Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR
Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication
Perform searches across endpoint data to discover suspicious behavior
Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR
Create custom watchlists to detect suspicious activity in your environment
Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR
Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR
Describe the different response capabilities available from VMware Carbon Black Cloud
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Course Introduction
- Introductions and course logistics
- Course objectives
2 - Data Flows and Communication
- Hardware and software requirements
- Architecture
- Data flows
3 - Searching Data
- Creating searches
- Search operators
- Analyzing processes
- Analyzing binaries
- Advanced queries
4 - Managing Watchlists
- Subscribing
- Alerting
- Custom watchlists
5 - Alert Processing
- Alert creation
- Analyzing alert data
- Alert actions
6 - Threat Hunting in Enterprise EDR
- Cognitive Attack Loop
- Malicious behaviors
7 - Response Capabilities
- Using quarantine
- Using live response