fbpx

VMware Carbon Black Cloud Endpoint Standard

Price

No price found.

Duration

1 Day

Modality

Live Online

Course code

EDU-VCBCES-OE

logo

Course Overview

This one-day course teaches you how to use the VMware Carbon Black Cloud Endpoint Standard product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. 

Course Objectives

By the end of the course, you should be able to meet the following objectives:

  • Describe the components and capabilities of VMware Carbon Black Cloud Endpoint Standard
  • Identify the architecture and data flows for Carbon Black Cloud Endpoint Standard communication
  • Perform searches across endpoint data to discover suspicious behavior
  • Manage the Carbon Black Cloud Endpoint Standard rules based on organizational requirements
  • Configure rules to address common threats
  • Evaluate the impact of rules on endpoints
  • Process and respond to alerts
  • Describe the different response capabilities available from VMware Carbon Black Cloud 

Target Audience

System administrators and security operations personnel, including analysts and managers.

Prerequisites

This course requires completion of the following course:

  • VMware Carbon Black Cloud Fundamentals

Product Alignment

  • VMware Carbon Black Cloud Endpoint Standard
  • VMware Carbon Black Cloud Endpoint Advanced
  • VMware Carbon Black Cloud Endpoint Enterprise 

Target Audience

System administrators and security operations personnel, including analysts and managers.

Prerequisites

This course requires completion of the following course:

  • VMware Carbon Black Cloud Fundamentals

Product Alignment

  • VMware Carbon Black Cloud Endpoint Standard
  • VMware Carbon Black Cloud Endpoint Advanced
  • VMware Carbon Black Cloud Endpoint Enterprise 

Module 1

Course Introduction

  • Introductions and course logistics
  • Course objective

Module 2

Data Flows and Communication

  • Hardware and software requirements
  • Architecture
  • Data flows

Module 3

Searching Data

  • Creating searches
  • Analyzing events
  • Search operators
  • Advanced queries

Module 4

Policy Components

  • Rules
  • Local scanner
  • Sensor capabilities

Module 5

Prevention Capabilities Using Rules

  • Rule types
  • Rule creation
  • Reputation priority
  • Configuring rules
  • Evaluating rule impact

Module 6

Processing Alerts

  • Alert triage
  • Alert actions.

Module 7

Response Capabilities

  • Using quarantine
  • Using live response
  • Hash banning

Class Schedule

Looking for other dates? Prefer a quote? Let us know: