VMware Carbon Black EDR Administrator - On Demand
Summary: |
- Formats:
Lab,
Self-Paced,
Subscription
- Length: 30 Days
Overview:
This course, equivalent to 1 day of training, teaches you how to use the VMware Carbon Black® EDR™ product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies.
This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs. This course is also available in an Instructor-Led Training (ILT) format. For more information, select this link: VMware Carbon Black EDR Administrator. Product Alignment • VMware Carbon Black EDR |
|
Objectives: | By the end of the course, you should be able to meet the following objectives: • Describe the components and capabilities of the Carbon Black EDR server • Identify the architecture and data flows for Carbon Black EDR communication • Describe the Carbon Black EDR server installation process • Manage and configure the Carbon Black EDR sever based on organizational requirements • Perform searches across process and binary information • Implement threat intelligence feeds and create watchlists for automated notifications • Describe the different response capabilities available from the Carbon Black EDR server • Use investigations to correlate data between multiple processes |
|
Intended Audience: | System administrators and security operations personnel, including analysts and managers | |
Prerequisites: | There are no prerequisites for this course. | |
Outline: | 1 Course Introduction • Introductions and course logistics • Course objectives 2 Planning and Architecture • Hardware and software requirements • Architecture • Data flows • Server installation review • Installing sensors 3 Server Installation & Administration • Configuration and settings • Carbon Black EDR users and groups 4 Process Search and Analysis • Filtering options • Creating searches • Process analysis and events 5 Binary Search and Banning Binaries • Filtering options • Creating searches • Hash banning 6 Search best practices • Search operators • Advanced queries 7 Threat Intelligence • Enabling alliance feeds • Threat reports details • Use and functionality 8 Watchlists • Creating watchlists • Use and functionality 9 Alerts / Investigations / Response • Using the HUD • Alerts workflow • Using network isolation • Using live response |
|