Course Outline
Introduction & Course Orientation
- Course objectives, expected outcomes, and lab environment setup
- Overview of EDR concepts and OpenEDR platform architecture
- Understanding endpoint telemetry and data sources
OpenEDR Deployment
- Installing OpenEDR agents on Windows and Linux endpoints
- Setting up the OpenEDR server and dashboards
- Configuring basic telemetry and logging
Basic Detection and Alerting
- Understanding event types and their significance
- Configuring detection rules and thresholds
- Monitoring alerts and notifications
Event Analysis & Investigation
- Analyzing events for suspicious patterns
- Mapping endpoint behaviors to common attack techniques
- Using OpenEDR dashboards and search tools for investigation
Response & Mitigation
- Responding to alerts and suspicious activity
- Isolating endpoints and mitigating threats
- Documenting actions and integrating into incident response
Integration & Reporting
- Integrating OpenEDR with SIEM or other security tools
- Generating reports for management and stakeholders
- Best practices for continuous monitoring and alert tuning
Capstone Lab & Practical Exercises
- Hands-on lab simulating real-world endpoint threats
- Applying detection, analysis, and response workflows
- Review and discussion of lab results and lessons learned
Summary and Next Steps
Requirements
- An understanding of basic cybersecurity concepts
- Experience with Windows and/or Linux administration
- Familiarity with endpoint protection or monitoring tools
Audience
- IT and security professionals starting with endpoint detection tools
- Cybersecurity engineers
- Small to mid-sized business security staff
Testimonials (4)
It was clear and with very good examples
Carlo Beccia - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
All is excellent