Course Date


Course Rating

1 2 3 4 5


Category


Region Delivered


Product Type


Content Type


Course Company Owner


Hands on Labs


Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:This course provides a framework for administration and day-to-day use of the Trellix Email Security – Server, including deployment, configuration, basic administration, and analysis of malicious emails. Learners will triage Trellix-generated alerts and derive actionable to assess threats to their environment. The course also includes checklists, case studies, and guidance for transitioning difficult cases to the Trellix Support team. Hands-on activities provide learners with experience administering Email Security - Server, diagnosing common issues, and triaging alerts generated from malicious files and URLs in email to identify malware and other unwanted intrusions. Who Should Attend:Security analysts, incident responders, and email administrators responsible for the set up and management of Email Security – Server and who use Email Security – Server to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This course examines how to triage alerts generated by the Trellix Network Security and Endpoint Security (HX) platforms, derive actionable information from those alerts, and inspect affected endpoints using live analysis and investigation fundamentals.Hands-on activities span the entire analysis and live investigation process, beginning with a Trellix-generated alert, leading to discovery and analysis of the host for evidence of malware and other unwanted intrusion. Endpoint analysis focuses on investigation techniques using features of Endpoint Security (HX), such as the Triage Summary, Audit Viewer, and Acquisitions.Who Should Attend:Security analysts, incident responders, and threat hunters who use Network Security and Endpoint Security (HX) to detect, investigate, and prevent cyber threats..To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/08/2026 9:30AM - 06/11/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:3 daysOverview:This course examines how to triage alerts generated by Trellix Network Security, derive actionable information from those alerts, and apply the fundamentals of live analysis and investigation to investigate associated endpoints.Hands-on activities span the entire analysis and live investigation process, beginning with a Trellix-generated alert, leading to discovery and analysis of the host for evidence of malware and other unwanted intrusion. Analysis will be performed using Trellix products and freely available tools.Who Should Attend:Security analysts, incident responders, and network security professionals who use Network Security to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 24
Role :
Course Rating
Instructor-Led Courses
<div><div style="color: rgb(0, 0, 0); font-size: 12px; text-align: left;"><font face="Arial"><span style="font-size: 12px;"><b>Course Length:</b></span></font></div><div style="color: rgb(0, 0, 0); font-size: 12px; text-align: left;"><font face="Arial"><span style="font-size: 12px;">4 days</span></font></div><br><b><font face="Arial">Overview:</font></b></div><div style="color: rgb(0, 0, 0); font-size: 12px; text-align: left;"><font face="Arial">The Trellix Application and Change Control Administration course from Education Services provides in- depth training on the tools you need to efficiently install, configure, operate, and troubleshoot issues relating to TACC to safeguard intellectual property and ensure compliance. The course details how this solution uses Trellix ePolicy Orchestrator (Trellix ePO) for centralized management. It also explains how to use Application Control for dynamic allowlisting to ensure that only trusted applications run on devices servers, and desktops and how to use Change Control to monitor and prevent changes to the file system, registry, and user accounts.</font></div><br><div style="color: rgb(0, 0, 0); font-size: 12px; text-align: left;"><font face="Arial"><b>Who Should Attend:</b></font></div><div style="color: rgb(0, 0, 0); font-size: 12px; text-align: left;"><font face="Arial">system and network administrators, security personnel, auditors, and/or consultants concerned with system security</font></div><br><div style="text-align: left;"><font face="Arial"><span style="font-size: 12px;">To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.</span></font></div><div style="color: rgb(0, 0, 0); font-size: 12px; text-align: left;"><br></div><div style="color: rgb(0, 0, 0); font-size: 12px; text-align: left;"><font face="Arial"><a href="https://trellix.com/en-us/assets/course-descriptions/cd-application-change-control-admin.pdf" target="_blank"><span style="font-size: 12px;">Download PDF Course Data Sheet</span></a></font></div>
04/28/2026 9:00AM - 05/01/2026 5:00PM
Estimated Time : 32 mins
Credit Hours : 32
Role :
Skyhigh Certifications
This certification path is designed to get you demonstration ready with the Skyhigh Security SSE portfolio.
