Kod: VMW_VCBCEEDR
Czas trwania: 8 Hours (1 day)
Cena netto: zł2 100,00
This one-day course teaches you how to use the VMware Carbon Black® Cloud Enterprise EDR™ product and leverage its capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs.
This course is also available in an On Demand format.
Product Alignment
• VMware Carbon Black® EDR™
• VMware Carbon Black Cloud Endpoint™ Enterprise
By the end of the course, you should be able to meet the following objectives:
• Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR
• Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication
• Perform searches across endpoint data to discover suspicious behavior
• Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR
• Create custom watchlists to detect suspicious activity in your environment
• Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR
• Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR
• Describe the different response capabilities available from VMware Carbon Black Cloud
Security operations personnel, including analysts and managers.
This course requires completion of the following course:
• VMware Carbon Black Cloud Fundamentals
1 Course Introduction
• Introductions and course logistics
• Course objectives
2 Data Flows and Communication
• Hardware and software requirements
• Architecture
• Data flows
3 Searching Data
• Creating searches
• Search operators
• Analyzing processes
• Analyzing binaries
• Advanced queries
4 Managing Watchlists
• Subscribing
• Alerting
• Custom watchlists
5 Alert Processing
• Alert creation
• Analyzing alert data
• Alert actions
6 Threat Hunting in Enterprise EDR
• Cognitive Attack Loop
• Malicious behaviors
7 Response Capabilities
• Using quarantine
• Using live response