VMware Carbon Black EDR Administrator - On Demand

Course Datasheet
- Formats: Lab, Self-Paced, Subscription
- Length: 30 Days
This course, equivalent to 1 day of training, teaches you how to use the VMware Carbon Black® EDR™ product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies.

This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs.

This course is also available in an Instructor-Led Training (ILT) format. For more information, select this link:  VMware Carbon Black EDR Administrator.

Product Alignment
•  VMware Carbon Black EDR

Objectives:    By the end of the course, you should be able to meet the following objectives:
•  Describe the components and capabilities of the Carbon Black EDR server
•  Identify the architecture and data flows for Carbon Black EDR communication
•  Describe the Carbon Black EDR server installation process
•  Manage and configure the Carbon Black EDR sever based on organizational requirements
•  Perform searches across process and binary information
•  Implement threat intelligence feeds and create watchlists for automated notifications
•  Describe the different response capabilities available from the Carbon Black EDR server
•  Use investigations to correlate data between multiple processes
Intended Audience:    System administrators and security operations personnel, including analysts and managers
Prerequisites:    There are no prerequisites for this course.
Outline:    1  Course Introduction
•  Introductions and course logistics
•  Course objectives

2  Planning and Architecture
•  Hardware and software requirements
•  Architecture
•  Data flows
•  Server installation review
•  Installing sensors

3  Server Installation & Administration
•  Configuration and settings
•  Carbon Black EDR users and groups

4  Process Search and Analysis
•  Filtering options
•  Creating searches
•  Process analysis and events

5  Binary Search and Banning Binaries
•  Filtering options
•  Creating searches
•  Hash banning

6  Search best practices
•  Search operators
•  Advanced queries

7  Threat Intelligence
•  Enabling alliance feeds
•  Threat reports details
•  Use and functionality

8  Watchlists
•  Creating watchlists
•  Use and functionality

9  Alerts / Investigations / Response
•  Using the HUD
•  Alerts workflow
•  Using network isolation
•  Using live response