Estimated Time :
Credit Hours :
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Data Loss Prevention Endpoint Complete Administration course from Education Services provides in-depth training on the tools you need to design, implement, configure, and use Data Loss Prevention Endpoint Complete to safeguard intellectual property and ensure compliance. The course details how this solution uses Trellix ePolicy Orchestrator (Trellix ePO) software for centralized management. It also explains how to monitor and address risky, day-to-day end-user actions such as emailing, web posting, printing, clipboards, screen captures, device control, uploading to the cloud, and more. Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/01/2026 9:30AM - 06/04/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Data Loss Prevention Network Administration course from Education Services provides in-depth training on the tools you need to design, implement, configure, and use Data Loss Prevention Network to safeguard intellectual property and ensure compliance. The course details how this solution uses Trellix ePolicy Orchestrator (ePO) software for centralized management. It also explains how to monitor and address risky, day-to-day end-user actions such as emailing, web posting, printing, clipboards, screen captures, device control, uploading to the cloud, and more. Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Estimated Time : 32 mins
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:The Trellix Database Security Administration course from Education Services is an essential component to monitor and protect the Database Management System (DBMS). In hands-on lab sessions, you will learn how to deploy and configure a Database Security solution to protect the Database Management System (DBMS) from internal and external threats, as well as intra-database exploits. You can immediately apply your new skills to improve protection for your business and take full advantage of your investment in our Database Security solution.Who Should Attend: system administrators, security personnel, auditors, and/ or consultants concerned with system security.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
04/13/2026 9:00AM - 04/14/2026 6:00PM
Credit Hours : 16
Role :
Instructor-Led Courses
Course Length:4 daysOverview:This entry-level course in digital forensics and incident response provides foundational knowledge in incident response preparation, detection and analysis, containment, eradication, recovery, and post-incident activities, including lessons learned. This course employs open-source tools to perform triage and forensics analysis in hands-on labs, touching on the key artifacts of Microsoft Windows, Linux, and Apple macOS systems.This course is part of the Trellix Cyber Operations team’s Foundations in Incident Response Education (FIRE) track of general defensive security training. Learners are provided a blend of lecture, discussions, and hands-on labs.Who Should Attend:This course is intended for incident responders, information security staff, auditors, SOC analysts, investigators, and consultants responsible for digital forensics and incident response.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/07/2026 9:30AM - 07/10/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Drive Encryption Administration course from Education Services provides an in-depth introduction to the tasks crucial to set up and administer Drive Encryption. Drive Encryption is full disk encryption software that helps protect data on Microsoft Windows tablets, laptops, and desktop PCs to prevent the loss of sensitive data, especially from lost or stolen equipment. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with virtual lab systems, as well as detailed instructions for the integration of this solution.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security and drive encryptionTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Skyhigh Courses
The Skyhigh Secure Web Gateway for Cloud Fundamentals course is designed to introduce you to the concepts, architecture, user interface, and administration of the Secure Web Gateway (SWG) product. You will learn how to create web policies, how to perform web gateway setup in the Skyhigh Security Cloud platform, and how to analyze web traffic and malware. Skyhigh Security products and capabilities explained in this course include the Skyhigh Security Cloud Platform, Secure Web Gateway, Remote Browser Isolation (RBI), Cloud Firewall, and Private Access (ZTNA). Each of these products and capabilities are integral to the Skyhigh Security Service Edge (SSE) product and security philosophy.This eLearning course includes open topic navigation which allows students to move freely between any topics of interest to them at any time. Also, Skill Practice activities are included to help students practice the skills and concepts learned in their own Skyhigh Security environment. Course progress is saved each time a student exits the course, so it does not have to be completed in a set time limit or within one session. Completion of the course is awarded when all topics are reviewed.IMPORTANT: The course will be updated as new Skyhigh Security Cloud features are added. Check back later to learn more about how to configure and use features in new releases.Download Course Description Datasheet PDF
Estimated Time :
Credit Hours : 2
Role :
Course Rating
Skyhigh Courses
The Skyhigh Secure Web Gateway Fundamentals For On Premise Appliances course is designed to introduce you to the concepts, architecture, user interface, and administration of the Secure Web Gateway (SWG) product. This course is focused only on the appliance-based version of SWG and does not include SWG administered on the Skyhigh Security Cloud platform. The course uses a combination of text, graphics, demonstrations, and interactive content that give you detailed instructions for the integration of this product.This eLearning course includes open topic navigation which allows students to move freely between any topics of interest to them at any time. Course progress is saved each time a student exits the course so it does not have to be completed in a set time limit or within one session. Completion of the course is awarded when all topics are reviewed.Download Course Description Datasheet PDF
Estimated Time :
Credit Hours : 2
Role :
Course Rating
Skyhigh Courses
