Endpoint Detection and Response 4.1 Administration

Course Details
Code: EDPRA-4-1
Tuition (USD): $1,800.00 • Classroom (2 days)

The Endpoint Detection and Response 4.1 Administration course is designed for the IT security professional in a Security Operations role. This class covers how to detect, investigate, remediate, and recover from an incident using Symantec Endpoint Detection and Response. This course is intended for students who have attended the SEDR 4.1 Fundamentals course or have equivalent knowledge and who are familiar with Symantec Endpoint Protection.

Skills Gained

By the completion of this course, you will be able to:

  • Identify evidence of suspicious and malicious activity
  • Searching for Indicators of Compromise
  • Block, Isolate, and Remove threats in the Environment
  • Collect Forensic Information

Who Can Benefit

The Endpoint Detection and Response 4.1 Core Administration course is intended for students who wish to perform Incident Response activities with Symantec Endpoint Detection and Response.

Prerequisites

This course assumes that students have attended the SEDR 4.1 Fundamentals course or have equivalent knowledge. Students should also be familiar with Symantec Endpoint Protection.

Course Details

Hands-On

This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment.

Course Outline

Module 1: Evolving Threat Landscape

  • Challenges of Endpoint Detection and Response in the environment
  • How Symantec Endpoint Detection and Response meets those challenges

Module 2: Increase the visibility of suspicious and malicious activity in the environment

  • Understanding Suspicious & Malicious Activity
  • Prerequisite SEDR configuration or considerations
  • Identifying evidence of suspicious/malicious activity with SEDR
  • Proactive Security Incident Notification with SEDR
  • Understanding Indicators of Compromise
  • Searching for Indicators of Compromise with SEDR

Module 3: Decreasing Security Risk by Responding to Threats in the Environment

  • Prerequisite configuration or considerations
  • Methods used to Isolate threats
  • Isolating threats using SEDR
  • Methods Used to Block threats
  • Blocking threats using SEDR
  • Methods used to remove threats
  • Removing threats using SEDR

Module 4: Collecting and Reporting forensic data for further investigation of security incidents

  • Prerequisite configuration or considerations
  • Information Collected by SEDR
  • Collecting forensic information using SEDR
  • Creating reports with SEDR