VMware Carbon Black Portfolio: Configure and Manage
Duration: 5 Days (40 Hours)
VMware Carbon Black Portfolio: Configure and Manage Course Overview:
The VMware Carbon Black Portfolio: Configure and Manage course is specifically designed for security administrators who are responsible for configuring and managing the Carbon Black portfolio of products. Participants will gain a comprehensive understanding of the Carbon Black portfolio, including its architecture, deployment options, and individual solutions.
Throughout the course, participants will receive hands-on experience in configuring each solution within the Carbon Black portfolio. They will learn how to install, configure, and manage CB Defense, CB Response, CB LiveOps, and CB Risk Advocate. The course covers important topics such as event management, goal-based policy enforcement, and best practices for integrating Carbon Black products with existing security solutions.
The course also includes scenario-based exercises, allowing participants to apply their knowledge in real-world situations. These exercises enhance the learning experience and provide practical skills that can be directly applied in their environment.
Target Audience
The target audience for the VMware Carbon Black Portfolio: Configure and Manage training would be IT administrators, system engineers, IT professionals, and cybersecurity professionals who wish to deploy the Carbon Black product suite in a secure and organized manner
Learners should have experience working with IT systems and networks, as well as a basic understanding of cybersecurity concepts and techniques
The training course aims to teach the skills and knowledge of how to use Carbon Black to protect systems, manage users and monitor network activity
The course will also provide learners with an understanding of how they can use the product suite to identify and respond to possible threats
The course will help learners configure and manage the Carbon Black product suite, as well as gain a complete understanding of the total cost of ownership (TCO) and the benefit of using the suite
Learning Objectives of VMware Carbon Black Portfolio: Configure and Manage
Students taking the VMware Carbon Black Portfolio: Configure and Manage Training will learn how to install, configure and manage the Carbon Black portfolio. Through hands-on labs and instructor led sessions, students will be able to understand the concepts of endpoint security, threat hunting, and incident response. They will also gain knowledge on how to use the Carbon Black Console to manage alerts and reports, as well as admin functions such as user rights management and policy deployment. By the end of this training, students will have the skills to design, deploy and maintain an endpoint security architecture using this portfolio.
Module 1: Course Introduction
- Introductions and course logistics
- Course objectives
Module 2: VMware Carbon Black App Control Administrator
- Login Accounts and Groups
- Policies
- Computer Details
- Custom Rules
- Tools
- Events
- Baseline Drift
Module 3: VMware Carbon Black EDR
- Planning and Architecture
- Server Installation & Administration
- Process Search and Analysis
- Binary Search and Banning Binaries
- Search best practices
- Threat Intelligence
- Watchlists
- Alerts / Investigations / Responses
Module 4: VMware Carbon Black Cloud Endpoint Standard
- Data Flows and Communication
- Searching Data
- Policy Components
- Prevention Capabilities Using Rules
- Processing Alerts
- Response Capabilities
Module 5: VMware Carbon Black Cloud Enterprise EDR
- Managing Watchlists
- Alert Processing
- Threat Hunting in Enterprise EDR
- Response Capabilities
Module 6: VMware Carbon Black Cloud Audit and Remediation
- Query Basics
- Recommended Queries
- SQL Basics
- Filtering Results
- Basic SQL Queries
- Advanced Search Capabilities
- Response Capabilities
Before enrolling in the VMware Carbon Black Portfolio: Configure and Manage Training, it is recommended that participants have working knowledge of Windows Server and basic networking concepts. It is also advantageous to have an understanding of security systems or have prior cybersecurity experience. Additionally, familiarity with scripting technologies, such as PowerShell and Python, is recommended.
Discover the perfect fit for your learning journey
Choose Learning Modality
Live Online
- Convenience
- Cost-effective
- Self-paced learning
- Scalability
Classroom
- Interaction and collaboration
- Networking opportunities
- Real-time feedback
- Personal attention
Onsite
- Familiar environment
- Confidentiality
- Team building
- Immediate application
Training Exclusives
This course comes with following benefits:
- Practice Labs.
- Get Trained by Certified Trainers.
- Access to the recordings of your class sessions for 90 days.
- Digital courseware
- Experience 24*7 learner support.
Got more questions? We’re all ears and ready to assist!