Trend Micro™ Deep Security 9.0
Overview
In this course, you will learn how to use Trend Micro™ Deep Security 9.0. This course provides information about the basic architecture, deployment scenarios, installation, configuration, and administration options, and troubleshooting details that a network administrator needs to know for successful implementation and long-term maintenance.
Certification Level:Trend Micro Certified Security Master (TCSM).The exam is taken on the last day of the course.
Who should attend
This course is designed for VAD, partners, resellers and IT professionals responsible for protecting networks from any kind of networked, endpoint, cloud or xSP security threats. The individuals who will typically…
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Overview
In this course, you will learn how to use Trend Micro™ Deep
Security 9.0. This course provides information about the basic
architecture, deployment scenarios, installation, configuration,
and administration options, and troubleshooting details that a
network administrator needs to know for successful implementation
and long-term maintenance.
Certification Level:Trend Micro Certified Security Master
(TCSM).The exam is taken on the last day of the course.
Who should attend
This course is designed for VAD, partners, resellers and IT professionals responsible for protecting networks from any kind of networked, endpoint, cloud or xSP security threats. The individuals who will typically benefit the most include:
• System administrators & network engineers
• Sales engineers / pre-sales engineers
•Technical account managers (TAMs)
• Support engineers•Integration engineers
• Solution & security architects
Prerequisites
Before you take this course, Trend Micro recommends that you have a working knowledge of their products and services as well as of basic networking concepts and principles. You should also have a basic working knowledge of the following products: •Windows 2003 / 2008 / 2012 / XP/ 7/ 8 servers and clients.•Firewalls, WAFs, Packet Inspection devices.•Microsoft Internet Information Server (IIS), Apache.•VMware ESXi / vCenter / vShield.•Amazon AWS / VMware vCloud.•Virtualisation techniques & technologies. Course content
Topics Covered
•Installation, Deployment & Configuration of the different modules: Firewall, Packet Inspection, Web Reputation, Anti-Malware, Integrity Monitoring & Log Inspection.
•Administration of the different functions of the product.
•Positioning of the product.
•Threats Landscape.
•Integration with VMware technologies.
•Agent-based and Agent-less scenarios with testing.
•Deployment of a PoC in a step-by-step process.
•Performance and sizing of the product
•Deployment Scenarios: virtualized, cloud and multi-tenancy environments.
•Amazon AWS, VMware vCloud and xSP scenarios.
Courselocation:
Arrow ECS Houten - www.edu.arrowecs.eu/nl
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
