Course Date


Course Rating

1 2 3 4 5


Category


Region Delivered


Product Type


Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:This course provides a framework for administration and day-to-day use of the Trellix Email Security – Server, including deployment, configuration, basic administration, and analysis of malicious emails. Learners will triage Trellix-generated alerts and derive actionable to assess threats to their environment. The course also includes checklists, case studies, and guidance for transitioning difficult cases to the Trellix Support team. Hands-on activities provide learners with experience administering Email Security - Server, diagnosing common issues, and triaging alerts generated from malicious files and URLs in email to identify malware and other unwanted intrusions. Who Should Attend:Security analysts, incident responders, and email administrators responsible for the set up and management of Email Security – Server and who use Email Security – Server to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This course examines how to triage alerts generated by the Trellix Network Security and Endpoint Security (HX) platforms, derive actionable information from those alerts, and inspect affected endpoints using live analysis and investigation fundamentals.Hands-on activities span the entire analysis and live investigation process, beginning with a Trellix-generated alert, leading to discovery and analysis of the host for evidence of malware and other unwanted intrusion. Endpoint analysis focuses on investigation techniques using features of Endpoint Security (HX), such as the Triage Summary, Audit Viewer, and Acquisitions.Who Should Attend:Security analysts, incident responders, and threat hunters who use Network Security and Endpoint Security (HX) to detect, investigate, and prevent cyber threats..To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
09/09/2025 9:00AM - 09/12/2025 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:3 daysOverview:This course examines how to triage alerts generated by Trellix Network Security, derive actionable information from those alerts, and apply the fundamentals of live analysis and investigation to investigate associated endpoints.Hands-on activities span the entire analysis and live investigation process, beginning with a Trellix-generated alert, leading to discovery and analysis of the host for evidence of malware and other unwanted intrusion. Analysis will be performed using Trellix products and freely available tools.Who Should Attend:Security analysts, incident responders, and network security professionals who use Network Security to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/17/2025 9:00AM - 06/19/2025 5:00PM
Credit Hours : 24
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Application and Change Control Administration course from Education Services provides in- depth training on the tools you need to efficiently install, configure, operate, and troubleshoot issues relating to TACC to safeguard intellectual property and ensure compliance. The course details how this solution uses Trellix ePolicy Orchestrator (Trellix ePO) for centralized management. It also explains how to use Application Control for dynamic allowlisting to ensure that only trusted applications run on devices servers, and desktops and how to use Change Control to monitor and prevent changes to the file system, registry, and user accounts.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/30/2025 8:00AM - 07/03/2025 5:00PM
Estimated Time : 32 mins
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:This course covers the fundamentals of Cyber Threat Hunting; how to build out a hunt program in your own environment; and how to identify, define, and execute a hunt mission. The course introduces the essential concepts for network and endpoint hunting and then allows learners to apply techniques to hunt for anomalous patterns. Hands-on activities follow real-world use cases to identify attacker techniques. Learners leave the course with critical information for establishing hunt programs within their organization, templates that can be used to document hunt missions, and concrete use cases that they can leverage to hunt in their own environment. Data for lab activities has been collected using the following Trellix technologies: Helix, Endpoint Security (HX) and Trellix Network Forensics. Who Should Attend:Security analysts, incident responders, and threat hunters who use Trellix tools to hunt for cyber threats. This is a fast-paced technical course intended for students with some background in incident response, forensic analysis, network traffic analysis, log analysis, security assessments, and/or penetration testing. It is also well suited for those managing incident response or hunt teams. Learners do not need a prior knowledge of specific Trellix technology to benefit from the instruction. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
10/21/2025 9:30AM - 10/22/2025 5:00PM