The Skyhigh Security Cloud Fundamentals course is designed to introduce you to the concepts, architecture, user interface, and administration of Skyhigh Security Cloud and associated products. Skyhigh Security products and capabilities explained in this course include the Skyhigh Security Cloud Platform, Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), Infrastructure as a Service (IAAS), Software as a Service (SAAS), Shadow IT, and Cloud Native Application Protection Platform (CNAPP). Each of these products and capabilities are integral to the Security Service Edge (SSE) product and security philosophy.This eLearning course includes open topic navigation which allows students to move freely between any topics of interest to them at any time. Also, Skill Practice activities are included to help students practice the skills and concepts learned in their own Skyhigh Security environment. Course progress is saved each time a student exits the course. Completion of the course is awarded when all topics are reviewed.IMPORTANT: The course will be updated as new Skyhigh Security Cloud features are added. Check back later to learn more about how to configure and use features in new releases.Download Course Description Datasheet PDF
Estimated Time :
Credit Hours : 5
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:The Trellix Endpoint Detection and Response Administration course from Education Services prepares SOC Analysts to understand, communicate, and use the features provided by Endpoint Detection and Response (EDR). Trellix EDR helps to manage the high volume of alerts, empowering analysts of all skill levels to do more and investigate more effectively. Through hands-on lab exercises, you will learn how to detect advanced device threats, fully investigate, and quickly respond.Who Should Attend:Analysts and/or Engineers responsible for configuration, management, and monitoring activity on their systems, networks, databases and applications using the EDR solutionTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
03/10/2026 9:30AM - 03/11/2026 5:00PM
Estimated Time : 16 mins
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Endpoint Security - SaaS with Trellix ePolicy Orchestrator - SaaS Administration course from Education Services provides an in-depth introduction to the tasks crucial to set up and administer Endpoint Security - SaaS in an ePO - SaaS managed customer environment. Endpoint Security - SaaS leverages and enhances built-in Windows 10 Windows Defender security with advanced protection for Windows 10 and Windows Server 2016 and newer systems. ePO - SaaS is a SaaS-based centralized security management console that enables management of Microsoft Defender along with Trellix security products. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the Endpoint Security - SaaS policies in the ePO - SaaS user interface, as well as detailed instructions for the integration of this solution.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with administering Endpoint Security - SaaS on ePO - SaaSTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Endpoint Security Administration course from Education Services provides an in-depth introduction to the tasks crucial to set up and administer Endpoint Security.Endpoint Security combines Threat Prevention, Adaptive Threat Protection, Firewall, and Web Control to take immediate action against potentially dangerous applications, downloads, websites, and files. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the Endpoint Security user interface and policies, as well as detailed instructions for the integration of this solution.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
05/05/2026 9:00AM - 05/08/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:5 daysOverview:Endpoint Security ENS Expert Rules Creation Advancedcourse from Education Services provides insights into our proprietary syntaxes and an advanced view into Operating System concepts and references needed to better understand how ENS works. Building on the ENS Platform, ENS-Expert rules allow the advanced ENS administrator to add deeper security to their ENS deployment. This course helps administrators fully comprehend how ENS Expert Rules can provide a more customized and secure environment.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 40
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides a framework for administration and diagnostics of the Trellix Endpoint Security (HX) server and the Trellix xAgent. The course introduces deployment, configuration and basic administration for Trellix Endpoint Security (HX), and includes checklists, case studies and guidance for transitioning difficult cases to the Trellix Support team. Optional modules include Trellix core hardware and virtual appliances. Hands-on activities provide learners with experience administering the appliance and diagnosing common issues.Who Should Attend:System administrators responsible for implementing and maintaining the Endpoint Security (HX) server and endpoint agent (xAgent).To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/08/2026 9:30AM - 06/08/2026 5:00PM
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix ePolicy Orchestrator – On-prem Administration course from Education Services enables attendees to receive in-depth training on the benefits of the centralized management and deployment of products using ePolicy Orchestrator (ePO) software. Enabling administrators to fully understand the capabilities of their security solution not only reduces the risks of misconfiguration, but also ensures that an organization gets the maximum protection from installation. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the ePO - On-prem interface.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system administration.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
03/16/2026 9:30AM - 03/19/2026 5:00PM
Estimated Time : 32 mins
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix ePolicy Orchestrator - On-prem Advanced Topics course from Education Services provides in-depth training on the advanced capabilities of ePolicy Orchestrator (ePO) - On-prem software. Through lecture, hands-on labs, and class discussions, you will learn how to use ePO advanced capabilities and practice using tools for upgrades and migrations, monitoring, maintenance and troubleshooting, and advanced policy configuration.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with network and system securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
