Course Date


Course Rating

1 2 3 4 5


Category


Region Delivered


Product Type

See More...
See Less...

Hands on Labs


Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:This course provides a framework for administration and day-to-day use of the Trellix Email Security – Server, including deployment, configuration, basic administration, and analysis of malicious emails. Learners will triage Trellix-generated alerts and derive actionable to assess threats to their environment. The course also includes checklists, case studies, and guidance for transitioning difficult cases to the Trellix Support team. Hands-on activities provide learners with experience administering Email Security - Server, diagnosing common issues, and triaging alerts generated from malicious files and URLs in email to identify malware and other unwanted intrusions. Who Should Attend:Security analysts, incident responders, and email administrators responsible for the set up and management of Email Security – Server and who use Email Security – Server to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This course examines how to triage alerts generated by the Trellix Network Security and Endpoint Security (HX) platforms, derive actionable information from those alerts, and inspect affected endpoints using live analysis and investigation fundamentals.Hands-on activities span the entire analysis and live investigation process, beginning with a Trellix-generated alert, leading to discovery and analysis of the host for evidence of malware and other unwanted intrusion. Endpoint analysis focuses on investigation techniques using features of Endpoint Security (HX), such as the Triage Summary, Audit Viewer, and Acquisitions.Who Should Attend:Security analysts, incident responders, and threat hunters who use Network Security and Endpoint Security (HX) to detect, investigate, and prevent cyber threats..To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/08/2026 9:30AM - 06/11/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:This course examines how to triage alerts generated by Trellix Network Security, derive actionable information from those alerts, and apply the fundamentals of live analysis and investigation to investigate associated endpoints.Hands-on activities span the entire analysis and live investigation process, beginning with a Trellix-generated alert, leading to discovery and analysis of the host for evidence of malware and other unwanted intrusion. Analysis will be performed using Trellix products and freely available tools.Who Should Attend:Security analysts, incident responders, and network security professionals who use Network Security to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
08/26/2026 9:00AM - 08/28/2026 5:00PM
Credit Hours : 24
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Application and Change Control Administration course from Education Services provides in- depth training on the tools you need to efficiently install, configure, operate, and troubleshoot issues relating to TACC to safeguard intellectual property and ensure compliance. The course details how this solution uses Trellix ePolicy Orchestrator (Trellix ePO) for centralized management. It also explains how to use Application Control for dynamic allowlisting to ensure that only trusted applications run on devices servers, and desktops and how to use Change Control to monitor and prevent changes to the file system, registry, and user accounts.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
05/19/2026 9:00AM - 05/22/2026 5:00PM
Estimated Time : 32 mins
Credit Hours : 32
Role :
Skyhigh Certifications
This certification path is designed to get you demonstration ready with the Skyhigh Security SSE portfolio.
Estimated Time :
Credit Hours :
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Data Loss Prevention Endpoint Complete Administration course from Education Services provides in-depth training on the tools you need to design, implement, configure, and use Data Loss Prevention Endpoint Complete to safeguard intellectual property and ensure compliance. The course details how this solution uses Trellix ePolicy Orchestrator (Trellix ePO) software for centralized management. It also explains how to monitor and address risky, day-to-day end-user actions such as emailing, web posting, printing, clipboards, screen captures, device control, uploading to the cloud, and more. Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/01/2026 9:30AM - 06/04/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Data Loss Prevention Network Administration course from Education Services provides in-depth training on the tools you need to design, implement, configure, and use Data Loss Prevention Network to safeguard intellectual property and ensure compliance. The course details how this solution uses Trellix ePolicy Orchestrator (ePO) software for centralized management. It also explains how to monitor and address risky, day-to-day end-user actions such as emailing, web posting, printing, clipboards, screen captures, device control, uploading to the cloud, and more. Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Estimated Time : 32 mins
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:The Trellix Database Security Administration course from Education Services is an essential component to monitor and protect the Database Management System (DBMS). In hands-on lab sessions, you will learn how to deploy and configure a Database Security solution to protect the Database Management System (DBMS) from internal and external threats, as well as intra-database exploits. You can immediately apply your new skills to improve protection for your business and take full advantage of your investment in our Database Security solution.Who Should Attend: system administrators, security personnel, auditors, and/ or consultants concerned with system security.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/14/2026 9:30AM - 07/15/2026 5:00PM
Credit Hours : 16
Role :
Instructor-Led Courses