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Data Loss Prevention Endpoint Complete Administration course from Education Services provides in-depth training on the tools you need to design, implement, configure, and use Data Loss Prevention Endpoint Complete to safeguard intellectual property and ensure compliance. The course details how this solution uses Trellix ePolicy Orchestrator (Trellix ePO) software for centralized management. It also explains how to monitor and address risky, day-to-day end-user actions such as emailing, web posting, printing, clipboards, screen captures, device control, uploading to the cloud, and more. Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/10/2025 8:00AM - 06/13/2025 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Data Loss Prevention Network Administration course from Education Services provides in-depth training on the tools you need to design, implement, configure, and use Data Loss Prevention Network to safeguard intellectual property and ensure compliance. The course details how this solution uses Trellix ePolicy Orchestrator (ePO) software for centralized management. It also explains how to monitor and address risky, day-to-day end-user actions such as emailing, web posting, printing, clipboards, screen captures, device control, uploading to the cloud, and more. Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
09/09/2025 9:00AM - 09/12/2025 5:00PM
Estimated Time : 32 mins
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:The Trellix Database Security Administration course from Education Services is an essential component to monitor and protect the Database Management System (DBMS). In hands-on lab sessions, you will learn how to deploy and configure a Database Security solution to protect the Database Management System (DBMS) from internal and external threats, as well as intra-database exploits. You can immediately apply your new skills to improve protection for your business and take full advantage of your investment in our Database Security solution.Who Should Attend: system administrators, security personnel, auditors, and/ or consultants concerned with system security.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
10/07/2025 9:30AM - 10/08/2025 5:00PM
Credit Hours : 16
Role :
Instructor-Led Courses
Course Length:4 daysOverview:This entry-level course in digital forensics and incident response provides foundational knowledge in incident response preparation, detection and analysis, containment, eradication, recovery, and post-incident activities, including lessons learned. This course employs open-source tools to perform triage and forensics analysis in hands-on labs, touching on the key artifacts of Microsoft Windows, Linux, and Apple macOS systems.This course is part of the Trellix Cyber Operations team’s Foundations in Incident Response Education (FIRE) track of general defensive security training. Learners are provided a blend of lecture, discussions, and hands-on labs.Who Should Attend:This course is intended for incident responders, information security staff, auditors, SOC analysts, investigators, and consultants responsible for digital forensics and incident response.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/15/2025 8:00AM - 07/18/2025 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Drive Encryption Administration course from Education Services provides an in-depth introduction to the tasks crucial to set up and administer Drive Encryption. Drive Encryption is full disk encryption software that helps protect data on Microsoft Windows tablets, laptops, and desktop PCs to prevent the loss of sensitive data, especially from lost or stolen equipment. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with virtual lab systems, as well as detailed instructions for the integration of this solution.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security and drive encryptionTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/24/2025 9:00AM - 06/27/2025 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:The Trellix Endpoint Detection and Response Administration course from Education Services prepares SOC Analysts to understand, communicate, and use the features provided by Endpoint Detection and Response (EDR). Trellix EDR helps to manage the high volume of alerts, empowering analysts of all skill levels to do more and investigate more effectively. Through hands-on lab exercises, you will learn how to detect advanced device threats, fully investigate, and quickly respond.Who Should Attend:Analysts and/or Engineers responsible for configuration, management, and monitoring activity on their systems, networks, databases and applications using the EDR solutionTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/17/2025 9:00AM - 07/18/2025 5:00PM
Estimated Time : 16 mins
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Endpoint Security - SaaS with Trellix ePolicy Orchestrator - SaaS Administration course from Education Services provides an in-depth introduction to the tasks crucial to set up and administer Endpoint Security - SaaS in an ePO - SaaS managed customer environment. Endpoint Security - SaaS leverages and enhances built-in Windows 10 Windows Defender security with advanced protection for Windows 10 and Windows Server 2016 and newer systems. ePO - SaaS is a SaaS-based centralized security management console that enables management of Microsoft Defender along with Trellix security products. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the Endpoint Security - SaaS policies in the ePO - SaaS user interface, as well as detailed instructions for the integration of this solution.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with administering Endpoint Security - SaaS on ePO - SaaSTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
