Deep Security Training for Certified Professionals
- Course Code TMDS
- Duration 3 days
Course Delivery
Jump to:
Course Delivery
This course is available in the following formats:
-
Company Event
Event at company
-
Public Classroom
Traditional Classroom Learning
-
Virtual Learning
Learning that is virtual
Request this course in a different delivery format.
Course Overview
TopTrend Micro Deep Security Software 20 Training for Certified Professionals is a three-day, instructor-led training course. Participants will learn how to use Deep Security Software for advanced hybrid cloud security on physical, virtual, and cloud-based servers. This course details the basic architecture of the on-premises Deep Security Software solution, deployment options, protection modules, policy configuration, and administration of the system. As part of the course, participants will deploy Deep Security Software agents on a variety of Windows Server platforms. Best practices and troubleshooting details for successful implementation and long-term maintenance of the system are discussed. Participants will also be introduced to the XDR and threat intelligence capabilities of Trend Vision One™.
This course is taught by Trend Micro certified trainers and incorporates a variety of hands-on lab exercises, allowing participants to put the lesson content into action.
Course Schedule
Top-
- Delivery Format: Public Classroom
- Date: 11-13 January, 2026 | 9:00 AM to 5:00 PM
- Location: Riyadh (Arab Stand)
- Language: English
-
- Delivery Format: Public Classroom
- Date: 02-04 February, 2026 | 9:00 AM to 5:00 PM
- Location: Dubai-Knowledge Village (Arabian St)
- Language: English
-
- Delivery Format: Public Classroom
- Date: 31 March-02 April, 2026 | 9:00 AM to 5:00 PM
- Location: Cairo-Sheraton (Egypt Stan)
- Language: English
-
- Delivery Format: Public Classroom
- Date: 24-26 May, 2026 | 9:00 AM to 5:00 PM
- Location: Riyadh (Arab Stand)
- Language: English
-
- Delivery Format: Public Classroom
- Date: 01-03 June, 2026 | 9:00 AM to 5:00 PM
- Location: Dubai-Knowledge Village (Arabian St)
- Language: English
-
- Delivery Format: Public Classroom
- Date: 10-12 August, 2026 | 9:00 AM to 5:00 PM
- Location: Cairo-Sheraton (Egypt Stan)
- Language: English
Target Audience
TopDesigned for IT professionals who are responsible for protecting users, networks, data centers, and cloud resources from data breaches and targeted attacks.
This includes those responsible for:
Operations
Deployment
Security response
Compliance
Support
Course Objectives
TopAfter completing this training course, participants will be able to:
- Describe the purpose, features, functions, and capabilities of Deep Security Software 20
- Define and install components that make up Deep Security Software
- Implement security by enabling protection modules
- Integrate Deep Security Software with Trend Vision One
- Attempt the Trend Micro Certified Professional for Trend Micro Deep Security Software Certification exam
Course Content
TopProduct Overview
- Introduction to Deep Security Software
- Deep Security Software protection modules
- Deep Security Software deployment options
- Deep Security Software components
Trend Micro™ Deep Security™ Manager
- Server, operating system, and database requirements
- Deep Security Manager architecture
- Installing and upgrading Deep Security Manager
Deploying Deep Security Agents
- Deep Security agent architecture
- Deploying Deep Security agents
Managing Deep Security Agents
- Command line operations
- Resetting agents
- Protecting agents
- Viewing computer protection status
- Upgrading Deep Security agents
- Organizing computers using groups and Smart Folders
- Protecting container hosts
Keeping Deep Security Software Up to Date
- Security updates
- Software updates
- Deep Security Software relays
Global Threat Intelligence
- Global threat intelligence services used by Deep Security Software
- Configuring the global threat intelligence source
Policies
- Policy inheritance and overrides
- Creating new policies
- Running recommendation scans
Protecting Servers from Malware
- Anti-malware scanning techniques
- Enabling anti-malware protection
- Trend Micro™ Smart Scan™
Blocking Malicious Websites
- Enabling web reputation
- Setting the security level
Filtering Traffic Using the Firewall
- Enabling the Deep Security Software firewall
- Firewall rules
- Traffic analysis
- Traffic order of analysis
- Port scan
Protecting Servers from Vulnerabilities
- Virtual patching
- Detecting suspicious network activity
- Protocol control
- Web application protection
- Enabling intrusion prevention
- Intrusion prevention rules
- Security Sockets Layer (SSL) filtering
- Protecting web applications
Detecting Changes to Protected Servers
- Enabling integrity monitoring
- Running recommendation scans
- Detection changes to baseline objects
Blocking Unapproved Software
- Enforcement modes
- Enabling application control
- Detecting software changes
- Creating an inventory of approved software
- Pre-approving software changes
Inspecting Logs on Protected Servers
- Enabling log inspection
- Running recommendation scans
Controlling Access to External Storage Devices
- Enforcement settings
- Enabling device control
Events and Alerts
- Event forwarding
- Alerts
- Event tagging
- Reporting
Automating Deep Security Software Operations
- Scheduled tasks
- Event-based tasks
- Quick start templates
- Baking the Deep Security Software agent into an Amazon Machine Image (AMI)
- Application programming interface
Integrating with Trend Vision One
- Trend Vision One capabilities
- Collecting telemetry
- Connecting Deep Security Software to Trend Vision One
- Endpoint inventory
- Trend Endpoint Basecamp
Introduction to XDR Threat Investigation
- Detection models
- Observed attack techniques
- Navigating within workbenches
- Searching within the data lake
Detecting Emerging Malware Through Threat Intelligence
- Threat Intelligence phases
- Threat Intelligence requirements
- Configuring Deep Security Software for Threat Intelligence
- Tracking submissions
Appendix Topics
- Activating and managing multiple tenants
- Troubleshooting common Deep Security Software issues
Course Prerequisites
TopThere are no prerequisites to attend this course, however, a working knowledge of Trend solutions and services, as well as an understanding of basic networking concepts and principles, will be helpful.
Basic knowledge of the following topics is also beneficial:
- Windows servers and clients
- Firewalls and packet inspection devices
- VMware ESXi/vCenter
- Amazon Web Services (AWS)/Microsoft Azure/VMware vCloud/Google Cloud Platform™ (GCP)
- Virtualization technologies
Participants are required to bring a laptop computer with a recommended screen resolution of at least 1980 x 1080 or above and a display size of 15” or above.
Test Certification
Top- Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a Trend Micro Certified Professional for Trend Micro™ Deep Security™ Software.