Education Services

A broad training portfolio maximizes the benefit and ROI from your solutions.

Product Training

  • To gain maximum value from your solutions, you need expertly trained staff to configure and manage your solutions more efficiently, and optimally safeguard your critical data. You also need your staff on-site, doing their job. Now you can have both. We offer a wide range of hands-on product training courses to help you design, set up, configure, and manage your solutions.
  • Our courses help you make the most of your product investment. Browse our public instructor-led courses for scheduled offerings. Browse our selection of eLearning courses, available online at any time.
  • To schedule a private course for your organization or to inquire about a custom course, please contact us.

Explore and Register for Training

Security Training

  • Get comprehensive and focused in-person classroom training. Held in private classes at your location, our fully immersive training is led by our experienced security instructors and gives you the opportunity to build best practices for implementing a cybersecurity strategy.
  • Gain the skills you need to proactively defend against the latest security threats. Our comprehensive security training from top industry experts helps your IT professionals gain proficiency in best practices to implement your security strategy and better respond to incidents.
  • Our security courses provide training to help security professionals build secure software and applications, assess vulnerabilities to defend against hacker attacks, and gain critical computer forensics skills to better respond to incidents. Taught by network security experts, our security training features interactive demonstrations and hands-on lab exercises. These instructor-led courses are offered in private classrooms only.
  • To schedule please contact us.
  • Courses
    • IT Risk Strategy - Measure and Treat IT Risk Across Your Enterprise.
    • Application Security Training - Courses include: Attacking Web Applications, Attacking Android and iOS, Building Secure Software, Writing Secure Code: Java.
    • Infrastructure Security Training - Courses include: Beginning Assessment & Penetration Testing, Advanced Assessment and Penetration Testing, Attacking Wireless Technologies, Attacking Firmware, Industrial Control Security, Attacking ICS and IoT.
    • Forensics and Incident Response - Courses include: Forensics and Incident Response, Mobile Forensics: Digital Forensics on Android, iOS, and Windows Mobile, Practical Blue Teaming: Hands-on Defense.

Trellix training methods

The Trellix education services portfolio, delivered by Trellix security experts, provides comprehensive and flexible product and security training when you need it and how you need it.

Instructor-led Training

Get comprehensive and focused in-person training from experienced instructors, and connect with other security professionals.

  • Public courses are held virtually. Private classes can be arranged to be held virtually or at your location.
  • Full immersive training.
  • Network with other cybersecurity industry peers.

eLearning Training*

Gain knowledge at your desk and on your schedule.

  • Trellix solution training on demand
  • Self-paced modules, available anytime, anywhere
  • Option of adding hands-on lab exercises for deeper learning through use case scenarios

* Available for product training only

Training for Living Security