Course Length:4 daysOverview:This entry-level course in digital forensics and incident response provides foundational knowledge in incident response preparation, detection and analysis, containment, eradication, recovery, and post-incident activities, including lessons learned. This course employs open-source tools to perform triage and forensics analysis in hands-on labs, touching on the key artifacts of Microsoft Windows, Linux, and Apple macOS systems.This course is part of the Trellix Cyber Operations team’s Foundations in Incident Response Education (FIRE) track of general defensive security training. Learners are provided a blend of lecture, discussions, and hands-on labs.Who Should Attend:This course is intended for incident responders, information security staff, auditors, SOC analysts, investigators, and consultants responsible for digital forensics and incident response.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/07/2026 9:30AM - 07/10/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Drive Encryption Administration course from Education Services provides an in-depth introduction to the tasks crucial to set up and administer Drive Encryption. Drive Encryption is full disk encryption software that helps protect data on Microsoft Windows tablets, laptops, and desktop PCs to prevent the loss of sensitive data, especially from lost or stolen equipment. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with virtual lab systems, as well as detailed instructions for the integration of this solution.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security and drive encryptionTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
eLearning Courses
This entry-level course covers deployment options, basic administration, and core functionality for Trellix Central Management appliances.Who Should AttendNetwork security professionals or incident responders who must set up or work with Central Management appliances.Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 1
Role :
Course Rating
eLearning Courses,Essentials
Welcome to Trellix Data Exchange Layer 6.0 Essentials Course. This course provides an overview of the Data Exchange Layer (DXL) Product, key features, purpose, and benefits. It also provides a high-level overview of installation, configuration, management, and basic troubleshooting related to DXL.Download PDF Course Data Sheet
Estimated Time : 120 mins
Credit Hours : 2
Role :
Course Rating
eLearning Courses,Essentials
Previously known as MVISION Data Loss PreventionThrough e-learning and demonstrations, you will learn about using the tools needed to design, implement, configure, and use Trellix Data Loss Prevention- SaaS to safeguard intellectual property and ensure compliance.Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 8
Role :
Course Rating
eLearning Courses,Essentials
Through e-learning and demonstrations, you will learn about using the tools needed to design, implement, configure, and use Trellix Data Loss Prevention Endpoint Complete to safeguard intellectual property and ensure compliance.Download PDF Course Data Sheet
Estimated Time : 4 mins
Credit Hours : 4
Role :
Course Rating
eLearning Courses,Essentials
The Trellix Data Loss Prevention Network (NDLP) 11.6 Essentials course provides introduction level training on the tools you need to design, implement, configure, and use Network Data Loss Prevention to safeguard intellectual property and ensure compliance. The course details how this solution uses Trellix ePolicy Orchestrator (Trellix ePO) for centralized management. It also explains how to monitor and address day-to-day protection of email, web, and more. The course is divided into lessons. Each lesson is a combination of instructional material such as texts, videos, external links, knowledge checks, and interactive learning experiences. Please complete each lesson. Also, refer to all the documentation of this product. (Product Guide, Installation Guide, etc.)Download PDF Course Data Sheet
Estimated Time : 8 mins
Credit Hours : 8
Role :
Course Rating
eLearning Courses,Essentials
The Detection & Prevention with Trellix ENS Expert Rules course provides a comprehensive training on the capability of ENS Expert Rules.Through video lectures and interactive activities, you will learn how Expert Rules work, how to create and use them, and how to use and edit AAC-based Expert Rules.Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 3
Role :
Course Rating
eLearning Courses,Essentials
The Drive Encryption Essentials course from Education Services provides attendees with interactive training on the design, setup, configuration, and management of encryption software. In addition, students will understand how to effectively implement the software in a complex enterprise.Download PDF Course Data Sheet
Estimated Time : 2 mins
Credit Hours : 4
Role :
Course Rating
eLearning Courses
This entry-level course provides an overview of the features and detection capabilities of Trellix Email Security - Cloud. It also covers email policy and rule configuration, email quarantine and alert administration.Who Should AttendSecurity analysts and administrators responsible for the set up and management of Email Security - Cloud.Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 1
Role :
Course Rating
eLearning Courses,Essentials
This entry-level online course covers deployment options, basic administration and core functionality for Trellix Email Security - Server appliances.Who Should AttendNetwork security professionals, incident responders and Trellix administrators and analysts who must set up or work with a Trellix Email Security appliance.Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 1
Role :
Course Rating
eLearning Courses,Essentials
The Trellix EDR Essentials course from Education Services provides instruction on the design, setup, configuration, and management of this application. In addition, students will learn how to effectively leverage Trellix EDR in their environment. This course is roughly four hours in length.Download PDF Course Data Sheet
Estimated Time : 4 mins
Credit Hours : 4
Role :
Course Rating
eLearning Courses,Essentials
This course provides an introduction to Trellix Endpoint Security (HX). Trellix Endpoint Security (HX) performs fast, targeted forensic investigations across thousands of endpoints. It prevents cyber-attacks on the endpoint, detects malware and other signs of compromise, and allows customers to respond to endpoint security incidents faster.<br><br><div><span style="color: inherit;"><a href="https://www.trellix.com/assets/course-descriptions/cd-endpoint-security-hx-essentials-introduction.pdf" target="_blank">Download PDF Course Data Sheet</a></span></div>
Estimated Time :
Credit Hours : 1
Role :
Course Rating
eLearning Courses
This entry-level course covers core functionalityof Trellix Endpoint Security (HX), including features, operational workflows, alert analysis, and containment.Who Should AttendAnalysts and Incident Responders who use Trellix Endpoint Security (HX).Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 2.5
Role :
Course Rating
eLearning Courses
This entry-level course covers deployment options, basic administration and core functionality for Trellix Endpoint Security (HX).Who Should AttendSystem Administrators and security professionals who must set up and work with Trellix Endpoint Security (HX).Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 2.5
Role :
Course Rating
eLearning Courses,Essentials
