Uddannelsestilbud

VMware Carbon Black Cloud Enterprise EDR

Information

Pris kr 5.590  Ekskl. moms
Varighed: 1 Dag
Ref: VMW_VCBCEEDR
Delivery Type

Sessionsdatoer

Se sessioner for andre lande
Dato Sted
  • Virtual Classroom
    kr 5.590  Ekskl. moms
Disse oplysninger findes også beregnet for intra-virksomhedsuddannelsen. Tøv ikke med at kontakte os for at få flere oplysninger

Beskrivelse


This one-day course teaches you how to use the VMware Carbon Black® Cloud Enterprise EDR™ product and leverage its capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs.

Formål


By the end of the course, you should be able to meet the following objectives:



  • • Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR

  • • Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication

  • • Perform searches across endpoint data to discover suspicious behavior

  • • Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR

  • • Create custom watchlists to detect suspicious activity in your environment

  • • Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR

  • • Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR

  • • Describe the different response capabilities available from VMware Carbon Black Cloud

Målgruppe


Security operations personnel, including analysts and managers

Forudsætninger


This course requires completion of the following course:



  • • VMware Carbon Black Cloud Fundamentals

Program


1 Course Introduction



  • • Introductions and course logistics

  • • Course objectives

2 Data Flows and Communication



  • • Hardware and software requirements

  • • Architecture

  • • Data flows

3 Searching Data



  • • Creating searches

  • • Search operators

  • • Analyzing processes

  • • Analyzing binaries

  • • Advanced queries

4 Managing Watchlists



  • • Subscribing

  • • Alerting

  • • Custom watchlists

5 Alert Processing



  • • Alert creation

  • • Analyzing alert data

  • • Alert actions

6 Threat Hunting in Enterprise EDR



  • • Cognitive Attack Loop

  • • Malicious behaviors

7 Response Capabilities



  • • Using quarantine

  • • Using live response

© 2020 VALit Aps - Arrow ECS. All rights reserved.