeted attacks.
This includes those involved with:
- Operations
- Deployment
- Security response
- Compliance
Course Objectives
TopAfter completing this course, participants will be able to:
- Describe the purpose, features, functions and capabilities of the on-premises edition of Trend Micro Apex One
- Define the components that make up Trend Micro Apex One
- Implement protection using security agents
- Configure settings and administration options
- Integrate Trend Micro Apex One with Trend Vision One™
- Attempt the Trend Micro Certified Professional for Trend Micro Apex One certification exam
Course Content
TopThe course topics in this training are divided into the following lessons:
Trend Micro Apex One Overview
- Key features of Trend Micro Apex One
- Trend Micro Apex One components
- Deployment methods
- Threat detection
Trend Micro Apex One Server
- Trend Micro Apex One server tasks
- Trend Micro Apex One database
- Installing the Trend Micro Apex One server
- Upgrading existing installation
- Trend Micro Apex One plug-ins and utilities
Trend Micro Apex One Web Console
- Logging into the console
- Integrating with Microsoft Active Directory
- Creating new administrative roles and accounts
Managing Security Agents
- Security agent tasks
- Security agent services and components
- Security agent requirements
- Installing/uninstalling agents
- Migrating from other endpoint security software
- Agent-to-server communication
- Endpoint location
- Agent self-protection
- Security agent settings
- Grouping security agents
Managing Off-Premises Agents
- Trend Micro Apex One Edge Relay Server
Keeping Trend Micro Apex One Up to Date
- Pattern updates
- Updating managed products
- Updating security agents
- Security compliance
Trend Micro™ Global Threat Intelligence
- Global threat intelligence services
- Configuring global threat intelligence sources
Protecting Endpoint Computers from Malware
- Scanning for malware
- Scan settings
- Quarantining malware
- Trend Micro™ SmartScan™
- Spyware/Grayware protection
- Preventing outbreaks
Protecting Endpoint Computers Through Behavior Monitoring
- Malware behavior blocking
- Ransomware protection
- Anti-exploit protection
- Fileless malware protection
- Newly encountered program detection
- Event monitoring
- Behavior monitoring exceptions
Protecting Endpoint Computers from Unknown Threats
- Common vulnerabilities and exposures exploits (CVE)
- Predictive machine learning
- Offline predictive machine learning
Blocking Web Threats
- Web reputation
- Detecting suspicious connections
- Protecting against browser exploits
Protecting Endpoint Computers Through Traffic Filtering
- Firewall filtering
- Application filtering
- Certified Safe Software list
- Stateful inspection
- Intrusion detection system
- Firewall policies and profiles
Preventing Data Loss on Endpoint Computers
- Digital asset control
- Configuring data identifiers, data loss prevention (DLP) templates, and policies
- Data discovery
- Device control
Deploying Policies Through Trend Micro Apex Central™
- Trend Micro Apex Central services
- Connecting Trend Micro Apex One to Trend Micro Apex Central
- Managing policies
- Policy inheritance
- Data discovery policies
Blocking Unapproved Applications on Endpoint Computers
- Integrating application control
- Lockdown mode
- Application control criteria
- Implementing application control
- User-based application control
- Application control best practices
Protecting Endpoint Computers from Vulnerabilities
- Integrating vulnerability protection
- Vulnerability protection pattern
- Selecting a priority mode
- Network engine settings
Integrating with Trend Vision One
- Trend Vision One capabilities
- Collecting telemetry
- Connecting Trend Micro Apex Central to Trend Vision One
- Endpoint inventory
- Endpoint basecamp
Introduction to XDR Threat Investigation
- Detection models
- Observed attack techniques
- Workbenches
- Searches
Detecting Emerging Malware Through Threat Intelligence
- Threat intelligence phases
- Threat intelligence requirements
- Suspicious objects
- Enabling sample submission
- Viewing suspicious objects
Course Prerequisites
Top- There are no prerequisites to attend this course, however, a working knowledge of Trend solutions and services, as well as an understanding of basic networking concepts and principles, will be helpful.
- Basic knowledge of Microsoft Windows and Mac clients is also beneficial.
- Participants are required to bring a laptop computer with a recommended screen resolution of at least 1980 x 1080 or above, and a display size of 15” or above.
Test Certification
Top- Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a Trend Micro Certified Professional for Trend Micro Apex One.
Further Information
TopWHY CHOOSE TREND MICRO EDUCATION
- Hands-on instruction from Trend certified trainers
- With Trend solution certifications, you have the skills to deploy and manage our leading security solutions
- By sharpening your skills, you are in a position to better detect and respond to the latest attacks