Course Outline
Introduction & Course Orientation
- Overview of course objectives, expected outcomes, and setup of the lab environment for government use.
- Detailed explanation of EDR concepts and the architecture of the OpenEDR platform.
- Understanding endpoint telemetry and data sources relevant to government operations.
OpenEDR Deployment
- Installation procedures for OpenEDR agents on Windows and Linux endpoints in a government setting.
- Configuration of the OpenEDR server and dashboards to align with public sector workflows.
- Initial setup of telemetry and logging configurations for government systems.
Basic Detection and Alerting
- Explanation of various event types and their significance in a government context.
- Configuration of detection rules and thresholds to meet government security standards.
- Monitoring alerts and notifications for timely response in government operations.
Event Analysis & Investigation
- Techniques for analyzing events to identify suspicious patterns within government networks.
- Mapping endpoint behaviors to common attack techniques used against government systems.
- Utilizing OpenEDR dashboards and search tools for thorough investigation in a government environment.
Response & Mitigation
- Procedures for responding to alerts and suspicious activity within government systems.
- Methods for isolating endpoints and mitigating threats in government networks.
- Documentation of actions taken and integration into incident response processes for government.
Integration & Reporting
- Strategies for integrating OpenEDR with SIEM or other security tools used in government agencies.
- Generation of reports tailored for management and stakeholders within the government.
- Best practices for continuous monitoring and alert tuning in a government setting.
Capstone Lab & Practical Exercises
- Hands-on lab simulating real-world endpoint threats specific to government scenarios.
- Application of detection, analysis, and response workflows in a government context.
- Review and discussion of lab results and lessons learned for government personnel.
Summary and Next Steps
Requirements
- A foundational understanding of cybersecurity principles
- Experience in Windows and/or Linux system administration
- Familiarity with endpoint protection or monitoring solutions
Audience
- IT and security professionals new to endpoint detection tools for government
- Cybersecurity engineers
- Security personnel in small to mid-sized governmental organizations
Testimonials (4)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
All is excellent