Course Outline

Introduction & Course Orientation

  • Overview of course objectives, expected outcomes, and setup for the laboratory environment.
  • Examination of Endpoint Detection and Response (EDR) concepts and the architecture of the OpenEDR platform.
  • Exploration of endpoint telemetry and data sources relevant to government operations.

OpenEDR Deployment

  • Installation procedures for OpenEDR agents on Windows and Linux endpoints in a government setting.
  • Configuration steps for the OpenEDR server and dashboards to support operational requirements.
  • Initial setup of telemetry and logging functionalities to ensure comprehensive data collection.

Basic Detection and Alerting

  • Identification of various event types and their significance in a government context.
  • Configuration of detection rules and thresholds to align with agency-specific needs.
  • Continuous monitoring of alerts and notifications for timely response.

Event Analysis & Investigation

  • Techniques for analyzing events to detect suspicious patterns within government systems.
  • Mapping endpoint behaviors to common cyber attack techniques to enhance threat detection.
  • Utilization of OpenEDR dashboards and search tools for thorough investigation and analysis.

Response & Mitigation

  • Protocols for responding to alerts and suspicious activities within government networks.
  • Strategies for isolating endpoints and mitigating threats to protect agency operations.
  • Documentation of actions taken and integration into formal incident response procedures.

Integration & Reporting

  • Methods for integrating OpenEDR with Security Information and Event Management (SIEM) systems or other security tools used in government agencies.
  • Generation of comprehensive reports for management and stakeholders to support informed decision-making.
  • Best practices for continuous monitoring and refinement of alert thresholds to optimize performance.

Capstone Lab & Practical Exercises

  • Hands-on laboratory exercises simulating real-world endpoint threats in a government environment.
  • Application of detection, analysis, and response workflows to address simulated incidents.
  • Review and discussion of lab results to reinforce learning and identify key takeaways for government operations.

Summary and Next Steps

Requirements

  • An understanding of fundamental cybersecurity principles for government
  • Experience in Windows and/or Linux administration
  • Familiarity with endpoint protection or monitoring tools

Audience

  • IT and security professionals beginning their journey with endpoint detection tools
  • Cybersecurity engineers
  • Security personnel in small to mid-sized government agencies
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories