Course Details
Course Outline
1 - Course Introduction
Introductions and course logisticsCourse objectives
2 - Planning and Installation
Hardware and software requirementsArchitectureData flowsServer installation reviewInstalling sensors
3 - Server Administration
Configuration and settingsCarbon Black EDR users and groups
4 - Process Search and Analysis
Filtering optionsCreating searchesProcess analysis and events
5 - Binary Search and Banning Binaries
Filtering optionsCreating searchesHash banning
6 - Search best practices
Search operatorsAdvanced queries
7 - Threat Intelligence
Enabling alliance feedsThreat reports detailsUse and functionality
8 - Watchlists
Creating watchlistsUse and functionality
9 - Alerts / Investigations / Response
Using the HUDAlerts workflowUsing network isolationUsing live response
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
System administrators and security operations personnel, including analysts and managers