VM-VCBCES

VMware Carbon Black Cloud Endpoint Standard

VMware_with Partners.jpg

Price
Duration

USD 680.00 excl. VAT

On Demand

intrinsic-security.jpg
PDF.jpg
PDF Outline

Who Should Attend

System administrators and security operations personnel,

including analysts and managers

Prerequisites

 

This course requires completion of the following course:

• VMware Carbon Black Cloud Fundamentals

 

Overview

This one-day course teaches you how to use the VMware Carbon Black Cloud Endpoint™ Standard product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies.

This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs.

 

Course Objectives

By the end of the course, you should be able to meet the following objectives:
• Describe the components and capabilities of VMware Carbon Black Cloud Endpoint Standard
• Identify the architecture and data flows for Carbon Black Cloud Endpoint Standard communication
• Perform searches across endpoint data to discover suspicious behavior
• Manage the Carbon Black Cloud Endpoint Standard rules based on organizational requirements

• Configure rules to address common threats
• Evaluate the impact of rules on endpoints
• Process and respond to alerts
• Describe the different response capabilities available from VMware Carbon Black Cloud™

 

Course Outline

1 Course Introduction
• Introductions and course logistics
• Course objectives
2 Data Flows and Communication
• Hardware and software requirements
• Architecture
• Data flows
3 Searching Data
• Creating searches
• Analyzing events
• Search operators
• Advanced queries
4 Policy Components
• Rules
• Local scanner
• Sensor capabilities

PDF.jpg

5 Prevention Capabilities Using Rules
• Rule types
• Rule creation
• Reputation priority
• Configuring rules
• Evaluating rule impact
6 Processing Alerts
• Alert triage
• Alert actions
7 Response Capabilities
• Using quarantine
• Using live response
• Hash banning

Further information
If you would like to know more about this course please contact us