03/17/2026 9:30AM - 03/20/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:This course covers the Trellix Helix workflow, triaging Helix alerts, creating and scoping cases from an alert, and using Helix during an investigation.Hands-on activities include configuring data sources, writing TQL searches, as well as analyzing and validating Helix alerts. Who Should Attend:Network security professionals, incident responders and Trellix administrators and analysts who use Helix to analyze data in noisy event streams. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Intelligent Sandbox with DXL and TIE Administration course from Education Services provides an in-depth look at each of the products and how they integrate. In this course, you will learn the tasks crucial to set up, administer, and manage Trellix Intelligent Sandbox (TIS), Data Exchange Layer (DXL), and Threat Intelligence Exchange (TIE) solutions. This combined solution enables you to gain better visibility of your environment, protecting and limiting exposure to threats and vulnerabilities. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the TIS, DXL, and TIE user interfaces, as well as detailed instructions for the integration of this solution. Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with network and system securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides an in-depth look at Trellix Intelligent Virtual Execution (IVX) - Server. In this course, you will learn the tasks crucial to configure, administer, and manage IVX - Server. You will also learn how to submit malware for analysis and how IVX integrates with other Trellix products, enabling you to gain better visibility of your environment, protecting and limiting exposure to threats and vulnerabilities. This course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with user interfaces. Who Should Attend:This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system administration.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
03/20/2026 9:00AM - 03/20/2026 5:00PM
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Network Security Platform Administration course from Education Services is an essential component of implementing a successful intrusion prevention strategy. In hands-on lab sessions, you’ll learn how to deploy and configure a Network Security Platform solution to protect against real-world attacks. You can immediately apply your new skills to improve protection for your business and take full advantage of your investment in our Trellix Network Security Platform.Who Should Attend:system and network administrators, security personnel, auditors, and/ or consultants concerned with network and system securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
04/06/2026 9:00AM - 04/09/2026 6:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides an overview of Trellix Email Security – Cloud core functionality and covers administration procedures and alert analysis.Hands-on activities include rule/policy creation, alert generation, and the breakdown and analysis of information found in a Trellix email alert that is used in incident reporting.Who Should Attend:This course is intended for analysts (primary) and administrators responsible for the setup and management of Email Security – Cloud and use Email Security – Cloud to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:3 daysOverview:This course examines how to triage Trellix-generated alerts, derive actionable information from those alerts, and inspect affected endpoints using live analysis and investigation fundamentals.Hands-on activities span the entire analysis and live investigation process, beginning with a Trellix-generated alert, leading to discovery and analysis of the host for evidence of malware and other unwanted intrusion. Endpoint analysis focuses on investigation techniques using features of Endpoint Security (HX), such as the Triage Summary, Audit Viewer, and Acquisitions. Who Should Attend:Security analysts, incident responders, and threat hunters who use Endpoint Security (HX) to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/09/2026 9:30AM - 06/11/2026 5:00PM
Credit Hours : 24
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This course covers the XDR workflow, including configuring data sources through extended detection via Trellix Helix, Trellix Network Security, and Trellix Endpoint Security (HX). Learners triage Trellix-generated alerts, derive actionable information from those alerts, and inspect affected endpoints using live analysis and investigation fundamentals.Hands-on activities include writing TQL searches, creating rules, analyzing and validating alerts from Helix, Network Security, and Endpoint Security (HX), deep analysis of endpoint data collections, and response actions through Endpoint Security (HX) such as collecting data from across the enterprise and containing endpoints. Who Should Attend:Security analysts, incident responders, and threat hunters who use Helix, Network Security and Endpoint Security (HX) to detect, investigate, and prevent cyber threats. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
03/10/2026 9:00AM - 03/13/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This entry-level course in malware analysis provides foundational knowledge in malware history, safe malware sample handling, analysis methodologies and techniques, sandboxing, triage, and countermeasures. This course employs open-source tools in hands-on labs to analyze samples including packed executables, cross-platform, Office, PDF and more.This course is part of the Trellix Cyber Operations team’s Foundations in Incident Response Education (FIRE) track of general defensive security training. Learners are provided a blend of lecture, discussions, and hands-on labs.Who Should Attend:This course is intended for incident responders, information security staff, auditors, SOC analysts, investigators, and consultants responsible for digital forensics and incident response.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
