Duration
1 days.
Prerequisites
This course requires completion of the following course:
- VMware Carbon Black Cloud Fundamentals
Skills Gained
By the end of the course, you should be able to meet the following objectives:
- Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR
- Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication
- Perform searches across endpoint data to discover suspicious behavior
- Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR
- Create custom watchlists to detect suspicious activity in your environment
- Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR
- Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR
- Describe the different response capabilities available from VMware Carbon Black Cloud
Who Can Benefit?
Security operations personnel, including analysts and managers
Outline for VMware Carbon Black Cloud Enterprise EDR Training
Outline
Course Introduction
- Introductions and course logistics
- Course objectives
Data Flows and Communication
- Hardware and software requirements
- Architecture
- Data flows
Searching Data
- Creating searches
- Search operators
- Analyzing processes
- Analyzing binaries
- Advanced queries
Managing Watchlists
- Subscribing
- Alerting
- Custom watchlists
Alert Processing
- Alert creation
- Analyzing alert data
- Alert actions
Threat Hunting in Enterprise EDR
- Cognitive Attack Loop
- Malicious behaviors
Response Capabilities
- Using quarantine
- Using live response
Product Alignment
- VMware Carbon Black® EDR™
- VMware Carbon Black Cloud Endpoint™ Enterprise