VM-CBCM

VMware Carbon Black Portfolio: Configure and Manage

VMware_with Partners.jpg

Price
Duration

USD 3,090.00 excl. VAT

On Demand

intrinsic-security.jpg
PDF.jpg
PDF Outline

Who Should Attend

System administrators and security operations

personnel (including analysts and managers)

Prerequisites

 

System administration experience on

Microsoft Windows or Linux operating systems

 

Overview

This 5-day course teaches you how to install, configure, and manage the VMware Carbon Black® Portfolio suite of products, which include:
• VMware Carbon Black® App Control™ Administrator
• VMware Carbon Black® EDR™ Administrator
• VMware Carbon Black Cloud Endpoint™ Standard
• VMware Carbon Black® Cloud Audit and Remediation
• VMware Carbon Black® Cloud Enterprise EDR™

You learn how to use the capabilities of the products according to the organization’s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black Portfolio through comprehensive coursework, hands-on labs, and scenario-based exercises.

 

Course Objectives

By the end of the course, you should be able to meet the following objectives:
• Describe the components and capabilities of Carbon Black App Control
• Manage and configure the Carbon Black App Control server based on organizational requirements
• Create policies to control enforcement levels and agent functionality
• Implement rules to support the organization’s security posture
• Use the Carbon Black App Control tools to understand agent and server data
• Describe the components and capabilities of the Carbon Black EDR server
• Identify the architecture and data flows for Carbon Black EDR communication
• Describe the Carbon Black EDR server installation process
• Manage and configure the Carbon Black EDR server based on organizational requirements
• Perform searches across process and binary information
• Implement threat intelligence feeds and create watchlists for automated notifications
• Describe the different response capabilities available from the Carbon Black EDR server
• Use investigations to correlate data between multiple processes
• Describe the components and capabilities of Carbon Black Cloud Endpoint Standard
• Identify the architecture and data flows for VMware Carbon Black Cloud products
• Perform searches across endpoint data to discover suspicious behavior
• Manage the Carbon Black Cloud Endpoint Standard rules based on organizational requirements
• Configure rules to address common threats

• Evaluate the impact of rules on endpoints
• Process and respond to alerts
• Describe the different response capabilities available from VMware Carbon Black Cloud
• Describe the components and capabilities of Carbon Black Cloud Enterprise EDR
• Perform searches across endpoint data to discover suspicious behavior
• Manage watchlists to augment the functionality of Carbon Black Cloud Enterprise EDR
• Create custom watchlists to detect suspicious activity in your environment
• Describe the process for responding to alerts in Carbon Black Cloud Enterprise EDR
• Discover malicious activity within Carbon Black Cloud Enterprise EDR
• Describe the different response capabilities available from VMware Carbon Black Cloud
• Describe the components and capabilities of Carbon Black Cloud Audit and Remediation
• Describe the use case and functionality of recommended queries
• Achieve a basic knowledge of SQL
• Describe the elements of a SQL query
• Evaluate the filtering options for queries
• Perform basic SQL queries on endpoints
• Describe the different response capabilities available from VMware Carbon Black Cloud

 

Course Outline

1 Course Introduction
• Introductions and course logistics
• Course objectives
2 VMware Carbon Black App Control Administrator
• Login Accounts and Groups
• Policies
• Computer Details
• Custom Rules
• Tools
• Events
• Baseline Drift
3 VMware Carbon Black EDR
• Planning and Architecture
• Server Installation & Administration
• Process Search and Analysis
• Binary Search and Banning Binaries
• Search best practices
• Threat Intelligence
• Watchlists
• Alerts / Investigations / Responses

PDF.jpg

4 VMware Carbon Black Cloud Endpoint Standard
• Data Flows and Communication
• Searching Data
• Policy Components
• Prevention Capabilities Using Rules
• Processing Alerts
• Response Capabilities
5 VMware Carbon Black Cloud Enterprise EDR
• Managing Watchlists
• Alert Processing
• Threat Hunting in Enterprise EDR
• Response Capabilities
6 VMware Carbon Black Cloud Audit and Remediation
• Query Basics
• Recommended Queries
• SQL Basics
• Filtering Results
• Basic SQL Queries
• Advanced Search Capabilities
• Response Capabilities

Further information
If you would like to know more about this course please contact us