Popular Searches
Share this via
Facebook
Twitter
LinkedIn
Telegram
WhatsApp
Reddit
Welcome to Careers360.com
Get personalized guidance dashboard based on your profile.
Login / Signup
Online Courses and Certifications
Popular Courses From Top Providers
Online Degree and Diploma Courses
Free Online Courses
Course Types
Online Courses and Certifications
Course by Category
Course by Specialization
Course by Provider
Popular Courses From Top Providers
Coursera Courses
Swayam Courses
Edx Courses
Upgrad Courses
Online Degree and Diploma Courses
Online UG Degree Courses
Online PG Degree Courses
Diploma Courses
Free Online Courses
Free Courses by Branch
Free Courses by Provider
Course Types
Resources
Bootcamps
Courses By Job Roles
Course by Category
Design Certification Courses
Marketing Certification Courses
Humanities Certification Courses
Languages Certification Courses
finance and accounting Certification Courses
Personal Development Certification Courses
It & Software Certification Courses
Social Science Certification Courses
Business and Management Certification Courses
Programming & Development Certification Courses
Course by Specialization
Data Science Certification Courses
Digital Marketing Certification Courses
Data Analysis Certification Courses
Fashion Design Certification Courses
Graphic Designing Certification Courses
Cyber Security Certification Courses
Interior Design Certification Courses
Business Analytics Certification Courses
Artificial Intelligence Certification Courses
Tally Certification Courses
Course by Provider
Upgrad Courses
Edx Courses
Coursera Courses
Great Learning Courses
Simplilearn Courses Courses
Udacity Courses Courses
Edureka Courses Courses
Intellipaat Courses Courses
Emeritus Courses Courses
View All Providers
Coursera Courses
Coursera Data Science Courses
Coursera Software Development Courses
Coursera Machine Learning Courses
Coursera Artificial Intelligence Courses
Coursera Cyber Security Courses
Coursera Information Technology Courses
Coursera Web Designing Courses
Coursera Web Development Courses
Swayam Courses
Swayam Mechanical Engineering Courses
Swayam Computer Science Courses
Swayam Data Analysis Courses
Swayam Cyber Security Courses
Swayam Business Analytics Courses
Swayam Database Management Courses
Swayam Artificial Intelligence Courses
Swayam Robotics Engineering Courses
Edx Courses
Edx Financial Management Courses
Edx Programming Courses
Edx Civil Engineering Courses
Edx Cyber Security Courses
Edx Cloud Computing Courses
Edx Project Management Courses
Edx Data Analytics Courses
Edx Data Analysis Courses
Upgrad Courses
upGrad Data Science Courses
upGrad Cyber Security Courses
upGrad General Management Courses
upGrad Digital Marketing Courses
upGrad Business Analytics Courses
upGrad Machine Learning Courses
upGrad Big Data Analytics Courses
upGrad Cloud Computing Courses
Online UG Degree Courses
Online BBA
Online BCA
Online B.Com
Online B.Sc
Online BA
Online PG Degree Courses
Online MBA
Online MCA
Online M.Sc
Online PGDM
Online MA
Online M.Com
Diploma Courses
Postgraduate (PG) Diploma Courses
Cyber Security Diploma Courses
Data Science Diploma Courses
Finance Diploma Courses
Tourism Diploma Courses
Digital Marketing Diploma Courses
Business Analytics Diploma Courses
Fintech Diploma Courses
Design Thinking Diploma Courses
Free Courses by Branch
Free Digital Marketing Courses
Free Data Science Courses
Free Python Courses
Free Graphic Designing Courses
Free Web Development Courses
Free Cyber Security Courses
Free Machine Learning Courses
Free Content Writing Courses
List of All Free Courses & Certifications
Free Courses by Provider
Udemy Free Courses
Coursera Free Courses
Google Free Courses
Great Learning Free Courses
Edx Free Courses
Udacity Free Courses
Simplilearn Free Courses
Futurelearn Free Courses
Resources
Short Term Courses & Certifications
Online Degrees & Diplomas
Top Offline Courses & Certifications
Latest Blogs on Courses & Certifications
Course Compare
Bootcamps
Bootcamp Course Guide
Data Science Bootcamp Courses
Data Analytics Bootcamp Courses
Machine Learning Bootcamp Courses
Java Bootcamp Courses
Courses By Job Roles
Entrepreneur
Software Developer
Software Engineer
Business Analyst
Web Developer
Fee
The syllabus
Articles
Fee
The syllabus
Articles
Home
Careerera
Courses
Trend Micro Certification Training
Trend Micro Certification Training
BY
Careerera
Brochure
Enquire
Online
24 Hours
Quick Facts
particular
details
Medium of instructions
English
Mode of learning
Self study, Virtual Classroom
+1 more
Mode of Delivery
Video and Text Based
Course and certificate fees
certificate availability
Yes
certificate providing authority
Careerera
The syllabus
Chapter - 1: Introduction
Chapter - 1.1: Evolving Threats
Chapter - 1.2: Traditional Security
Chapter - 1.3: Anatomy of a Targeted Attack
Chapter - 1.4: Point of Entry - Spear Phishing
Chapter - 1.5: How Long Can Targeted Attacks Stay Hidden?