This course provides an overview of the ePolicy Orchestrator (ePO) Product, key features, purpose, and benefits. You will also learn how to install, configure, operate, and troubleshoot issues relating to ePO.Download PDF Course Data Sheet
Estimated Time : 6 mins
Credit Hours : 6
Role :
eLearning Courses
This entry-level course covers deployment options, basic administration, and core functionality for Trellix File Protect appliances.Who Should AttendNetwork security professionals or incident responders who must set up or work with File Protect appliances.Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 1
Role :
Course Rating
eLearning Courses,Essentials
The Helix Essentials course from Education Services provides an overview of the Trellix Helix, key features, purpose, and benefits. It also provides a high-level overview of deployment, installation, and configuration of Helix along with basic troubleshooting guidance.<div><div><font face="verdana"><a href="https://www.trellix.com/en-us/assets/course-descriptions/cd-trellix-policy-auditor-essentials.pdf"><br></a></font></div><div><font face="verdana"><a href="https://www.trellix.com/assets/course-descriptions/cd-helix-essentials.pdf" target="_blank">Download PDF Course Description</a></font></div></div>
Estimated Time :
Credit Hours : 1
Role :
Course Rating
eLearning Courses,Essentials
The Trellix Intelligent Sandbox 5.2 Essentials course from Education Services provides attendees with an overview of Trellix Intelligent Sandbox (TIS), its key features, purpose, and benefits. It also provides a high-level overview of installation and configuration of Trellix Intelligent Sandbox along with basic management and troubleshooting guidance.Download PDF Course Data Sheet
Estimated Time : 3 mins
Credit Hours : 4
Role :
Course Rating
eLearning Courses,Essentials
Formerly known as Network Security Platform (NSP) 10.1 Essentials.The purpose of this course is to introduce the basic uses, architecture, configuration, maintenance and troubleshooting techniques available.Download PDF Course Datasheet
Estimated Time : 6 mins
Credit Hours : 6
Role :
Course Rating
eLearning Courses,Essentials
Welcome to Trellix Intrusion Prevention System Essentials: Introduction course. This course introduces us to Trellix Intrusion Prevention System (IPS) as the Next Generation Intrusion Detection and Prevention System (IDPS). This course helps the learners understand, Trellix IPS key features, its purpose, usage and benefits. This course is packaged with videos, reference links to informative Trellix portals, useful links to related product documentation, and a course exam.Download PDF Course Data Sheet
Estimated Time : 1 mins
Credit Hours : 1
Role :
Course Rating
eLearning Courses
This entry-level course covers deployment options, basic administration, and core functionality for Trellix Malware Analysis appliances.Who Should AttendNetwork security professionals or incident responders who must set up or work with Malware Analysis appliances.Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 1
Role :
Course Rating
eLearning Courses,Essentials
This course will provide a background in interface and functions of Management for Optimized Virtual Environments AntiVirus (MOVE AntiVirus). Topics covered in this course include general information about the product, setup and configuration, rules and policies used in MOVE AntiVirus, and some troubleshooting tips for the product.Download PDF Course Data Sheet
Estimated Time : 3 mins
Credit Hours : 3
Role :
Course Rating
eLearning Courses,Essentials
In the Network Detection and Response (NDR) Essentials: Deployment course, participants will gain an understanding of how to deploy Trellix® NDR with Network Investigator (NI) and NDR sensors including Network Security (NX), Packet Capture (PX), and Intrusion Prevention System (IPS). The course covers standard network deployment scenarios with a focus on NDR products and sensors.<div><span style="color: inherit;"><br></span></div><div><span style="color: inherit;"><a href="https://www.trellix.com/assets/course-descriptions/cd-ndr-essentials-deployment-elt.pdf" target="_blank">Download PDF Course Data Sheet</a></span></div>
Estimated Time :
Credit Hours : 0.75
Role :
Course Rating
eLearning Courses,Essentials
In the Network Detection and Response (NDR) Essentials: Introduction course, participants will explore the fundamentals of Trellix NDR, including an introduction to Network Investigator (NI), NDR Detection Engines, and NDR sensors like Trellix Network Security (NX), Packet Capture (PX), and Intrusion Prevention System (IPS). This course highlights key features, functions, and advantages of these products within the Trellix NDR framework.<div><span style="color: inherit;"><br></span></div><div><span style="color: inherit;"><a href="https://www.trellix.com/assets/course-descriptions/cd-ndr-essentials-introduction-elt.pdf" target="_blank">Download PDF Course Data Sheet</a></span></div>
Estimated Time :
Credit Hours : 0.75
Role :
Course Rating
eLearning Courses
This entry-level course covers deployment options, basic administration, and configuration of the integrated Trellix technologies for the Trellix Network Forensics appliances—Trellix Packet Capture and Trellix Investigation Analysis.Who Should AttendNetwork security professionals who administer and operate Trellix Packet Capture and Investigation Analysis appliances and integrate them with other Trellix technologies.Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 1.5
Role :
Course Rating
eLearning Courses
This entry-level online course covers deployment options, basic administration and core functionality for Trellix Network Security appliances.Who Should AttendNetwork security professionals, incident responders and Trellix administrators and analysts who install or manage a Trellix Network Security appliance.Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 1
Role :
Course Rating
eLearning Courses,Essentials
This is the essentials-level course for the Trellix Policy Auditor (TPA) 6.5.5 product. This course provides an overview of Trellix Policy Auditor, key features, purpose, and benefits. It also provides a high-level overview of deployment, installation, and configuration of Trellix Policy Auditor along with basic troubleshooting guidance.Download PDF Course Description
Estimated Time :
Credit Hours : 4
Role :
Course Rating
eLearning Courses,Essentials
Formally known as MVISION EndpointThis course provides an overview of Trellix Protection for Native Security, key features, purpose, and benefits. It also provides a high-level overview of deployment, installation, and configuration of Trellix Protection for Native Security along with basic troubleshooting guidance.The course is divided into lessons. Each lesson is a combination of instructional material, videos, external links.Download PDF Course Data Sheet
