VMware Carbon Black Cloud Endpoint Standard

This one-day course teaches you how to use the VMware Carbon Black Cloud Endpoint™ Standard product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies.

This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs.

Kategorier: ,

Beskrivning

This one-day course teaches you how to use the VMware Carbon Black Cloud Endpoint™ Standard product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies.

This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs.

 

Objectives

By the end of the course, you should be able to meet the following objectives:

  • • Describe the components and capabilities of VMware Carbon Black Cloud Endpoint Standard
  • • Identify the architecture and data flows for Carbon Black Cloud Endpoint Standard communication
  • • Perform searches across endpoint data to discover suspicious behavior
  • • Manage the Carbon Black Cloud Endpoint Standard rules based on organizational requirements
  • • Configure rules to address common threats
  • • Evaluate the impact of rules on endpoints
  • • Process and respond to alerts
  • • Describe the different response capabilities available from VMware Carbon Black Cloud™

 

Audience

System administrators and security operations personnel, including analysts and managers

 

Prerequisites

This course requires completion of the following course:

  • • VMware Carbon Black Cloud Fundamentals

 

Programme

1 Course Introduction

  • • Introductions and course logistics
  • • Course objectives

2 Data Flows and Communication

  • • Hardware and software requirements
  • • Architecture
  • • Data flows

3 Searching Data

  • • Creating searches
  • • Analyzing events
  • • Search operators
  • • Advanced queries

4 Policy Components

  • • Rules
  • • Local scanner
  • • Sensor capabilities

5 Prevention Capabilities Using Rules

  • • Rule types
  • • Rule creation
  • • Reputation priority
  • • Configuring rules
  • • Evaluating rule impact

6 Processing Alerts

  • • Alert triage
  • • Alert actions

7 Response Capabilities

  • • Using quarantine
  • • Using live response
  • • Hash banning

 

Kursen levereras i samarbete med

Kontakta oss om denna kurs

Ytterligare information

Kurslängd

1 dag

Lärarledd

Självstudier

Språk

Engelskt tal, material på engelska

Recensioner

Det finns inga recensioner än.

Endast inloggade kunder som har köpt denna produkt får lämna en recension.