Trend Micro Apex One for Certified Professionals (AOCP) – Outline

Detailed Course Outline

Apex One Overview
  • Trend Micro solutions
  • Key features of Apex One
  • Apex One components
  • Deployment methods
  • Threat detection
Apex One Server
  • Apex One Server tasks
  • Apex One Server services and components
  • Configuration repositories
  • Installing/upgrading Apex One Server
  • Apex One plug-ins and utilities
Apex One Web Management Console
  • Logging into the console
  • Integrating with Active Directory
  • Creating new administrative accounts
Security Agents
  • Security Agent tasks
  • Security Agent services and components
  • Security Agent tree
  • Installing Agents
  • Migrating from other endpoint security software
  • Agent-to-Server/Server-to-Agent communication
  • Endpoint location
  • Moving Security Agents
  • Uninstalling Security Agents
  • Agent settings and grouping
  • Agent self-protection
  • Agent privileges
Managing Off-Premise Agents
  • Protection features
  • Installing the Apex One Edge Relay Server
  • Registering the Apex One Edge Relay Server
  • Edge Relay Server and external Agent communication
  • Edge Relay Server digital certificates
Keeping Apex One Updated
  • ActiveUpdate
  • Updating the Apex One Server
  • Updating Security Agents
  • Update Agents
  • Security compliance
Trend Micro Smart Protection
  • Smart Protection services and sources
  • Configuring the Smart Protection source
Protecting Endpoint Computers from Malware
  • Scanning for malware
  • Scan settings
  • Quarantining malware
  • Smart Scan
  • Spyware/grayware protection
  • Preventing outbreaks
Protecting Endpoint Computers Through Behavior Monitoring
  • Malware behavior blocking
  • Ransomware protection
  • Anti-exploit protection
  • Fileless malware protection
  • Newly encountered program detection
  • Event monitoring
  • Behavior monitoring exceptions
Protecting Endpoint Computers from Unknown Threats
  • Common Vulnerabilities and Exposures exploits
  • Predictive machine learning
  • Offline predictive machine learning
Detecting Emerging Malware Through Trend Micro™ Connected Threat Defense
  • Connected Threat Defense requirements
  • Deep Discovery Analyzer
  • Suspicious Objects
Blocking Web Threats
  • Web reputation
  • Detecting suspicious connections
  • Protecting against browser exploits
Protecting Endpoint Computers Through Traffic Filtering
  • Firewall filtering
  • Application filtering
  • Certified Safe Software list
  • Stateful inspection
  • Intrusion Detection System
  • Firewall policies and profiles
Preventing Data Leaks on Endpoint Computers
  • Data Loss protection
  • Installing Data Loss protection
  • Configuring data identifiers, data loss prevention templates and policies
  • Device control
Deploying Policies Through Apex Central
  • Apex Central
  • Apex Central management modes
  • Managing Apex One policies in Apex Central
  • Data Discovery policies
Blocking Unapproved Applications on Endpoint Computers
  • Integrated Application Control
  • Application Control criteria
  • Implementing Application Control
  • User-based Application Control
  • Lockdown Mode
  • Best practices
Protecting Endpoint Computers from Vulnerabilities
  • Integrated Vulnerability Protection
  • Vulnerability Protection Pattern
  • Implementing Vulnerability Protection
  • Network Engine settings
Detecting and Investigating Security Incidents on Endpoint Computers
  • Integrated Endpoint Sensor
  • Endpoint Detection and Response
  • Apex One Incident Response Model
  • Managed Detection and Response
Troubleshooting Apex One
  • Debugging the Apex One Server and Agents
  • Troubleshooting communication issues
  • Troubleshooting virus infection
  • Troubleshooting Apex One services
  • Troubleshooting sample submission