Estimated Time : 3 mins
Credit Hours : 2
Role :
Course Rating
Skyhigh Courses
The Skyhigh Secure Web Gateway for Cloud Fundamentals course is designed to introduce you to the concepts, architecture, user interface, and administration of the Secure Web Gateway (SWG) product. You will learn how to create web policies, how to perform web gateway setup in the Skyhigh Security Cloud platform, and how to analyze web traffic and malware. Skyhigh Security products and capabilities explained in this course include the Skyhigh Security Cloud Platform, Secure Web Gateway, Remote Browser Isolation (RBI), Cloud Firewall, and Private Access (ZTNA). Each of these products and capabilities are integral to the Skyhigh Security Service Edge (SSE) product and security philosophy.This eLearning course includes open topic navigation which allows students to move freely between any topics of interest to them at any time. Also, Skill Practice activities are included to help students practice the skills and concepts learned in their own Skyhigh Security environment. Course progress is saved each time a student exits the course, so it does not have to be completed in a set time limit or within one session. Completion of the course is awarded when all topics are reviewed.IMPORTANT: The course will be updated as new Skyhigh Security Cloud features are added. Check back later to learn more about how to configure and use features in new releases.Download Course Description Datasheet PDF
Estimated Time :
Credit Hours : 2
Role :
Course Rating
Skyhigh Courses
The Skyhigh Secure Web Gateway Fundamentals For On Premise Appliances course is designed to introduce you to the concepts, architecture, user interface, and administration of the Secure Web Gateway (SWG) product. This course is focused only on the appliance-based version of SWG and does not include SWG administered on the Skyhigh Security Cloud platform. The course uses a combination of text, graphics, demonstrations, and interactive content that give you detailed instructions for the integration of this product.This eLearning course includes open topic navigation which allows students to move freely between any topics of interest to them at any time. Course progress is saved each time a student exits the course so it does not have to be completed in a set time limit or within one session. Completion of the course is awarded when all topics are reviewed.Download Course Description Datasheet PDF
Estimated Time :
Credit Hours : 2
Role :
Course Rating
eLearning Courses,Essentials
Formally known as McAfee Security for Microsoft ExchangeThis course provides an overview of Trellix Security for Microsoft Exchange, its key features, purpose, and benefits. It also provides a high-level overview of deployment, installation, and configuration along with basic troubleshooting guidance.Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 6
Role :
Course Rating
Skyhigh Courses
The Skyhigh Security Cloud Fundamentals course is designed to introduce you to the concepts, architecture, user interface, and administration of Skyhigh Security Cloud and associated products. Skyhigh Security products and capabilities explained in this course include the Skyhigh Security Cloud Platform, Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), Infrastructure as a Service (IAAS), Software as a Service (SAAS), Shadow IT, and Cloud Native Application Protection Platform (CNAPP). Each of these products and capabilities are integral to the Security Service Edge (SSE) product and security philosophy.This eLearning course includes open topic navigation which allows students to move freely between any topics of interest to them at any time. Also, Skill Practice activities are included to help students practice the skills and concepts learned in their own Skyhigh Security environment. Course progress is saved each time a student exits the course. Completion of the course is awarded when all topics are reviewed.IMPORTANT: The course will be updated as new Skyhigh Security Cloud features are added. Check back later to learn more about how to configure and use features in new releases.Download Course Description Datasheet PDF
Estimated Time :
Credit Hours : 5
Role :
Course Rating
eLearning Courses,Essentials
Formally known as TIE for MVISION ePOThe Threat Intelligence Exchange in Trellix ePO - SaaS Essentials course from Education Services provides attendees with training on the functionality, key features, installation, configuration, and use of TIE in Trellix ePO - SaaS..Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 2
Role :
Course Rating
eLearning Courses,Essentials
This course provides an overview of the Trellix Agent(TA) Product, key features, purpose, and benefits. It also provides a high-level overview of deployment, installation, and configuration of Trellix Agent along with basic troubleshooting guidance.Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 4
Role :
Course Rating
eLearning Courses,Essentials
This course provides attendees with an understanding of how to access and use the Trellix Marketplace, Trellix Developer Portal, and Trellix Application Programming Interface (API).Download PDF Course Data Sheet
Estimated Time :
Credit Hours : 2
Role :
Course Rating
eLearning Courses
Formally known as vNSP for AzureWelcome to Trellix Virtual Intrusion Prevention System for Azure Essentials Course. This course provides an overview of the Trellix Virtual Intrusion Prevention System for Azure Product, key features, purpose, and benefits. It also provides a high-level overview of the deployment, installation, and configuration of Trellix Virtual Intrusion Prevention System for Azure along with basic troubleshooting guidance.Download PDF Course Data Sheet
Estimated Time : 35 mins
Credit Hours : 3.5
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:The Trellix Endpoint Detection and Response Administration course from Education Services prepares SOC Analysts to understand, communicate, and use the features provided by Endpoint Detection and Response (EDR). Trellix EDR helps to manage the high volume of alerts, empowering analysts of all skill levels to do more and investigate more effectively. Through hands-on lab exercises, you will learn how to detect advanced device threats, fully investigate, and quickly respond.Who Should Attend:Analysts and/or Engineers responsible for configuration, management, and monitoring activity on their systems, networks, databases and applications using the EDR solutionTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
05/20/2026 9:00AM - 05/21/2026 5:00PM
Estimated Time : 16 mins