08/05/2025 9:00AM - 08/08/2025 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Endpoint Security Administration course from Education Services provides an in-depth introduction to the tasks crucial to set up and administer Endpoint Security.Endpoint Security combines Threat Prevention, Adaptive Threat Protection, Firewall, and Web Control to take immediate action against potentially dangerous applications, downloads, websites, and files. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the Endpoint Security user interface and policies, as well as detailed instructions for the integration of this solution.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/16/2025 9:30AM - 06/19/2025 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:5 daysOverview:The Trellix ENS Expert Rules Creation course from Education Services provides insights into our proprietary syntaxes and an advanced view into Operating System concepts and references needed to better understand how ENS works. Building on the ENS Platform, ENS-Expert rules allow the advanced ENS administrator to add deeper security to their ENS deployment. This course helps administrators fully comprehend how ENS Expert Rules can provide a more customized and secure environment.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/14/2025 1:00PM - 07/18/2025 9:00PM
Credit Hours : 40
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides a framework for administration and diagnostics of the Trellix Endpoint Security (HX) server and the Trellix xAgent. The course introduces deployment, configuration and basic administration for Trellix Endpoint Security (HX), and includes checklists, case studies and guidance for transitioning difficult cases to the Trellix Support team. Optional modules include Trellix core hardware and virtual appliances. Hands-on activities provide learners with experience administering the appliance and diagnosing common issues.Who Should Attend:System administrators responsible for implementing and maintaining the Endpoint Security (HX) server and endpoint agent (xAgent).To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/08/2025 9:00AM - 07/08/2025 5:00PM
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix ePolicy Orchestrator – On-prem Administration course from Education Services enables attendees to receive in-depth training on the benefits of the centralized management and deployment of products using ePolicy Orchestrator (ePO) software. Enabling administrators to fully understand the capabilities of their security solution not only reduces the risks of misconfiguration, but also ensures that an organization gets the maximum protection from installation. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the ePO - On-prem interface.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system administration.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/22/2025 9:00AM - 06/25/2025 5:00PM
Estimated Time : 32 mins
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix ePolicy Orchestrator - On-prem Advanced Topics course from Education Services provides in-depth training on the advanced capabilities of ePolicy Orchestrator (ePO) - On-prem software. Through lecture, hands-on labs, and class discussions, you will learn how to use ePO advanced capabilities and practice using tools for upgrades and migrations, monitoring, maintenance and troubleshooting, and advanced policy configuration.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with network and system securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/29/2025 9:00AM - 08/01/2025 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:This course covers the Trellix Helix workflow, triaging Helix alerts, creating and scoping cases from an alert, and using Helix during an investigation.Hands-on activities include configuring data sources, writing TQL searches, as well as analyzing and validating Helix alerts. Who Should Attend:Network security professionals, incident responders and Trellix administrators and analysts who use Helix to analyze data in noisy event streams. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/24/2025 9:00AM - 07/25/2025 5:00PM
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Intelligent Sandbox with DXL and TIE Administration course from Education Services provides an in-depth look at each of the products and how they integrate. In this course, you will learn the tasks crucial to set up, administer, and manage Trellix Intelligent Sandbox (TIS), Data Exchange Layer (DXL), and Threat Intelligence Exchange (TIE) solutions. This combined solution enables you to gain better visibility of your environment, protecting and limiting exposure to threats and vulnerabilities. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the TIS, DXL, and TIE user interfaces, as well as detailed instructions for the integration of this solution. Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with network and system securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/22/2025 9:00AM - 07/25/2025 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Network Security Platform Administration course from Education Services is an essential component of implementing a successful intrusion prevention strategy. In hands-on lab sessions, you’ll learn how to deploy and configure a Network Security Platform solution to protect against real-world attacks. You can immediately apply your new skills to improve protection for your business and take full advantage of your investment in our Trellix Network Security Platform. Who Should Attend:system and network administrators, security personnel, auditors, and/ or consultants concerned with network and system securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/10/2025 