Chapter - 1.6: Why Monitor Your Network?
Chapter - 1.7: Why Deep Discovery?
Chapter - 2: Deep Discovery Solution Overview
Chapter - 2.1: What is Deep Discovery?
Chapter - 2.2: Deep Discovery Attack Detection
Chapter - 2.3: Deep Discovery Threat Detection Technologies
Chapter - 2.4: Deep Discovery Solution Map
Chapter - 2.5: Trend Micro Deep Discovery Inspector
Chapter - 2.6: Trend Micro Deep Discovery Analyzer
Chapter - 2.7: Trend Micro Deep Discovery Email Inspector
Chapter - 2.8: Control Manager
Chapter - 2.9: Custom Threat Defense
Chapter - 2.10: Deep Discovery Director
Chapter - 3: Deep Discovery Inspector
Chapter - 3.1: Key Features and Benefits
Chapter - 3.2: Network Setup
Chapter - 3.3: Form Factors
Chapter - 3.4: Deep Discovery Inspector Models
Chapter - 4: Deep Discovery Inspector Installation and Configuration
Chapter - 4.1: Installation Design
Chapter - 4.2: Deployment Example and Scenarios
Chapter - 4.3: System Requirements
Chapter - 4.4: Installing Deep Discovery Inspector
Chapter - 4.5: Information Provisioning for Setup
Chapter - 4.6: Defining Architecture and Traffic to Capture
Chapter - 4.7: Obtaining ISOs, Hot Fixes/Patches
Chapter - 4.8: Performing an Installation
Chapter - 4.9: Configuring Initial System Settings (Pre-Configuration Console)
Chapter - 4.10: Finalizing Deep Discovery Inspector Configuration (Web Console)
Chapter - 4.11: Testing the Deployment
Chapter - 4.12: Viewing Installation Logs
Chapter - 4.13: Linking Deep Discovery Inspector to Deep Discovery Director
Chapter - 5: Threat Detect Technologies
Chapter - 5.1: Network Content Inspection Engine (NCIE / VSAPI)
Chapter - 5.2: Advanced Threat Scan Engine (ATSE / VSAPI)
Chapter - 5.3: Network Content Inspection Engine (NCIE / VSAPI)
Chapter - 5.4: Network Content Correlation Engine (NCCE / CAV)
Chapter - 5.5: Virtual Analyzer
Chapter - 5.6: Census
Chapter - 5.7: Certified Safe Software Service (CSSS / GRID)
Chapter - 5.8: Trend Micro URL Filtering Engine (TMUFE)
Chapter - 5.9: Network Reputation with Smart Protection Network
Chapter - 5.10: Mobile Application Reputation Service (MARS)
Chapter - 6: Deep Discovery Inspector Management and Administration
Chapter - 6.1: Administration Methods
Chapter - 6.2: Default Accounts
Chapter - 6.3: Threat Management and Configuration
Chapter - 6.4: System Management and Configuration
Chapter - 6.5: Monitoring System Performance and Resources
Chapter - 6.6: Troubleshooting Resource Issues
Chapter - 6.7: Deep Discovery Inspector Logs and Reports
Chapter - 6.8: Accessing System Logs
Chapter - 6.9: Debug Logs
Chapter - 6.10: Determining Log Entities
Chapter - 6.11: Reporting Logs - Event Classification
Chapter - 6.12: Debug Portal
Chapter - 6.13: Threat Reports
Chapter - 7: Virtual Analyzer
Chapter - 7.1: What is Virtual Analyzer Looking For?