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Endpoint Security - SaaS with Trellix ePolicy Orchestrator - SaaS Administration course from Education Services provides an in-depth introduction to the tasks crucial to set up and administer Endpoint Security - SaaS in an ePO - SaaS managed customer environment. Endpoint Security - SaaS leverages and enhances built-in Windows 10 Windows Defender security with advanced protection for Windows 10 and Windows Server 2016 and newer systems. ePO - SaaS is a SaaS-based centralized security management console that enables management of Microsoft Defender along with Trellix security products. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the Endpoint Security - SaaS policies in the ePO - SaaS user interface, as well as detailed instructions for the integration of this solution.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with administering Endpoint Security - SaaS on ePO - SaaSTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/23/2026 9:00AM - 06/26/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Endpoint Security Administration course from Education Services provides an in-depth introduction to the tasks crucial to set up and administer Endpoint Security.Endpoint Security combines Threat Prevention, Adaptive Threat Protection, Firewall, and Web Control to take immediate action against potentially dangerous applications, downloads, websites, and files. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the Endpoint Security user interface and policies, as well as detailed instructions for the integration of this solution.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
05/05/2026 9:00AM - 05/08/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:5 daysOverview:Endpoint Security ENS Expert Rules Creation Advancedcourse from Education Services provides insights into our proprietary syntaxes and an advanced view into Operating System concepts and references needed to better understand how ENS works. Building on the ENS Platform, ENS-Expert rules allow the advanced ENS administrator to add deeper security to their ENS deployment. This course helps administrators fully comprehend how ENS Expert Rules can provide a more customized and secure environment.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 40
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides a framework for administration and diagnostics of the Trellix Endpoint Security (HX) server and the Trellix xAgent. The course introduces deployment, configuration and basic administration for Trellix Endpoint Security (HX), and includes checklists, case studies and guidance for transitioning difficult cases to the Trellix Support team. Optional modules include Trellix core hardware and virtual appliances. Hands-on activities provide learners with experience administering the appliance and diagnosing common issues.Who Should Attend:System administrators responsible for implementing and maintaining the Endpoint Security (HX) server and endpoint agent (xAgent).To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/08/2026 9:30AM - 06/08/2026 5:00PM
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix ePolicy Orchestrator – On-prem Administration course enables attendees to receive in-depth training on the benefits of the centralized management and deployment of products using ePolicy Orchestrator (ePO) - On-prem software. Enabling administrators to fully understand the capabilities of their security solution not only reduces the risks of misconfiguration, but also ensures that an organization gets the maximum protection from installation.This course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with all user interfaces.Who Should Attend:This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with Networking and System administration.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
07/07/2026 9:00AM - 07/10/2026 5:00PM
Estimated Time : 32 mins
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix ePolicy Orchestrator - On-prem Advanced Topics course from Education Services provides in-depth training on the advanced capabilities of ePolicy Orchestrator (ePO) - On-prem software. Through lecture, hands-on labs, and class discussions, you will learn how to use ePO advanced capabilities and practice using tools for upgrades and migrations, monitoring, maintenance and troubleshooting, and advanced policy configuration.Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with network and system securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/23/2026 9:30AM - 06/26/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:This course covers the Trellix Helix workflow, triaging Helix alerts, creating and scoping cases from an alert, and using Helix during an investigation.Hands-on activities include configuring data sources, writing TQL searches, as well as analyzing and validating Helix alerts. Who Should Attend:Network security professionals, incident responders and Trellix administrators and analysts who use Helix to analyze data in noisy event streams. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Intelligent Sandbox with DXL and TIE Administration course from Education Services provides an in-depth look at each of the products and how they integrate. In this course, you will learn the tasks crucial to set up, administer, and manage Trellix Intelligent Sandbox (TIS), Data Exchange Layer (DXL), and Threat Intelligence Exchange (TIE) solutions. This combined solution enables you to gain better visibility of your environment, protecting and limiting exposure to threats and vulnerabilities. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the TIS, DXL, and TIE user interfaces, as well as detailed instructions for the integration of this solution. Who Should Attend:system and network administrators, security personnel, auditors, and/or consultants concerned with network and system securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides an in-depth look at Trellix Intelligent Virtual Execution (IVX) - Server. In this course, you will learn the tasks crucial to configure, administer, and manage IVX - Server. You will also learn how to submit malware for analysis and how IVX integrates with other Trellix products, enabling you to gain better visibility of your environment, protecting and limiting exposure to threats and vulnerabilities. This course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with user interfaces. Who Should Attend:This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system administration.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
08/12/2026 9:00AM - 08/12/2026 5:00PM
