Trend Micro Apex One for Certified Professionals (AOCP) – Contenuti

Contenuti dettagliati del Corso

The course topics in this training are divided into the following lessons:

Apex One Overview

  • Trend Micro solutions
  • Key features of Apex One
  • Apex One components
  • Deployment methods
  • Threat detection

Apex One Server

  • Apex One Server tasks
  • Apex One Server services and components
  • Configuration repositories
  • Installing/upgrading Apex One Server
  • Apex One plug-ins and utilities

Apex One Web Management Console

  • Logging into the console
  • Integrating with Active Directory
  • Creating new administrative accounts

Security Agents

  • Security Agent tasks
  • Security Agent services and components
  • Security Agent tree
  • Installing Agents
  • Migrating from other endpoint security software
  • Agent-to-Server/Server-to-Agent communication
  • Endpoint location
  • Moving Security Agents
  • Uninstalling Security Agents
  • Agent settings and grouping
  • Agent self-protection
  • Agent privileges

Managing Off-Premise Agents

  • Protection features
  • Installing the Apex One Edge Relay Server
  • Registering the Apex One Edge Relay Server
  • Edge Relay Server and external Agent communication
  • Edge Relay Server digital certificates

Keeping Apex One Updated

  • ActiveUpdate
  • Updating the Apex One Server
  • Updating Security Agents
  • Update Agents
  • Security compliance

Trend Micro Smart Protection

  • Smart Protection services and sources
  • Configuring the Smart Protection source

Protecting Endpoint Computers from Malware

  • Scanning for malware
  • Scan settings
  • Quarantining malware
  • Smart Scan
  • Spyware/grayware protection
  • Preventing outbreaks

Protecting Endpoint Computers Through Behavior Monitoring

  • Malware behavior blocking
  • Ransomware protection
  • Anti-exploit protection
  • Fileless malware protection
  • Newly encountered program detection
  • Event monitoring
  • Behavior monitoring exceptions

Protecting Endpoint Computers from Unknown Threats

  • Common Vulnerabilities and Exposures exploits
  • Predictive machine learning
  • Offline predictive machine learning

Detecting Emerging Malware Through Trend Micro™ Connected Threat Defense

  • Connected Threat Defense requirements
  • Deep Discovery Analyzer
  • Suspicious Objects

Blocking Web Threats

  • Web reputation
  • Detecting suspicious connections
  • Protecting against browser exploits

Protecting Endpoint Computers Through Traffic Filtering

  • Firewall filtering
  • Application filtering
  • Certified Safe Software list
  • Stateful inspection
  • Intrusion Detection System
  • Firewall policies and profiles

Preventing Data Leaks on Endpoint Computers

  • Data Loss protection
  • Installing Data Loss protection
  • Configuring data identifiers, data loss prevention templates and policies
  • Device control

Deploying Policies Through Apex Central

  • Apex Central
  • Apex Central management modes
  • Managing Apex One policies in Apex Central
  • Data Discovery policies

Blocking Unapproved Applications on Endpoint Computers

  • Integrated Application Control
  • Application Control criteria
  • Implementing Application Control
  • User-based Application Control
  • Lockdown Mode
  • Best practices

Protecting Endpoint Computers from Vulnerabilities

  • Integrated Vulnerability Protection
  • Vulnerability Protection Pattern
  • Implementing Vulnerability Protection
  • Network Engine settings

Detecting and Investigating Security Incidents on Endpoint Computers

  • Integrated Endpoint Sensor
  • Endpoint Detection and Response
  • Apex One Incident Response Model
  • Managed Detection and Response

Troubleshooting Apex One

  • Debugging the Apex One Server and Agents
  • Troubleshooting communication issues
  • Troubleshooting virus infection
  • Troubleshooting Apex One services
  • Troubleshooting sample submission