VMware Carbon Black Cloud Enterprise EDR-On Demand
Code: EDU-VCBCEEDR-ELThis course, equivalent to 1 day of training, teaches you how to use the VMware Carbon Black® Cloud Enterprise EDR™ product and leverage its capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs.
This course is also available in an Instructor-Led Training (ILT) format
Objectives
By the end of the course, you should be able to meet the following objectives:
- Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR
- Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication
- Perform searches across endpoint data to discover suspicious behavior
- Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR
- Create custom watchlists to detect suspicious activity in your environment
- Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR
- Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR
- Describe the different response capabilities available from VMware Carbon Black Cloud
Intended Audience
Security operations personnel, including analysts and managers
Prerequisites
This course requires completion of the following course:
- VMware Carbon Black Cloud Fundamentals
Product Alignment
- VMware Carbon Black® EDR™
- VMware Carbon Black Cloud Endpoint™ Enterprise
Course Outline
1 Course Introduction
- Introductions and course logistics
- Course objectives
2 Data Flows and Communication
- Hardware and software requirements
- Architecture
- Data flows
3 Searching Data
- Creating searches
- Search operators
- Analyzing processes
- Analyzing binaries
- Advanced queries
4 Managing Watchlists
- Subscribing
- Alerting
- Custom watchlists
5 Alert Processing
- Alert creation
- Analyzing alert data
- Alert actions
6 Threat Hunting in Enterprise EDR
- Cognitive Attack Loop
- Malicious behaviors
7 Response Capabilities
- Using quarantine
- Using live response
Price (ex. VAT)
Duration
Schedule
Please send us a message with the form below
Delivery methods
- Classroom
- On-site (at your location)
- Virtual (instructor online)
Inquire
We will contact you to discuss your requirements