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix Network Security Platform Administration course from Education Services is an essential component of implementing a successful intrusion prevention strategy. In hands-on lab sessions, you’ll learn how to deploy and configure a Network Security Platform solution to protect against real-world attacks. You can immediately apply your new skills to improve protection for your business and take full advantage of your investment in our Trellix Network Security Platform.Who Should Attend:system and network administrators, security personnel, auditors, and/ or consultants concerned with network and system securityTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides an overview of Trellix Email Security – Cloud core functionality and covers administration procedures and alert analysis.Hands-on activities include rule/policy creation, alert generation, and the breakdown and analysis of information found in a Trellix email alert that is used in incident reporting.Who Should Attend:This course is intended for analysts (primary) and administrators responsible for the setup and management of Email Security – Cloud and use Email Security – Cloud to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:3 daysOverview:This course examines how to triage Trellix-generated alerts, derive actionable information from those alerts, and inspect affected endpoints using live analysis and investigation fundamentals.Hands-on activities span the entire analysis and live investigation process, beginning with a Trellix-generated alert, leading to discovery and analysis of the host for evidence of malware and other unwanted intrusion. Endpoint analysis focuses on investigation techniques using features of Endpoint Security (HX), such as the Triage Summary, Audit Viewer, and Acquisitions. Who Should Attend:Security analysts, incident responders, and threat hunters who use Endpoint Security (HX) to detect, investigate, and prevent cyber threats.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
06/09/2026 9:30AM - 06/11/2026 5:00PM
Credit Hours : 24
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This course covers the XDR workflow, including configuring data sources through extended detection via Trellix Helix, Trellix Network Security, and Trellix Endpoint Security (HX). Learners triage Trellix-generated alerts, derive actionable information from those alerts, and inspect affected endpoints using live analysis and investigation fundamentals.Hands-on activities include writing TQL searches, creating rules, analyzing and validating alerts from Helix, Network Security, and Endpoint Security (HX), deep analysis of endpoint data collections, and response actions through Endpoint Security (HX) such as collecting data from across the enterprise and containing endpoints. Who Should Attend:Security analysts, incident responders, and threat hunters who use Helix, Network Security and Endpoint Security (HX) to detect, investigate, and prevent cyber threats. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This entry-level course in malware analysis provides foundational knowledge in malware history, safe malware sample handling, analysis methodologies and techniques, sandboxing, triage, and countermeasures. This course employs open-source tools in hands-on labs to analyze samples including packed executables, cross-platform, Office, PDF and more.This course is part of the Trellix Cyber Operations team’s Foundations in Incident Response Education (FIRE) track of general defensive security training. Learners are provided a blend of lecture, discussions, and hands-on labs.Who Should Attend:This course is intended for incident responders, information security staff, auditors, SOC analysts, investigators, and consultants responsible for digital forensics and incident response.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
09/01/2026 9:30AM - 09/04/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides a framework for administration and diagnostics, including deployment, configuration and basic administration, of one or more of the following Trellix appliances: Network Security, Email Security - Server, File Protect, Malware Analysis, and Central Management.The course includes checklists, case studies, lab challenges and guidance for transitioning difficult cases to the Trellix Support team.Hands-on activities provide learners with experience administering these appliances and diagnosing common issues. Who Should Attend:System administrators responsible for implementing and maintaining one or more of the following Trellix appliances: Network Security, Email Security - Server, File Protect, Malware Analysis, and Central Management. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides an overview of the Network Detection and Response Solution and discusses the NDR console. The course focuses on how NDR can integrate with Network sensors, Packet Capture (PX), Network Security (NX) and Intrusion Prevention System (IPS). The course provides an overview of each appliance,  their standard network deployments, and how they function within the NDR system. This course also reviews NDR’s integration with other Trellix products like, SIEM, ePO, and Tenable Security. It discusses how Trellix NDR with Trellix Wise leverages AI agents to detect and disrupt attacker activity, and accelerate investigation and response. This course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with all user interfaces.Who Should Attend:This course is intended for system and network administrators, security personnel, auditors, and/ or consultants concerned with Networking and System administration.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
09/09/2026 9:00AM - 09/11/2026 5:00PM
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:2 daysOverview:This course covers the fundamentals and concepts of Network Traffic Analysis. It is designed to help Network Analysts learn how to search, filter, analyze, reconstruct, and preserve network traffic, and to apply techniques to conduct a network forensics investigation using the Network Detection and Response (NDR) solution. The course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with all user interfaces.Who Should Attend:Network security professionals and incident responders who use Trellix Packet Capture and Investigation Analysis appliances to analyze cyber threats through packet data.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This entry-level course covers deployment options, basic administration, and configuration of the integrated Trellix technologies for the Trellix Network Forensics appliances—Packet Capture and Investigation Analysis. Hands-on activities include post-installation tasks, system health checks, pairing a Packet Capture appliance with the Investigation Analysis system, daily system administration tasks, configuring Event Based Capture, and integration of another Trellix system for alerts.Who Should Attend:Network security professionals and system administrators who operate and administer Trellix Packet Capture and Investigation Analysis appliances and integrate them with other Trellix technologies.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Course Rating
