Course Outline

Introduction & Course Orientation

  • Overview of course objectives, expected outcomes, and setup of the lab environment for government use.
  • Detailed explanation of EDR concepts and the architecture of the OpenEDR platform.
  • Understanding endpoint telemetry and data sources relevant to government operations.

OpenEDR Deployment

  • Installation procedures for OpenEDR agents on Windows and Linux endpoints in a government setting.
  • Configuration of the OpenEDR server and dashboards to align with public sector workflows.
  • Initial setup of telemetry and logging configurations for government systems.

Basic Detection and Alerting

  • Explanation of various event types and their significance in a government context.
  • Configuration of detection rules and thresholds to meet government security standards.
  • Monitoring alerts and notifications for timely response in government operations.

Event Analysis & Investigation

  • Techniques for analyzing events to identify suspicious patterns within government networks.
  • Mapping endpoint behaviors to common attack techniques used against government systems.
  • Utilizing OpenEDR dashboards and search tools for thorough investigation in a government environment.

Response & Mitigation

  • Procedures for responding to alerts and suspicious activity within government systems.
  • Methods for isolating endpoints and mitigating threats in government networks.
  • Documentation of actions taken and integration into incident response processes for government.

Integration & Reporting

  • Strategies for integrating OpenEDR with SIEM or other security tools used in government agencies.
  • Generation of reports tailored for management and stakeholders within the government.
  • Best practices for continuous monitoring and alert tuning in a government setting.

Capstone Lab & Practical Exercises

  • Hands-on lab simulating real-world endpoint threats specific to government scenarios.
  • Application of detection, analysis, and response workflows in a government context.
  • Review and discussion of lab results and lessons learned for government personnel.

Summary and Next Steps

Requirements

  • A foundational understanding of cybersecurity principles
  • Experience in Windows and/or Linux system administration
  • Familiarity with endpoint protection or monitoring solutions

Audience

  • IT and security professionals new to endpoint detection tools for government
  • Cybersecurity engineers
  • Security personnel in small to mid-sized governmental organizations
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories