Trend Micro ATC Logo

Trend Micro Advanced Threat Defense Training

Trend Micro ATC Logo

After the 5-day classroom based Advanced Threat Defense training you should have essential knowledge to understand, analyze and build the story of a cyber-attack as well as recommend solutions.

Course Contents

  • Advanced Threat Defense I – Network Security Essentials
  • Advanced Threat Defense II – Cybercrime Operations and Attack Methodologies
  • Advanced Threat Defense III – Trend Micro Advanced Threat Response

E-Book Symbol In this course, you will receive the Trend Micro course documentation which is also available as a Trend Micro e-Kit.

Target Group

This course is designed for IT professionals who are responsible for protecting networks from any kind of networked, endpoint, or cloud security threats.
The individuals who will typically benefit the most include:
• System administrators
• Network engineers
• Support Engineers
• Integration Engineers
• Solution and Security Architects

Knowledge Prerequisites

Before you take this course, Trend Micro recommends attendees to have an understanding of:
• Network and security fundamentals
• CompTIA Security+ or equivalent experience
• Targeted attacks lifecycle and techniques
• Cybercrime Operations and Attack Methodologies
• Basic administration of Deep Discovery, Deep Security and Endpoint Sensor

Course Topics
 
Advanced Threat Defense I – Network Security Essentials
• Introduction into Advanced Threats
• Networking Essentials
- Wireshark packet analysis
- Reconnaissance, incl. Host Discovery, Banner Grabbing, Port Scanning
• Network Security Threats
- Web, incl. Directory Traversal, SQL Injection, CSRF & XSS
- Man-in-the-Middle attacks, incl. Session Hijacking
• Overview of Security Solutions
• Introduction into Incident Response and Risk Management
• ARP Poisoning Analysis
 
Advanced Threat Defense II – Cybercrime Operations and Attack Methodologies
• Cybercrime Operations, its Ecosystem and Business Model
• Introduction to 6 Stages of APT
• APT Attack Methodologies, Remote Access Tools, Credentials Harvesting, Man-in-the-Middle attacks, File-less attacks etc.
• Case Studies
• Hacking Challenge
 
Advanced Threat Defense III – Trend Micro Advanced Threat Response
• Handling an Incident
• Incident Investigation by Trend Micro Solutions and 3rd party tools
• Leveraging Threat Intelligence in Incident Response
• Incident Response Challenge

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

After the 5-day classroom based Advanced Threat Defense training you should have essential knowledge to understand, analyze and build the story of a cyber-attack as well as recommend solutions.

Course Contents

  • Advanced Threat Defense I – Network Security Essentials
  • Advanced Threat Defense II – Cybercrime Operations and Attack Methodologies
  • Advanced Threat Defense III – Trend Micro Advanced Threat Response

E-Book Symbol In this course, you will receive the Trend Micro course documentation which is also available as a Trend Micro e-Kit.

Target Group

This course is designed for IT professionals who are responsible for protecting networks from any kind of networked, endpoint, or cloud security threats.
The individuals who will typically benefit the most include:
• System administrators
• Network engineers
• Support Engineers
• Integration Engineers
• Solution and Security Architects

Knowledge Prerequisites

Before you take this course, Trend Micro recommends attendees to have an understanding of:
• Network and security fundamentals
• CompTIA Security+ or equivalent experience
• Targeted attacks lifecycle and techniques
• Cybercrime Operations and Attack Methodologies
• Basic administration of Deep Discovery, Deep Security and Endpoint Sensor

Course Topics
 
Advanced Threat Defense I – Network Security Essentials
• Introduction into Advanced Threats
• Networking Essentials
- Wireshark packet analysis
- Reconnaissance, incl. Host Discovery, Banner Grabbing, Port Scanning
• Network Security Threats
- Web, incl. Directory Traversal, SQL Injection, CSRF & XSS
- Man-in-the-Middle attacks, incl. Session Hijacking
• Overview of Security Solutions
• Introduction into Incident Response and Risk Management
• ARP Poisoning Analysis
 
Advanced Threat Defense II – Cybercrime Operations and Attack Methodologies
• Cybercrime Operations, its Ecosystem and Business Model
• Introduction to 6 Stages of APT
• APT Attack Methodologies, Remote Access Tools, Credentials Harvesting, Man-in-the-Middle attacks, File-less attacks etc.
• Case Studies
• Hacking Challenge
 
Advanced Threat Defense III – Trend Micro Advanced Threat Response
• Handling an Incident
• Incident Investigation by Trend Micro Solutions and 3rd party tools
• Leveraging Threat Intelligence in Incident Response
• Incident Response Challenge

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.