09/01/2026 9:30AM - 09/04/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides a framework for administration and diagnostics, including deployment, configuration and basic administration, of one or more of the following Trellix appliances: Network Security, Email Security - Server, File Protect, Malware Analysis, and Central Management.The course includes checklists, case studies, lab challenges and guidance for transitioning difficult cases to the Trellix Support team.Hands-on activities provide learners with experience administering these appliances and diagnosing common issues. Who Should Attend:System administrators responsible for implementing and maintaining one or more of the following Trellix appliances: Network Security, Email Security - Server, File Protect, Malware Analysis, and Central Management. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides an overview of the Network Detection and Response Solution and discusses the NDR console. The course focuses on how NDR can integrate with Network sensors, Packet Capture (PX), Network Security (NX) and Intrusion Prevention System (IPS). The course provides an overview of each appliance,  their standard network deployments, and how they function within the NDR system. This course also reviews NDR’s integration with other Trellix products like, SIEM, ePO, and Tenable Security. It discusses how Trellix NDR with Trellix Wise leverages AI agents to detect and disrupt attacker activity, and accelerate investigation and response. This course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with all user interfaces.Who Should Attend:This course is intended for system and network administrators, security personnel, auditors, and/ or consultants concerned with Networking and System administration.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
03/17/2026 9:00AM - 03/17/2026 5:00PM
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:This course covers the fundamentals and concepts of Network Traffic Analysis. It is designed to help Network Analysts learn how to search, filter, analyze, reconstruct, and preserve network traffic, and to apply techniques to conduct a network forensics investigation using the Network Detection and Response (NDR) solution. The course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with all user interfaces.Who Should Attend:Network security professionals and incident responders who use Trellix Packet Capture and Investigation Analysis appliances to analyze cyber threats through packet data.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
03/18/2026 9:00AM - 03/19/2026 5:00PM
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This entry-level course covers deployment options, basic administration, and configuration of the integrated Trellix technologies for the Trellix Network Forensics appliances—Packet Capture and Investigation Analysis. Hands-on activities include post-installation tasks, system health checks, pairing a Packet Capture appliance with the Investigation Analysis system, daily system administration tasks, configuring Event Based Capture, and integration of another Trellix system for alerts.Who Should Attend:Network security professionals and system administrators who operate and administer Trellix Packet Capture and Investigation Analysis appliances and integrate them with other Trellix technologies.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides a framework for administration and diagnostics, including deployment, configuration and basic administration, of Trellix Network Security. The course includes checklists, case studies, lab challenges and guidance for transitioning difficult cases to the Trellix Support team.Hands-on activities provide learners with experience administering Trellix Network Security and diagnosing common issues. Who Should Attend:System administrators responsible for implementing and maintaining Network Security appliances. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Vouchers : 44
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix SIEM course from Education Services prepares Trellix SIEM engineers and analysts to understand, communicate, and use the features provided by Trellix Enterprise Security Manager. Trellix SIEM provides near real-time visibility into the activity on all your systems, networks, databases, and applications, enabling you to detect, correlate, and remedy threats in minutes across your entire IT infrastructure. Through hands-on lab exercises, you will learn how to optimize the Trellix Enterprise Security Manager by using Trellix-recommended best practices and methodologies.Who Should Attend:Enterprise Security Manager users, responsible for monitoring activity on systems, networks, databases, applications, and for configuration and management of the Enterprise Security Manager To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix SIEM Advanced course from Education Services prepares Trellix SIEM engineers and analysts to understand, communicate, and use the features provided by Enterprise Security Manager. Trellix Enterprise Security Manager—the heart of our Security Information and Event Management (SIEM) solution—provides near real-time visibility into the activity on all your systems, networks, databases, and applications, enabling you to detect, correlate, and remedy threats in minutes across your entire IT infrastructure. This course prepares Trellix SIEM engineers and analysts to understand, communicate, and use the features provided by Enterprise Security Manager. Through demonstration, explanation, and hands-on lab exercises, you will learn how to utilize the Enterprise Security Manager by using Trellix-recommended best practices and methodologies. Who Should Attend:Enterprise Security Manager users, responsible for monitoring activity on systems, networks, databases, applications, and for configuration and management of the Enterprise Security ManagerTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Skyhigh Courses
The Skyhigh Secure Web Gateway for Cloud Fundamentals course is designed to introduce you to the concepts, architecture, user interface, and administration of the Secure Web Gateway (SWG) product. You will learn how to create web policies, how to perform web gateway setup in the Skyhigh Security Cloud platform, and how to analyze web traffic and malware. Skyhigh Security products and capabilities explained in this course include the Skyhigh Security Cloud Platform, Secure Web Gateway, Remote Browser Isolation (RBI), Cloud Firewall, and Private Access (ZTNA). Each of these products and capabilities are integral to the Skyhigh Security Service Edge (SSE) product and security philosophy.
