Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the components and capabilities of VMware Carbon Black Cloud Endpoint Standard
Identify the architecture and data flows for Carbon Black Cloud Endpoint Standard communication
Perform searches across endpoint data to discover suspicious behavior
Manage the Carbon Black Cloud Endpoint Standard rules based on organizational requirements
Configure rules to address common threats
Evaluate the impact of rules on endpoints
Process and respond to alerts
Describe the different response capabilities available from VMware Carbon Black Cloud™
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Course Introduction
- Introductions and course logistics
- Course objectives
2 - Planning and Installation
- Hardware and software requirements
- Architecture
- Data flows
- Server installation review
- Installing sensors
3 - Server Administration
- Configuration and settings
- Carbon Black EDR users and groups
4 - Process Search and Analysis
- Filtering options
- Creating searches
- Process analysis and even
5 - Binary Search and Banning Binaries
- Filtering options
- Creating searches
- Hash banning
6 - Search Best Practices
- Search operators
- Advanced queries
7 - Threat Intelligence
- Enabling alliance feeds
- Threat reports details
- Use and functionality
8 - Watchlists
- Creating watchlists
- Use and functionality
9 - Alerts/Investigations/Response
- Using the HUD
- Alerts workflow
- Using network isolation
- Using live response