Training for your Group
This two-day, instructor-led course equips the student to deploy Traps in large-scale or complex configurations and optimize its configuration.
Course Length: 2 days
Audience: Security Engineers, System Administrators, and Technical Support Engineers
What You're Going To Learn
- Students will learn how to design, build, implement, and optimize large-scale Traps deployments: those with multiple servers and/or thousands of endpoints.
- In hands-on lab exercises, students will distribute Traps endpoint software in an automated way; prepare master images for VDI deployment; build multi-ESM deployments; design and implement customized policies; test Traps with exploits created using Metasploit; and examine prevention dumps with windbg.
Register for an Upcoming Date
1 – DEPLOYING TRAPS
Distributing endpoint software TLS/SSL options Virtual Desktop Infrastructure (VDI) deployment External logging and SIEM integration
2 – SCALING TRAPS DEPLOYMENTS UP
Role-based Access Control Deployment patterns, including Multi-ESM Server deployment Migration tasks
3 – OPTIMIZING TRAPS
Optimizing server settings Defining conditions Designing optimized policies Implementing ongoing maintenance
4 – ADVANCED TRAPS FORENSICS
Agent queries Resources for malicious software testing Exploit challenge testing with Metasploit Exploit dump analysis with windbg
5 – ADVANCED TRAPS TROUBLESHOOTING
Endpoint Security Manager and Traps architecture Troubleshooting scenarios using dbconfig and cytool Troubleshooting application compatibility Troubleshooting BITS connectivity