VMware Carbon Black Cloud Endpoint Standard

This one-day course teaches you how to use the VMware Carbon Black Cloud Endpoint™ Standard product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs.

Product Alignment

– VMware Carbon Black Cloud Endpoint Standard

– VMware Carbon Black Cloud Endpoint™ Advanced

– VMware Carbon Black Cloud Endpoint™ Enterprise

Objetivos

Describe the components and capabilities of VMware Carbon Black Cloud Endpoint Standard
Identify the architecture and data flows for Carbon Black Cloud Endpoint Standard communication
Perform searches across endpoint data to discover suspicious behavior
Manage the Carbon Black Cloud Endpoint Standard rules based on organizational requirements
Configure rules to address common threats
Evaluate the impact of rules on endpoints
Process and respond to alerts
Describe the different response capabilities available from VMware Carbon Black Cloud™

Cloud computing

Disponible en formato e-learning

Disponible en formato presencial

Disponible en formato a distancia

Subvención disponible
A través de Fundae, cumpliendo requisitos.

Duración
5 horas

  • Dificultad 50% 50%
  • Nivel alcanzado 80% 80%

Dirigido a

System administrators and security operations personnel, including analysts and managers

Conocimientos requeridos

This course requires completion of the following course:

– VMware Carbon Black Cloud Fundamentals

Temario

1 Course Introduction

Introductions and course logistics
Course objectives
2 Data Flows and Communication

Hardware and software requirements
Architecture
Data flows
3 Searching Data

Creating searches
Analyzing events
Search operators
Advanced queries
4 Policy Components

Rules
Local scanner
Sensor capabilities
5 Prevention Capabilities Using Rules

Rule types
Rule creation
Reputation priority
Configuring rules
Evaluating rule impact
6 Processing Alerts

Alert tria
ge
Alert actions
7 Response Capabilities

Using quarantine
Using live response
Hash banning

Solicita información del curso