Endpoint Security
About This Course
Learners will understand the functionality of Event Viewer, the significance of the Registry, and the importance of Task Scheduler & Persistence. They will engage in practical lab exercises involving Attack Detection with Event Viewer, Identification of Registry Changes, and Task Scheduler Creation. Moreover, students will learn about Endpoint Detection & Response (EDR), its differences from Extended Detection and Response (XDR) and Managed Detection and Response (MDR), and how to install and configure Endpoint Detection & Response (EDR). They will explore various detection and prevention modes, including File Integrity Monitoring and Vulnerabilities Management & Detection. Hands-on lab exercises will involve Rule Creation and Suspicious Behavior Detection using Endpoint Detection & Response (EDR).
What You'll Learn
b. Proficiency in Endpoint Detection & Response (EDR): Upon completing the course, students will gain the skills and knowledge required to install and configure Endpoint Detection & Response (EDR) solutions. They will understand the differences between Endpoint Detection & Response (EDR), Extended Detection and Response (XDR), and Managed Detection and Response (MDR) and be able to utilize Endpoint Detection & Response (EDR) for threat detection, prevention, and response.
c. Effective Attack Detection and Prevention: The course equips students with practical skills in identifying and responding to attacks. They will engage in lab exercises involving attack detection using Event Viewer, identifying registry changes, and creating scheduled tasks. Additionally, they will learn about various detection and prevention modes, including File Integrity Monitoring and Vulnerabilities Management & Detection, and will gain hands-on experience in creating rules and detecting suspicious behaviour using Endpoint Detection & Response (EDR).
Entry Requirements
Basic Computer Literacy