Instructor-Led Courses
Course Length:1 dayOverview:This course provides a framework for administration and diagnostics, including deployment, configuration and basic administration, of Trellix Network Security. The course includes checklists, case studies, lab challenges and guidance for transitioning difficult cases to the Trellix Support team.Hands-on activities provide learners with experience administering Trellix Network Security and diagnosing common issues. Who Should Attend:System administrators responsible for implementing and maintaining Network Security appliances. To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 8
Role :
Vouchers : 44
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix SIEM course from Education Services prepares Trellix SIEM engineers and analysts to understand, communicate, and use the features provided by Trellix Enterprise Security Manager. Trellix SIEM provides near real-time visibility into the activity on all your systems, networks, databases, and applications, enabling you to detect, correlate, and remedy threats in minutes across your entire IT infrastructure. Through hands-on lab exercises, you will learn how to optimize the Trellix Enterprise Security Manager by using Trellix-recommended best practices and methodologies.Who Should Attend:Enterprise Security Manager users, responsible for monitoring activity on systems, networks, databases, applications, and for configuration and management of the Enterprise Security Manager To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:The Trellix SIEM Advanced course from Education Services prepares Trellix SIEM engineers and analysts to understand, communicate, and use the features provided by Enterprise Security Manager. Trellix Enterprise Security Manager—the heart of our Security Information and Event Management (SIEM) solution—provides near real-time visibility into the activity on all your systems, networks, databases, and applications, enabling you to detect, correlate, and remedy threats in minutes across your entire IT infrastructure. This course prepares Trellix SIEM engineers and analysts to understand, communicate, and use the features provided by Enterprise Security Manager. Through demonstration, explanation, and hands-on lab exercises, you will learn how to utilize the Enterprise Security Manager by using Trellix-recommended best practices and methodologies. Who Should Attend:Enterprise Security Manager users, responsible for monitoring activity on systems, networks, databases, applications, and for configuration and management of the Enterprise Security ManagerTo learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Skyhigh Courses
This 2-day training covers advanced administration of Secure Web Gateway Cloud. Modules focus on: threat and data protection - Mowgli Code, Shadow IT, RBI, DLP Web Policy, platform operations -Incidents, Analytics, and advanced features - Cloud Firewall, Private Access, Skyhigh Mobile Client. It is a prerequisite that participants have completed the SWG Cloud Basic course.
05/20/2026 9:00AM - 05/21/2026 5:00PM
Credit Hours : 16
Role :
Course Rating
Skyhigh Courses
This two-day, hands-on course provides a foundational and practical guide to administering the Secure Web Gateway (SWG) within the Skyhigh Security Service Edge (SSE) platform. This course delivers a deep understanding of core SSE principles and architecture, and the deployment and configuration of the Cloud Connector for essential integrations like Active Directory and SIEM are covered. Management of Skyhigh Client Proxy (SCP) for endpoint traffic redirection is mastered. A major focus is placed on configuring the Web Policy—including rule sets for Global Bypass and Global Block—and implementing HTTPS Scanning with proper Certificate Authority (CA) management. The course is designed to equip administrators with the skills to effectively enhance visibility, limit threat exposure, and utilize built-in reporting and troubleshooting tools.
05/18/2026 9:00AM - 05/19/2026 5:00PM
Credit Hours : 16
Role :
Course Rating
Skyhigh Courses
The Skyhigh Secure Web Gateway Administration for On Premise Appliances course from Skyhigh Security provides an in-depth introduction to the tasks crucial to setting up and administering Secure Web Gateway (SWG) effectively. The course combines lectures and practical hands on lab exercises. It provides details instructions on the integration of this product with a customer security environment. This course covers only the on premise appliance version of SWG. SWG on the Skyhigh Security Cloud platform is not covered.Download PDF Course Data SheetFor more information refer to:https://success.myshn.net/Start_Here_with_Skyhigh_Security/Skyhigh_Security_Training/02_Skyhigh_Security_Instructor_Led_Training
05/25/2026 9:00AM - 05/28/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Skyhigh Courses
The Secure Web Gateway on Cloud Administration course provides in-depth training on Skyhigh Security Cloud and related cloud products. The course covers on configuration and administration of critical Security Service Edge (SSE) functions. It also walks through the components to help participants identify, define, and apply product features based on use case scenarios. Products and capabilities covered in this course include the Cloud platform, Skyhigh Secure Web Gateway (SWG), Cloud Firewall, Data Loss Prevention (DLP), Infrastructure as A Service (IAAS), Software as a Service (SAAS), Remote Browser Isolation(RBI), and Private Access (ZTNA).Download PDF Course Data SheetFor more information refer to:https://success.myshn.net/Start_Here_with_Skyhigh_Security/Skyhigh_Security_Training/02_Skyhigh_Security_Instructor_Led_Training
04/20/2026 9:00AM - 04/23/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Skyhigh Courses
This 2-day advanced course provides in-depth technical training on the Secure Web Gateway On-prem platform, focusing on sophisticated security configurations and administration.Participants will master complex topics such as HTTPS scanning, Authentication and Account Management, and Remote Browser Isolation (RBI) to enhance network security.The curriculum covers critical infrastructure components including Reverse Proxy, ICAP integration, and Central Management for streamlined enterprise-scale operations.Through hands-on virtual labs, students will gain practical experience in malware scanning, Data Loss Prevention (DLP), and detailed logging using Content Security Reporter. Designed for experienced administrators, this course introduces concepts of SWG Cloud and SWG hybrid to effectively mitigate modern web-based threats.
