VM-VCBCEEDR
VMware Carbon Black Cloud Enterprise EDR
![VMware_with Partners.jpg](https://static.wixstatic.com/media/38b5e1_0d5169371f1243cfba28a2dfc676eb63~mv2.jpg/v1/crop/x_17,y_0,w_190,h_132/fill/w_90,h_62,al_c,q_80,usm_0.66_1.00_0.01,enc_auto/VMware_with%20Partners.jpg)
Price:
Duration:
USD 680.00 excl. VAT
On Demand
![PDF.jpg](https://static.wixstatic.com/media/38b5e1_a0ca9b81ac4a41a386368418322896ce~mv2.jpg/v1/fill/w_43,h_40,al_c,q_80,usm_0.66_1.00_0.01,enc_auto/PDF.jpg)
![PDF Outline](https://static.wixstatic.com/media/38b5e1_70da0c4a1f7240df986aba2f67a09084~mv2.png/v1/fill/w_78,h_13,al_c,q_85,enc_auto/PDF%20Outline.png)
Who Should Attend
Security operations personnel,
including analysts and managers
Prerequisites
This course requires completion of the following course:
• VMware Carbon Black Cloud Fundamentals
Overview
This one-day course teaches you how to use the VMware Carbon Black® Cloud Enterprise EDR™ product and leverage its capabilities to configure and maintain the system according to your organization’s security posture and policies.
This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs.
Course Objectives
By the end of the course, you should be able to meet the following objectives:
• Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR
• Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication
• Perform searches across endpoint data to discover suspicious behavior
• Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR
• Create custom watchlists to detect suspicious activity in your environment
• Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR
• Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR
• Describe the different response capabilities available from VMware Carbon Black Cloud
Course Outline
1 Course Introduction
• Introductions and course logistics
• Course objectives
2 Data Flows and Communication
• Hardware and software requirements
• Architecture
• Data flows
3 Searching Data
• Creating searches
• Search operators
• Analyzing processes
• Analyzing binaries
• Advanced queries
![PDF.jpg](https://static.wixstatic.com/media/38b5e1_a0ca9b81ac4a41a386368418322896ce~mv2.jpg/v1/fill/w_43,h_40,al_c,q_80,usm_0.66_1.00_0.01,enc_auto/PDF.jpg)
4 Managing Watchlists
• Subscribing
• Alerting
• Custom watchlists
5 Alert Processing
• Alert creation
• Analyzing alert data
• Alert actions
6 Threat Hunting in Enterprise EDR
• Cognitive Attack Loop
• Malicious behaviors
7 Response Capabilities
• Using quarantine
• Using live response