Course Outline
Introduction & Course Orientation
- Overview of course objectives, expected outcomes, and setup for the laboratory environment.
- Examination of Endpoint Detection and Response (EDR) concepts and the architecture of the OpenEDR platform.
- Exploration of endpoint telemetry and data sources relevant to government operations.
OpenEDR Deployment
- Installation procedures for OpenEDR agents on Windows and Linux endpoints in a government setting.
- Configuration steps for the OpenEDR server and dashboards to support operational requirements.
- Initial setup of telemetry and logging functionalities to ensure comprehensive data collection.
Basic Detection and Alerting
- Identification of various event types and their significance in a government context.
- Configuration of detection rules and thresholds to align with agency-specific needs.
- Continuous monitoring of alerts and notifications for timely response.
Event Analysis & Investigation
- Techniques for analyzing events to detect suspicious patterns within government systems.
- Mapping endpoint behaviors to common cyber attack techniques to enhance threat detection.
- Utilization of OpenEDR dashboards and search tools for thorough investigation and analysis.
Response & Mitigation
- Protocols for responding to alerts and suspicious activities within government networks.
- Strategies for isolating endpoints and mitigating threats to protect agency operations.
- Documentation of actions taken and integration into formal incident response procedures.
Integration & Reporting
- Methods for integrating OpenEDR with Security Information and Event Management (SIEM) systems or other security tools used in government agencies.
- Generation of comprehensive reports for management and stakeholders to support informed decision-making.
- Best practices for continuous monitoring and refinement of alert thresholds to optimize performance.
Capstone Lab & Practical Exercises
- Hands-on laboratory exercises simulating real-world endpoint threats in a government environment.
- Application of detection, analysis, and response workflows to address simulated incidents.
- Review and discussion of lab results to reinforce learning and identify key takeaways for government operations.
Summary and Next Steps
Requirements
- An understanding of fundamental cybersecurity principles for government
- Experience in Windows and/or Linux administration
- Familiarity with endpoint protection or monitoring tools
Audience
- IT and security professionals beginning their journey with endpoint detection tools
- Cybersecurity engineers
- Security personnel in small to mid-sized government agencies
Testimonials (4)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
All is excellent