Skip to main Content

Trend Micro Apex One Training for Certified Professionals

  • Course Code TMAO
  • Duration 3 days

Public Classroom Price

$1,804.00

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Company Event

    Event at company

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview

Top

In this course, you will learn how to use the on-premises edition of Trend Micro Apex One—detailing basic architecture, security agent management, protection functionality, and policy deployment.

Through hands-on labs, participants practice configuring Trend Micro Apex One protection features along with the administration options needed for a successful deployment.

Taught by Trend Micro certified trainers, this course incorporates a variety of practical lab exercises, allowing participants to put the lesson content into action.

Course Schedule

Top
    • Delivery Format: Public Classroom
    • Date: 04-06 January, 2026 | 9:00 AM to 5:00 PM
    • Location: Cairo-Sheraton (Egypt Stan)
    • Language: English
    • Delivery Format: Virtual Learning
    • Date: 04-06 January, 2026 | 10:00 AM to 6:00 PM
    • Location: Virtual (Arab Stand)
    • Language: English

    $1,804.00

    • Delivery Format: Virtual Learning
    • Date: 09-11 February, 2026 | 8:00 AM to 4:00 PM
    • Location: Virtual (Arab Stand)
    • Language: English

    $1,804.00

    • Delivery Format: Virtual Learning
    • Date: 20-22 April, 2026 | 9:00 AM to 5:00 PM
    • Location: Virtual (Arab Stand)
    • Language: English

    $1,804.00

    • Delivery Format: Public Classroom
    • Date: 20-22 April, 2026 | 9:00 AM to 5:00 PM
    • Location: Riyadh (Arab Stand)
    • Language: English

Target Audience

Top

This course is designed for IT professionals responsible for protecting endpoint computers from data breaches and targeted attacks.

This includes those involved with:

- Operations
- Deployment
- Security response
- Compliance

Course Objectives

Top

After completing this course, participants will be able to:

  • Describe the purpose, features, functions and capabilities of the on-premises edition of Trend Micro Apex One
  • Define the components that make up Trend Micro Apex One
  • Implement protection using security agents
  • Configure settings and administration options
  • Integrate Trend Micro Apex One with Trend Vision One™
  • Attempt the Trend Micro Certified Professional for Trend Micro Apex One certification exam

Course Content

Top

The course topics in this training are divided into the following lessons:

Trend Micro Apex One Overview

  • Key features of Trend Micro Apex One 
  • Trend Micro Apex One components 
  • Deployment methods 
  • Threat detection

Trend Micro Apex One Server

  • Trend Micro Apex One server tasks 
  • Trend Micro Apex One database
  • Installing the Trend Micro Apex One server
  • Upgrading existing installation
  • Trend Micro Apex One plug-ins and utilities

Trend Micro Apex One Web Console

  • Logging into the console
  • Integrating with Microsoft Active Directory 
  • Creating new administrative roles and accounts

Managing Security Agents

  • Security agent tasks 
  • Security agent services and components 
  •  Security agent requirements 
  • Installing/uninstalling agents 
  • Migrating from other endpoint security software 
  • Agent-to-server communication 
  • Endpoint location 
  • Agent self-protection 
  • Security agent settings 
  • Grouping security agents

Managing Off-Premises Agents

  • Trend Micro Apex One Edge Relay Server

Keeping Trend Micro Apex One Up to Date

  • Pattern updates 
  • Updating managed products 
  • Updating security agents 
  • Security compliance

Trend Micro™ Global Threat Intelligence

  • Global threat intelligence services 
  • Configuring global threat intelligence sources

Protecting Endpoint Computers from Malware

  • Scanning for malware 
  • Scan settings 
  • Quarantining malware 
  • Trend Micro™ SmartScan™ 
  • Spyware/Grayware protection 
  • Preventing outbreaks

Protecting Endpoint Computers Through Behavior Monitoring

  • Malware behavior blocking 
  • Ransomware protection 
  • Anti-exploit protection 
  • Fileless malware protection 
  • Newly encountered program detection 
  • Event monitoring 
  • Behavior monitoring exceptions

Protecting Endpoint Computers from Unknown Threats

  • Common vulnerabilities and exposures exploits (CVE)
  • Predictive machine learning 
  • Offline predictive machine learning

Blocking Web Threats

  • Web reputation 
  • Detecting suspicious connections 
  • Protecting against browser exploits

Protecting Endpoint Computers Through Traffic Filtering

  • Firewall filtering 
  • Application filtering 
  • Certified Safe Software list 
  • Stateful inspection 
  • Intrusion detection system 
  • Firewall policies and profiles

Preventing Data Loss on Endpoint Computers

  • Digital asset control 
  • Configuring data identifiers, data loss prevention (DLP) templates, and policies 
  • Data discovery 
  • Device control

Deploying Policies Through Trend Micro Apex Central™

  • Trend Micro Apex Central services
  • Connecting Trend Micro Apex One to Trend Micro Apex Central
  • Managing policies
  • Policy inheritance
  • Data discovery policies

Blocking Unapproved Applications on Endpoint Computers

  • Integrating application control 
  • Lockdown mode 
  • Application control criteria 
  • Implementing application control 
  • User-based application control 
  • Application control best practices

Protecting Endpoint Computers from Vulnerabilities

  • Integrating vulnerability protection 
  • Vulnerability protection pattern 
  • Selecting a priority mode 
  • Network engine settings

Integrating with Trend Vision One

  • Trend Vision One capabilities
  • Collecting telemetry
  • Connecting Trend Micro Apex Central to Trend Vision One
  • Endpoint inventory
  • Endpoint basecamp

Introduction to XDR Threat Investigation

  • Detection models
  • Observed attack techniques
  • Workbenches
  • Searches

Detecting Emerging Malware Through Threat Intelligence

  • Threat intelligence phases 
  • Threat intelligence requirements 
  • Suspicious objects 
  • Enabling sample submission 
  • Viewing suspicious objects

Course Prerequisites

Top
  • There are no prerequisites to attend this course, however, a working knowledge of Trend solutions and services, as well as an understanding of basic networking concepts and principles, will be helpful.
  • Basic knowledge of Microsoft Windows and Mac clients is also beneficial.
  • Participants are required to bring a laptop computer with a recommended screen resolution of at least 1980 x 1080 or above, and a display size of 15” or above.

Test Certification

Top
  • Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a Trend Micro Certified Professional for Trend Micro Apex One.

Further Information

Top

WHY CHOOSE TREND MICRO EDUCATION

- Hands-on instruction from Trend certified trainers
- With Trend solution certifications, you have the skills to deploy and manage our leading security solutions
- By sharpening your skills, you are in a position to better detect and respond to the latest attacks