CourseInfo | SimpliTrain

VMware Carbon Black EDR Administrator

Learning plan iconE-Learning

Description

This course teaches you how to use the VMware Carbon Black® EDR™ product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs.

This course teaches you how to use the VMware Carbon Black® EDR™ product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs.

By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of the Carbon Black EDR server Identify the architecture and data flows for Carbon Black EDR communication Describe the Carbon Black EDR server installation process Manage and configure the Carbon Black EDR sever based on organizational requirements Perform searches across process and binary information Implement threat intelligence feeds and create watchlists for automated notifications Describe the different response capabilities available from the Carbon Black EDR server Use investigations to correlate data between multiple processes

System administrators and security operations personnel, including analysts and managers

Lesson Id Title Description
1 Course Introduction Introductions and course logistics
Course objectives
2 Planning and Installation Hardware and software requirements
Architecture
Data flows
Server installation review
Installing sensors
3 Server Administration Configuration and settings
Carbon Black EDR users and groups
4 Process Search and Analysis Filtering options
Creating searches
Process analysis and events
5 Binary Search and Banning Binaries Filtering options
Creating searches
Hash banning
6 Search best practices Search operators
Advanced queries
7 Threat Intelligence Enabling alliance feeds
Threat reports details
Use and functionality
8 Watchlists Creating watchlists
Use and functionality
9 Alerts / Investigations / Response Using the HUD
Alerts workflow
Using network isolation
Using live response
Self-Paced

Free

Enroll icon
This course includes: :
Full lifetime access