9:00AM - 06/13/2025 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides an overview of Trellix Email Security – Cloud core functionality and covers administration procedures and alert analysis.Hands-on activities include rule/policy creation, alert generation, and the breakdown and analysis of information found in a Trellix email alert that is used in incident reporting.Who Should Attend:This course is intended for analysts (primary) and administrators responsible for the setup and management of Email Security – Cloud and use Email Security – Cloud to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:3 daysOverview:This course examines how to triage Trellix-generated alerts, derive actionable information from those alerts, and inspect affected endpoints using live analysis and investigation fundamentals.Hands-on activities span the entire analysis and live investigation process, beginning with a Trellix-generated alert, leading to discovery and analysis of the host for evidence of malware and other unwanted intrusion. Endpoint analysis focuses on investigation techniques using features of Endpoint Security (HX), such as the Triage Summary, Audit Viewer, and Acquisitions. Who Should Attend:Security analysts, incident responders, and threat hunters who use Endpoint Security (HX) to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/11/2025 9:00AM - 06/13/2025 5:00PM
Credit Hours : 24
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This course covers the XDR workflow, including configuring data sources through extended detection via Trellix Helix, Trellix Network Security, and Trellix Endpoint Security (HX). Learners triage Trellix-generated alerts, derive actionable information from those alerts, and inspect affected endpoints using live analysis and investigation fundamentals.Hands-on activities include writing TQL searches, creating rules, analyzing and validating alerts from Helix, Network Security, and Endpoint Security (HX), deep analysis of endpoint data collections, and response actions through Endpoint Security (HX) such as collecting data from across the enterprise and containing endpoints. Who Should Attend:Security analysts, incident responders, and threat hunters who use Helix, Network Security and Endpoint Security (HX) to detect, investigate, and prevent cyber threats. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/29/2025 9:00AM - 08/01/2025 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This entry-level course in malware analysis provides foundational knowledge in malware history, safe malware sample handling, analysis methodologies and techniques, sandboxing, triage, and countermeasures. This course employs open-source tools in hands-on labs to analyze samples including packed executables, cross-platform, Office, PDF and more.This course is part of the Trellix Cyber Operations team’s Foundations in Incident Response Education (FIRE) track of general defensive security training. Learners are provided a blend of lecture, discussions, and hands-on labs.Who Should Attend:This course is intended for incident responders, information security staff, auditors, SOC analysts, investigators, and consultants responsible for digital forensics and incident response.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/21/2025 9:30AM - 07/24/2025 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides a framework for administration and diagnostics, including deployment, configuration and basic administration, of one or more of the following Trellix appliances: Network Security, Email Security - Server, File Protect, Malware Analysis, and Central Management.The course includes checklists, case studies, lab challenges and guidance for transitioning difficult cases to the Trellix Support team.Hands-on activities provide learners with experience administering these appliances and diagnosing common issues. Who Should Attend:System administrators responsible for implementing and maintaining one or more of the following Trellix appliances: Network Security, Email Security - Server, File Protect, Malware Analysis, and Central Management. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This one-day hands-on course focuses on configuring and administering NDR systems, specifically Network Investigator and Packet Capture. Participants will engage in practical labs to integrate existing Trellix sensors, such as Network Security and Intrusion Prevention System, into the NDR environment. The course provides an overview of each appliance, their standard network deployments, and how they function within the NDR system alongside the sensors.Lab exercises are included in this course.Who Should Attend:Network security professionals who administer and operate Trellix Network Investigator and Packet Capture and integrate Intrusion Prevention System, and Network Security as NDR sensors along with other Trellix technologies.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This entry-level course covers deployment options, basic administration, and configuration of the integrated Trellix technologies for the Trellix Network Forensics appliances—Packet Capture and Investigation Analysis. Hands-on activities include post-installation tasks, system health checks, pairing a Packet Capture appliance with the Investigation Analysis system, daily system administration tasks, configuring Event Based Capture, and integration of another Trellix system for alerts.Who Should Attend:Network security professionals and system administrators who operate and administer Trellix Packet Capture and Investigation Analysis appliances and integrate them with other Trellix technologies.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides a framework for administration and diagnostics, including deployment, configuration and basic administration, of Trellix Network Security. The course includes checklists, case studies, lab challenges and guidance for transitioning difficult cases to the Trellix Support team.Hands-on activities provide learners with experience administering Trellix Network Security and diagnosing common issues. Who Should Attend:System administrators responsible for implementing and maintaining Network Security appliances. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/16/2025 9:00AM - 06/16/2025 5:00PM