Estimated Time :
Credit Hours : 6
Role :
Course Rating
Skyhigh Courses
The Skyhigh Secure Web Gateway Administration for On Premise Appliances course from Skyhigh Security provides an in-depth introduction to the tasks crucial to setting up and administering Secure Web Gateway (SWG) effectively. The course combines lectures and practical hands on lab exercises. It provides details instructions on the integration of this product with a customer security environment. This course covers only the on premise appliance version of SWG. SWG on the Skyhigh Security Cloud platform is not covered.Download PDF Course Data SheetFor more information refer to:https://success.myshn.net/Start_Here_with_Skyhigh_Security/Skyhigh_Security_Training/02_Skyhigh_Security_Instructor_Led_Training
03/16/2026 9:00AM - 03/19/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Skyhigh Courses
The Secure Web Gateway on Cloud Administration course provides in-depth training on Skyhigh Security Cloud and related cloud products. The course covers on configuration and administration of critical Security Service Edge (SSE) functions. It also walks through the components to help participants identify, define, and apply product features based on use case scenarios. Products and capabilities covered in this course include the Cloud platform, Skyhigh Secure Web Gateway (SWG), Cloud Firewall, Data Loss Prevention (DLP), Infrastructure as A Service (IAAS), Software as a Service (SAAS), Remote Browser Isolation(RBI), and Private Access (ZTNA).Download PDF Course Data SheetFor more information refer to:https://success.myshn.net/Start_Here_with_Skyhigh_Security/Skyhigh_Security_Training/02_Skyhigh_Security_Instructor_Led_Training
03/23/2026 9:00AM - 03/26/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Skyhigh Courses
The Skyhigh Security Cloud Administration course provides in-depth training on Skyhigh Security Cloud and related cloud products. This four day course covers on configuration and administration of critical Skyhigh Security Cloud functions. It also walks through the components to help participants identify, define, and refine use cases based on specific scenarios. Products and capabilities covered in this course include the Skyhigh Security Cloud platform, Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), Infrastructure as a Service (IAAS), Software as a Service (SAAS), Shadow IT, and Cloud Native Application Platform Protection (CNAPP).Download PDF Course Data SheetFor more information refer to:https://success.myshn.net/Start_Here_with_Skyhigh_Security/Skyhigh_Security_Training/02_Skyhigh_Security_Instructor_Led_Training
03/09/2026 9:00AM - 03/12/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This entry-level course in threat hunting and threat intelligence provides foundational knowledge in threat hunting methodologies and techniques, including the application of information security frameworks, and threat intelligence. This course employs open-source tools to perform threat hunting and analysis in hands-on labs, touching on threat hunting use cases, hunting techniques, and key tactics.This course is part of the Trellix Cyber Operations team’s Foundations in Incident Response Education (FIRE) track of general defensive security training. Learners are provided a blend of lecture, discussions, and hands-on labs.Who Should Attend:This course is intended for incident responders, information security staff, auditors, SOC analysts, investigators, and consultants responsible for digital forensics and incident response.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
03/09/2026 9:30AM - 03/12/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 dayOverview:This course provides an in-depth look at each of these Trellix products and how they integrate. In this course, you will learn the tasks crucial to configure, administer, manage, and troubleshoot Intelligent Virtual Execution (IVX), Data Exchange Layer (DXL), and Threat Intelligence Exchange (TIE) solutions. This combined solution enables you to gain better visibility of your environment, protecting and limiting exposure to threats and vulnerabilities. This course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with the IVX, DXL, and TIE user interfaces, as well as detailed instructions for the integration of this solution. Who Should Attend:This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system administration.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
03/03/2026 9:00AM - 03/06/2026 5:00PM
Credit Hours : 32
Role :
* CPE policy and requirements can vary among different organizations. Students must self report hours to the respective organization. Hours shown is to give potential CPE hours based on hours of training