Trellix logo
Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

The Threat Report - Summer 2022
Latest Report

Our Summer 2022 threat report details the evolution of Russian cybercrime, research into medical devices and access control systems, and includes analysis of email security trends.

Critical Flaws in Widely Used Building Access Control System
Critical Flaws in Widely Used Building Access Control System

At Hardwear.io 2022, Trellix researchers disclosed 8 zero-day vulnerabilities in HID Global Mercury access control panels, allowing them to remotely unlock and lock doors, modify and configure user accounts and subvert detection from management software.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Education Services

A broad training portfolio maximizes the benefit and ROI from your solutions.

Explore and Register for Training

Product Training

  • To gain maximum value from your solutions, you need expertly trained staff to configure and manage your solutions more efficiently, and optimally safeguard your critical data. You also need your staff on-site, doing their job. Now you can have both. We offer a wide range of hands-on product training courses to help you design, set up, configure, and manage your solutions.
  • Delivered in classrooms and online, our courses help you make the most of your product investment. Browse our public instructor-led courses and see where they are offered around the world. Browse our selection of eLearning courses, available online at any time.
  • To schedule a private course for your organization or to inquire about a custom course, please contact us.

Explore and Register for Training

Security Training

  • Get comprehensive and focused in-person classroom training. Held in private classes at your location, our fully immersive training is led by our experienced security instructors and gives you the opportunity to build best practices for implementing a cybersecurity strategy.
  • Gain the skills you need to proactively defend against the latest security threats. Our comprehensive security training from top industry experts helps your IT professionals gain proficiency in best practices to implement your security strategy and better respond to incidents.
  • Our security courses provide training to help security professionals build secure software and applications, assess vulnerabilities to defend against hacker attacks, and gain critical computer forensics skills to better respond to incidents. Taught by network security experts, our security training features interactive demonstrations and hands-on lab exercises. These instructor-led courses are offered in private classrooms only.
  • To schedule please contact us.
  • Courses
    • IT Risk Strategy - Measure and Treat IT Risk Across Your Enterprise.
    • Application Security Training - Courses include: Attacking Web Applications, Attacking Android and iOS, Building Secure Software, Writing Secure Code: Java.
    • Infrastructure Security Training - Courses include: Beginning Assessment & Penetration Testing, Advanced Assessment and Penetration Testing, Attacking Wireless Technologies, Attacking Firmware, Industrial Control Security, Attacking ICS and IoT.
    • Forensics and Incident Response - Courses include: Forensics and Incident Response, Mobile Forensics: Digital Forensics on Android, iOS, and Windows Mobile, Practical Blue Teaming: Hands-on Defense.

Trellix training methods

The Trellix education services portfolio, delivered by Trellix security experts, provides comprehensive and flexible product and security training when you need it and how you need it.

Instructor-led Training

Get comprehensive and focused in-person training from experienced instructors, and connect with other security professionals.

  • Courses are held at a public site or private classes can be arranged at your location
  • Full immersive training
  • Network with other cybersecurity industry peers

eLearning Training*

Gain knowledge at your desk and on your schedule.

  • Trellix solution training on demand
  • Self-paced modules, available anytime, anywhere
  • Option of adding hands-on lab exercises for deeper learning through use case scenarios

* Available for product training only

Explore and Register for Training