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:This course covers the fundamentals and concepts of network traffic analysis—how to search, filter, analyze, reconstruct, and preserve network traffic; and how to apply techniques learned to conduct a network forensics investigation utilizing the Trellix Network Forensics solution.Hands-on activities include building an analysis dashboard, executing queries, filtering results, and reconstructing network traffic. Learners will triage an alert and identify anomalies in network traffic to uncover and document indicators of compromise (IOCs) that build a case for a real-world advanced threat. Who Should Attend:Security analysts, incident responders and threat hunters who use Packet Capture and Investigation Analysis appliances to detect, investigate, and analyze cyber threats through packet data. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 16
Role :
Vouchers : 44
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix SIEM course from Education Services prepares Trellix SIEM engineers and analysts to understand, communicate, and use the features provided by Trellix Enterprise Security Manager. Trellix SIEM provides near real-time visibility into the activity on all your systems, networks, databases, and applications, enabling you to detect, correlate, and remedy threats in minutes across your entire IT infrastructure. Through hands-on lab exercises, you will learn how to optimize the Trellix Enterprise Security Manager by using Trellix-recommended best practices and methodologies.Who Should Attend:Enterprise Security Manager users, responsible for monitoring activity on systems, networks, databases, applications, and for configuration and management of the Enterprise Security Manager To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix SIEM Advanced course from Education Services prepares Trellix SIEM engineers and analysts to understand, communicate, and use the features provided by Enterprise Security Manager. Trellix Enterprise Security Manager—the heart of our Security Information and Event Management (SIEM) solution—provides near real-time visibility into the activity on all your systems, networks, databases, and applications, enabling you to detect, correlate, and remedy threats in minutes across your entire IT infrastructure. This course prepares Trellix SIEM engineers and analysts to understand, communicate, and use the features provided by Enterprise Security Manager. Through demonstration, explanation, and hands-on lab exercises, you will learn how to utilize the Enterprise Security Manager by using Trellix-recommended best practices and methodologies. Who Should Attend:Enterprise Security Manager users, responsible for monitoring activity on systems, networks, databases, applications, and for configuration and management of the Enterprise Security ManagerTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This entry-level course in threat hunting and threat intelligence provides foundational knowledge in threat hunting methodologies and techniques, including the application of information security frameworks, and threat intelligence. This course employs open-source tools to perform threat hunting and analysis in hands-on labs, touching on threat hunting use cases, hunting techniques, and key tactics.This course is part of the Trellix Cyber Operations team’s Foundations in Incident Response Education (FIRE) track of general defensive security training. Learners are provided a blend of lecture, discussions, and hands-on labs.Who Should Attend:This course is intended for incident responders, information security staff, auditors, SOC analysts, investigators, and consultants responsible for digital forensics and incident response.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
08/19/2025 8:00AM - 08/22/2025 5:00PM
Credit Hours : 32
Role :
Vouchers : 22
Course Rating
Instructor-Led Courses
Course Length:2 dayOverview:This course is a primer on XDR, covering XDR features, benefits, deployment options, basic administration, and core functionality. Learners will discover the unique strengths of XDR, and understand how XDR enables real-time situational awareness of known and unknown threats. Hands-on activities include searching log events, triaging XDR alerts and investigating security incidents using XDR. Who Should Attend:Network security professionals, incident responders and Trellix administrators and analysts who use XDR to analyze data in noisy event streams.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 16
Role :
* CPE policy and requirements can vary among different organizations. Students must self report hours to the respective organization. Hours shown is to give potential CPE hours based on hours of training