05/13/2026 9:00AM - 05/14/2026 5:00PM
Credit Hours : 16
Role :
Course Rating
Skyhigh Courses
This 2-day Secure Web Gateway  On-prem hands-on course includes an overview of the solution, planning, installation, and system configuration of the Secure Web Gateway (SWG). The course focuses on policy construction, including GTI, URL Filtering, Malware Scanning, and Media Type Filtering. It also covers Authentication, Account Management, and HTTPS Scanning, Web Caching, Next Hop Proxies, Progress and Block Pages, and Central Management. The training concludes with sessions on Logging, Dashboards and Reporting, Basic Troubleshooting, and SWG Cloud and Hybrid Fundamentals.
05/11/2026 9:00AM - 05/12/2026 5:00PM
Credit Hours : 16
Role :
Course Rating
Skyhigh Courses
The Skyhigh Security Cloud Administration course provides in-depth training on Skyhigh Security Cloud and related cloud products. This four day course covers on configuration and administration of critical Skyhigh Security Cloud functions. It also walks through the components to help participants identify, define, and refine use cases based on specific scenarios. Products and capabilities covered in this course include the Skyhigh Security Cloud platform, Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), Infrastructure as a Service (IAAS), Software as a Service (SAAS), Shadow IT, and Cloud Native Application Platform Protection (CNAPP).Download PDF Course Data SheetFor more information refer to:https://success.myshn.net/Start_Here_with_Skyhigh_Security/Skyhigh_Security_Training/02_Skyhigh_Security_Instructor_Led_Training
07/13/2026 9:00AM - 07/16/2026 5:00PM
Credit Hours : 32
Role :
Course Rating
Skyhigh Courses
This 2-day course is designed to cover essential topics from foundational cloud concepts to advanced security measures. The course provides a base by covering a Cloud Overview, Classifying Data, Data Leakage Prevention, and Data Security Posture Management and  delves deeper into specialized areas, including Cloud Access Protection, Analytics, Cloud Security Posture Management, Incident handling, and a dedicated module on Advanced Topics, ensuring participants gain a thorough understanding of both proactive security defenses and reactive incident management within the Skyhigh Security Cloud environment.
04/29/2026 9:00AM - 04/30/2026 5:00PM
Credit Hours : 16
Role :
Course Rating
Skyhigh Courses
This two-day, hands-on training course is designed to provide students with a foundational understanding of the Skyhigh Security Cloud. It covers essential administration tasks, including navigating the cloud interface, connecting and classifying services, and managing shadow IT. The course delves into core security concepts like Data Leakage Prevention and Threat Protection, including Anomaly detection, Incident Response, and On-demand Scans. The course focuses on the use of the platform's built-in Analytics and Dashboard for effective monitoring and reporting.
04/27/2026 9:00AM - 04/28/2026 5:00PM
Credit Hours : 16
Role :
Course Rating
Instructor-Led Courses
Course Length:4 daysOverview:This entry-level course in threat hunting and threat intelligence provides foundational knowledge in threat hunting methodologies and techniques, including the application of information security frameworks, and threat intelligence. This course employs open-source tools to perform threat hunting and analysis in hands-on labs, touching on threat hunting use cases, hunting techniques, and key tactics.This course is part of the Trellix Cyber Operations team’s Foundations in Incident Response Education (FIRE) track of general defensive security training. Learners are provided a blend of lecture, discussions, and hands-on labs.Who Should Attend:This course is intended for incident responders, information security staff, auditors, SOC analysts, investigators, and consultants responsible for digital forensics and incident response.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
Course Rating
Instructor-Led Courses
Course Length:4 dayOverview:This course provides an in-depth look at each of these Trellix products and how they integrate. In this course, you will learn the tasks crucial to configure, administer, manage, and troubleshoot Intelligent Virtual Execution (IVX), Data Exchange Layer (DXL), and Threat Intelligence Exchange (TIE) solutions. This combined solution enables you to gain better visibility of your environment, protecting and limiting exposure to threats and vulnerabilities. This course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with the IVX, DXL, and TIE user interfaces, as well as detailed instructions for the integration of this solution. Who Should Attend:This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system administration.To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.Download PDF Course Data Sheet
Credit Hours : 32
Role :
* CPE policy and requirements can vary among different organizations. Students must self report hours to the respective organization. Hours shown is to give potential CPE hours based on hours of training