Traps: Install, Configure and Manage (EDU-281) – Outline

Detailed Course Outline

Module 1: Traps Overview

  • How sophisticated attacks work today
  • The design approach of Traps
  • Traps components and resources

Module 2: Installing Traps

  • Planning the installation
  • Installing the ESM Server and Console
  • Installing Windows and macOS agents
  • Managing content updates
  • Upgrading Traps

Module 3: Malicious Software Overview

  • Basics of computer architecture
  • Exploitation techniques and their prevention
  • Malware techniques and their prevention

Module 4: Consoles Overview

  • Introduction to the ESM Console
  • Introduction to the Traps Agent Console

Module 5: Traps Protection Against Exploits

  • Architecture and EPMs
  • Configuring exploit protection

Module 6: Traps Protection Against Malware

  • Malware protection process flow and components
  • Trusted signer management
  • Post-detection malware analysis

Module 7: Prevention Event Exceptions

  • Prevention events
  • Malware/Exploit Protection Module (MPM/EMP) events
  • Execution Restriction events
  • WildFire® hash control events
  • Post-Detection events

Module 8: Managing Traps

  • System monitoring
  • Traps Server and Agent license administration
  • Server settings, users, and roles
  • Agent settings and Agent actions

Module 9: Traps Forensics Capabilities

  • Forensics workflow and policies
  • Responding to prevention events, and logging

Module 10: Basic Traps Troubleshooting

  • DIReC methodology and troubleshooting resources
  • Working with the technical support
  • Troubleshooting installation, connectivity, and upgrades