VMware Carbon Black EDR Administrator
This one-day course teaches you how to use the VMware Carbon Black® EDR™ product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs.
Product Alignment
VMware Carbon Black EDR
Objetivos
Describe the components and capabilities of the Carbon Black EDR server
Identify the architecture and data flows for Carbon Black EDR communication
Describe the Carbon Black EDR server installation process
Manage and configure the Carbon Black EDR sever based on organizational requirements
Perform searches across process and binary information
Implement threat intelligence feeds and create watchlists for automated notifications
Describe the different response capabilities available from the Carbon Black EDR server
Use investigations to correlate data between multiple processes
Cloud computing
Disponible en formato e-learning
Disponible en formato presencial
Disponible en formato a distancia
Subvención disponible
A través de Fundae, cumpliendo requisitos.
Duración
5 horas
- Dificultad 50%
- Nivel alcanzado 80%
Dirigido a
System administrators and security operations personnel, including analysts and managers
Conocimientos requeridos
There are no prerequisites for this course.
Temario
1 Course Introduction
Introductions and course logistics
Course objectives
2 Planning and Installation
Hardware and software requirements
Architecture
Data flows
Server installation review
Installing sensors
3 Server Administration
Configuration and settings
Carbon Black EDR users and groups
4 Process Search and Analysis
Filtering options
Creating searches
Process analysis and events
5 Binary Search and Banning Binaries
Filtering options
Creating searches
Hash banning
6 Search best practices
Search operators
Advanced queries
7 Threat Intelligence
Enabling alliance feeds
Threat reports details
Use and functionality
8 Watchlists
Creating watchlists
Use and functionality
9 Alerts / Investigations / Response
Using the HUD
Alerts workflow
Using network isolation
Using live response
Comentarios recientes