Skip to main Content

Deep Security Training for Certified Professionals

  • Course Code TMDS
  • Duration 3 days

Public Classroom Price

$1,804.00

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Company Event

    Event at company

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview

Top

Trend Micro Deep Security Software 20 Training for Certified Professionals is a three-day, instructor-led training course. Participants will learn how to use Deep Security Software for advanced hybrid cloud security on physical, virtual, and cloud-based servers. This course details the basic architecture of the on-premises Deep Security Software solution, deployment options, protection modules, policy configuration, and administration of the system. As part of the course, participants will deploy Deep Security Software agents on a variety of Windows Server platforms. Best practices and troubleshooting details for successful implementation and long-term maintenance of the system are discussed. Participants will also be introduced to the XDR and threat intelligence capabilities of Trend Vision One™.

This course is taught by Trend Micro certified trainers and incorporates a variety of hands-on lab exercises, allowing participants to put the lesson content into action.

Course Schedule

Top
    • Delivery Format: Virtual Learning
    • Date: 11-13 January, 2026 | 9:00 AM to 5:00 PM
    • Location: Virtual (Arab Stand)
    • Language: English

    $1,804.00

    • Delivery Format: Public Classroom
    • Date: 11-13 January, 2026 | 9:00 AM to 5:00 PM
    • Location: Riyadh (Arab Stand)
    • Language: English
    • Delivery Format: Virtual Learning
    • Date: 02-04 February, 2026 | 8:00 AM to 4:00 PM
    • Location: Virtual (Arab Stand)
    • Language: English

    $1,804.00

    • Delivery Format: Public Classroom
    • Date: 31 March-02 April, 2026 | 9:00 AM to 5:00 PM
    • Location: Cairo-Sheraton (Egypt Stan)
    • Language: English
    • Delivery Format: Virtual Learning
    • Date: 31 March-02 April, 2026 | 10:00 AM to 6:00 PM
    • Location: Virtual (Arab Stand)
    • Language: English

    $1,804.00

Target Audience

Top

Designed for IT professionals who are responsible for protecting users, networks, data centers, and cloud resources from data breaches and targeted attacks.

This includes those responsible for:

Operations
Deployment
Security response
Compliance
Support

Course Objectives

Top

After completing this training course, participants will be able to:

  • Describe the purpose, features, functions, and capabilities of Deep Security Software 20
  • Define and install components that make up Deep Security Software
  • Implement security by enabling protection modules
  • Integrate Deep Security Software with Trend Vision One
  • Attempt the Trend Micro Certified Professional for Trend Micro Deep Security Software Certification exam

Course Content

Top

Product Overview

  • Introduction to Deep Security Software
  • Deep Security Software protection modules
  • Deep Security Software deployment options
  • Deep Security Software components

Trend Micro™ Deep Security™ Manager

  • Server, operating system, and database requirements
  • Deep Security Manager architecture
  • Installing and upgrading Deep Security Manager

Deploying Deep Security Agents

  • Deep Security agent architecture
  • Deploying Deep Security agents

Managing Deep Security Agents

  • Command line operations
  • Resetting agents
  • Protecting agents
  • Viewing computer protection status
  • Upgrading Deep Security agents
  • Organizing computers using groups and Smart Folders 
  • Protecting container hosts

Keeping Deep Security Software Up to Date

  • Security updates
  • Software updates
  • Deep Security Software relays

Global Threat Intelligence

  • Global threat intelligence services used by Deep Security Software
  • Configuring the global threat intelligence source

Policies

  • Policy inheritance and overrides
  • Creating new policies
  • Running recommendation scans

Protecting Servers from Malware

  • Anti-malware scanning techniques
  • Enabling anti-malware protection
  • Trend Micro™ Smart Scan™

Blocking Malicious Websites

  • Enabling web reputation
  • Setting the security level

Filtering Traffic Using the Firewall

  • Enabling the Deep Security Software firewall
  • Firewall rules
  • Traffic analysis
  • Traffic order of analysis
  • Port scan

Protecting Servers from Vulnerabilities

  • Virtual patching
  • Detecting suspicious network activity
  • Protocol control
  • Web application protection
  • Enabling intrusion prevention
  • Intrusion prevention rules
  • Security Sockets Layer (SSL) filtering
  • Protecting web applications

Detecting Changes to Protected Servers

  • Enabling integrity monitoring
  • Running recommendation scans
  • Detection changes to baseline objects

Blocking Unapproved Software

  • Enforcement modes
  • Enabling application control
  • Detecting software changes
  • Creating an inventory of approved software
  • Pre-approving software changes

Inspecting Logs on Protected Servers

  • Enabling log inspection
  • Running recommendation scans

Controlling Access to External Storage Devices

  • Enforcement settings
  • Enabling device control

Events and Alerts

  • Event forwarding
  • Alerts
  • Event tagging
  • Reporting

Automating Deep Security Software Operations

  • Scheduled tasks
  • Event-based tasks
  • Quick start templates
  • Baking the Deep Security Software agent into an Amazon Machine Image (AMI)
  • Application programming interface

Integrating with Trend Vision One

  • Trend Vision One capabilities
  • Collecting telemetry
  • Connecting Deep Security Software to Trend Vision One
  • Endpoint inventory
  • Trend Endpoint Basecamp

Introduction to XDR Threat Investigation

  • Detection models
  • Observed attack techniques
  • Navigating within workbenches
  • Searching within the data lake

Detecting Emerging Malware Through Threat Intelligence

  • Threat Intelligence phases
  • Threat Intelligence requirements 
  • Configuring Deep Security Software for Threat Intelligence
  • Tracking submissions

Appendix Topics

  • Activating and managing multiple tenants
  • Troubleshooting common Deep Security Software issues

Course Prerequisites

Top

There are no prerequisites to attend this course, however, a working knowledge of Trend solutions and services, as well as an understanding of basic networking concepts and principles, will be helpful.

Basic knowledge of the following topics is also beneficial:

  • Windows servers and clients
  • Firewalls and packet inspection devices
  • VMware ESXi/vCenter
  • Amazon Web Services (AWS)/Microsoft Azure/VMware vCloud/Google Cloud Platform™ (GCP)
  • Virtualization technologies

Participants are required to bring a laptop computer with a recommended screen resolution of at least 1980 x 1080 or above and a display size of 15” or above.

Test Certification

Top
  • Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a Trend Micro Certified Professional for Trend Micro™ Deep Security™ Software.