Gain cutting-edge cyber security expertise with our specialized training programs



Unlock your cybersecurity potential with Trend Micro ATC


Deepen your knowledge. Build your skills. And get your Trend Micro certification now! The trainings are designed for professionals who are passionate about staying ahead in the rapidly evolving world of cybersecurity.


Why choose Trend Micro ATC trainings?


Hands-on learning:
Theory is important, but practice makes perfect. Our training sessions are structured around hands-on labs and interactive exercises that simulate actual cybersecurity scenarios. Gain practical experience that you can apply directly to your day-to-day operations.


Expert instructors:
Learn from the best in the field. Our instructors are cybersecurity professionals with deep knowledge of Trend Micro’s solutions. They’re dedicated to providing you with the insights and skills needed to excel.


Certification:
Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a Trend Micro Certified Professional.
You will learn how to use Trend Micro Apex One™. This course details basic architecture, protection functionality, deployment scenarios, and troubleshooting. Through hands-on labs, participants practice configuring Apex One protection features, along with the administration options needed for a successful implementation and long-term maintenance.

Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a Trend Micro Certified Professional for Apex One. 

What will you learn?
Trend Micro Apex One Overview
Managing Apex One as a Service
Managing Security Agents
Deploying Policies
Keeping Security Agent Up to Date
Trend Micro™ Smart Protection
Protecting Endpoint Computers from Malware
Protecting Endpoint Computers Through Behavior Monitoring
Protecting Endpoint Computers from Unknown Threats
Blocking Web Threats
Protecting Endpoint Computers Through Traffic Filtering
Blocking Unapproved Applications on Endpoint Computers
Protecting Endpoint Computers from Vulnerabilities
Preventing Data Loss on Endpoint Computers
Detecting Emerging Malware Through Trend Micro™ Connected Threat Defense™
Detecting and Investigating Security Incidents on Endpoint Computers

You will learn how to plan, deploy, and manage a Deep Discovery threat detection solution, using:

Trend Micro™ Deep Discovery™ Inspector
Trend Micro™ Deep Discovery™ Analyzer
Trend Micro™ Deep Discovery™ Director
Trend Micro™ Deep Discovery™ Director – Network Analytics

Participants explore key concepts and methodologies of using a blend of Deep Discovery solutions for a more complete approach to network security. This course provides a variety of hands-on lab exercises, allowing each student to put the lesson content into action.

Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a Trend Micro Certified Professional for Deep Discovery. 

You will learn how to use Trend Micro Deep Security 20 for advanced hybrid cloud security on physical, virtual, and cloud-based servers. This course details the basic architecture of the Deep Security solution, deployment options, protection modules, policy configuration, and administration of the system.

As part of the course, participants will install Deep Security Manager in a virtual lab environment, deploy Deep Security Agents on a variety of Windows® server platforms, as well as the Deep Security Virtual Appliance, and configure protection. Best practices and troubleshooting details for successful implementation and long-term maintenance of the system are also discussed.

Upon completion of this course, participants may choose to complete the certification exam to obtain designation as a Trend Micro Certified Professional for Deep Security. 

Have additional questions about prices, dates, certificates, lecturers...? Contact us. 

You will be able to unsubscribe from our mailing list anytime. Your data will be threated in accordance to F5 privacy notice and Exclusive Networks privacy notice