Arrow Electronics, Inc.

VMware Carbon Black Cloud Enterprise EDR


DURACIÓN: 8 Hours (1 dia)

Precio: A consultar


This one-day course teaches you how to use the VMware Carbon Black® Cloud Enterprise EDR™ product and leverage its capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs.

Product Alignment
•  VMware Carbon Black® EDR™
•  VMware Carbon Black Cloud Endpoint™ Enterprise


By the end of the course, you should be able to meet the following objectives:
•  Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR
•  Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication
•  Perform searches across endpoint data to discover suspicious behavior
•  Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR
•  Create custom watchlists to detect suspicious activity in your environment
•  Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR
•  Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR
•  Describe the different response capabilities available from VMware Carbon Black Cloud


Security operations personnel, including analysts and managers

Requisitos Previos

This course requires completion of the following course:
•  VMware Carbon Black Cloud Fundamentals


1  Course Introduction
•  Introductions and course logistics
•  Course objectives

2  Data Flows and Communication
•  Hardware and software requirements
•  Architecture
•  Data flows

3  Searching Data
•  Creating searches
•  Search operators
•  Analyzing processes
•  Analyzing binaries
•  Advanced queries

4  Managing Watchlists
•  Subscribing
•  Alerting
•  Custom watchlists

5  Alert Processing
•  Alert creation
•  Analyzing alert data
•  Alert actions

6  Threat Hunting in Enterprise EDR
•  Cognitive Attack Loop
•  Malicious behaviors

7  Response Capabilities
•  Using quarantine
•  Using live response

Fechas Programadas