Chapter - 7.2: Virtual Analyzer Components
Chapter - 7.3: Process Flow for Samples
Chapter - 7.4: Overall Sample Ratings and Risk Level
Chapter - 7.5: Virtual Analyzer Outputs
Chapter - 7.6: Virtual Analyzer Report
Chapter - 7.7: How to Explain a Malicious Result
Chapter - 7.8: Sending Files to Virtual Analyzer for Analysis
Chapter - 7.9: Virtual Analyzer Feedback in Deep Discovery Inspector
Chapter - 7.10: Introducing a Tradition Sandbox into Deep Discovery Inspector for usage by the Virtual Analyzer
Chapter - 8: Deep Discovery Analyzer Installation and Configuration
Chapter - 8.1: Information Provisioning
Chapter - 8.2: Defining the Architecture
Chapter - 8.3: Obtaining ISOs, Hot Fixes/Patches
Chapter - 8.4: Performing the Installation
Chapter - 8.5: Configuring Initial System Settings
Chapter - 8.6: Configuring Final Settings for Deep Discovery Analyzer
Chapter - 8.7: Testing the Deployment
Chapter - 9: Deep Discovery Analyzer Administration
Chapter - 9.1: Console Overview
Chapter - 9.2: General Administrative Tasks
Chapter - 9.3: Troubleshooting
Chapter - 10: Deep Discovery Email Inspector
Chapter - 10.1: Functionality
Chapter - 10.2: Supported Hardware
Chapter - 10.3: Deployment Modes
Chapter - 10.4: Ports Used
Chapter - 10.5: Summary of Operation Modes
Chapter - 10.6: Threat Detection in Deep Discovery Email Inspector
Chapter - 11: Deep Discovery Email Inspector Installation and Configuration
Chapter - 11.1: Information Provisioning
Chapter - 11.2: Defining the Architecture
Chapter - 11.3: Obtain ISOs, Hot Fixes/Patches
Chapter - 11.4: Performing the Installation
Chapter - 11.5: Completing Pre-Configuration
Chapter - 11.6: Configuring Final Deep Discovery Email Inspector Settings
Chapter - 11.7: Testing the Deployment
Chapter - 12: Deep Discovery Email Inspector Administration
Chapter - 12.1: Management Console Overview
Chapter - 12.2: How to View Detections
Chapter - 12.3: Configuring Policies
Chapter - 12.4: Setting up Recipient Notifications
Chapter - 12.5: Defining Email Message Tags
Chapter - 12.6: Configuring Redirects (Non-Scanable Attachments)
Chapter - 12.7: Adding Policy Exceptions
Chapter - 12.8: Configuring Alerts
Chapter - 12.9: Generating Reports
Chapter - 12.10: Accessing Log Files
Chapter - 12.11: System Administration and Management
Chapter - 12.12: Performing System Maintenance Tasks
Chapter - 13: Threat Connect
Chapter - 13.1: Content
Chapter - 13.2: Using Threat Connect
Chapter - 13.3: Report Content
Chapter - 14: Connected Threat Defense
Chapter - 14.1: Integration is Key to Effective Security
Chapter - 14.2: Connected Threat Defense Requirements
Chapter - 14.3: Connected Threat Defense Components
Chapter - 14.4: Suspicious Objects
Chapter - 14.5: Handling Suspicious Objects
Chapter - 14.6: Trend Micro Control Manager
Chapter - 14.7: Integrating Deep Discovery Inspector with Control Manager
Chapter - 15: Integration
Chapter - 15.1: Open Architecture
Chapter - 15.2: Deep Discovery Inspector Integration
Chapter - 15.3: Integration with Syslog Servers and SIEM Systems
Chapter - 15.4: Third-Party Blocking Integration
Chapter - 15.5: Deep Discovery Analyzer Integration
Articles
Popular Articles
Top 10 Indian Universities Offering Online Degrees
Updated On
16 Sep, 2025
Top 12 Certification Courses Offered by IIT Bombay
Updated On
03 Sep, 2025
UGC Guidelines to Pursue Online Courses
Updated On
04 Jul, 2025
IGNOU Online Courses Approved by UGC
Updated On
03 Jul, 2025
150+ UGC Approved Online Degree Courses by Top ...
Updated On
03 Jun, 2025
Best Programming Languages to Learn in 2025
Updated On
09 May, 2025
Top 10 Online Healthcare and Hospital Managemen...
Updated On
04 Apr, 2025
The Scope of Artificial Intelligence in India
Updated On
09 Jan, 2025
Reasons to Enroll for an Online Content Writing...
Updated On
29 Feb, 2024
Top 10 Online Animation Certificate Courses for...
Updated On
27 Feb, 2024
Latest Articles
Top Government Online Courses for Cyber Security
Updated On
04 Sep, 2025
Top Indian Universities Offering Online Cyber Security Courses
Updated On
22 May, 2025
Top Interview Questions for Cyber Security
Updated On
26 Mar, 2025
What Is Vulnerability in Cyber Security? Definition, List and Courses
Updated On
27 Nov, 2024
What Is Cryptography? Understanding Its Types and Techniques
Updated On
18 Jan, 2024
What is Cyber Security - Definition, Courses, Careers, FAQs
Updated On
10 Oct, 2023
A Beginner’s Guide to Cyber Security
Updated On
27 Apr, 2023
Best Cyber Security Jobs in India
Updated On
05 Jul, 2022
Trending Courses
Popular Courses
Popular Platforms
Learn more about the Courses
Providers
Providers
Providers
Collaborators
Medium of Instructions
Mode of Learning
Campus Based/Physical Classroom
Mode of Study
Mode of Delivery
Certificate Providing Authority
Download Brochure
Thank You!
Brochure has been downloaded.
Open in App
Get the Careers360 App today!
And never miss an important update
Download Now