This course teaches you how to use the VMware Carbon Black EDR product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs.

starstarstarstarstar

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

By the end of the course, you should be able to meet the following objectives:
Describe the components and capabilities of the Carbon Black EDR server
Identify the architecture and data flows for Carbon Black EDR communication
Describe the Carbon Black EDR server installation process
Manage and configure the Carbon Black EDR sever based on organizational requirements
Perform searches across process and binary information
Implement threat intelligence feeds and create watchlists for automated notifications
Describe the different response capabilities available from the Carbon Black EDR server
Use investigations to correlate data between multiple processes

1
  • Course Introduction

  • Introductions and course logistics
    Course objectives

2
  • Planning and Installation

  • Hardware and software requirements
    Architecture
    Data flows
    Server installation review
    Installing sensors

3
  • Server Administration

  • Configuration and settings
    Carbon Black EDR users and groups

4
  • Process Search and Analysis

  • Filtering options
    Creating searches
    Process analysis and events

5
  • Binary Search and Banning Binaries

  • Filtering options
    Creating searches
    Hash banning

6
  • Search best practices

  • Search operators
    Advanced queries

7
  • Threat Intelligence

  • Enabling alliance feeds
    Threat reports details
    Use and functionality

8
  • Watchlists

  • Creating watchlists
    Use and functionality

9
  • Alerts / Investigations / Response

  • Using the HUD
    Alerts workflow
    Using network isolation
    Using live response

Audience

System administrators and security operations personnel, including analysts and managers will benefit from this course.

Language

English

Prerequisites

While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training.

$850

Length: 1.0 day (8 hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...