VMware Carbon Black Cloud Enterprise EDR (VCBCEEDR)

 

Course Overview

This one-day course teaches you how to use the VMware Carbon Black® Cloud Enterprise EDR™ product and leverage its capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs.

Product Alignment
  • VMware Carbon Black® EDR™
  • VMware Carbon Black Cloud Endpoint™ Enterprise

Who should attend

Security operations personnel, including analysts and managers

Certifications

This course is part of the following Certifications:

Prerequisites

This course requires completion of the following course:

  • VMware Carbon Black Cloud Fundamentals

Course Objectives

By the end of the course, you should be able to meet the following objectives:

  • Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR
  • Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication
  • Perform searches across endpoint data to discover suspicious behavior
  • Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR
  • Create custom watchlists to detect suspicious activity in your environment
  • Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR
  • Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR
  • Describe the different response capabilities available from VMware Carbon Black Cloud

Course Content

Course Introduction
  • Introductions and course logistics
  • Course objectives
Data Flows and Communication
  • Hardware and software requirements
  • Architecture
  • Data flows
Searching Data
  • Creating searches
  • Search operators
  • Analyzing processes
  • Analyzing binaries
  • Advanced queries
Managing Watchlists
  • Subscribing
  • Alerting
  • Custom watchlists
Alert Processing
  • Alert creation
  • Analyzing alert data
  • Alert actions
Threat Hunting in Enterprise EDR
  • Cognitive Attack Loop
  • Malicious behaviors
Response Capabilities
  • Using quarantine
  • Using live response

Prices & Delivery methods

Online Training

Duration
1 day

Price
  • on request
Classroom Training

Duration
1 day

Price
  • on request
 

Schedule

English

1 hour difference

Online Training Time zone: British Summer Time (BST) Guaranteed date!
Guaranteed date:   We will carry out all guaranteed training regardless of the number of attendees, exempt from force majeure or other unexpected events, like e.g. accidents or illness of the trainer, which prevent the course from being conducted.
Instructor-led Online Training:   This computer icon in the schedule indicates that this date/time will be conducted as Instructor-Led Online Training.