partner training: darktrace cyber security professional · comprehensive guide to using...

2
As part of Darktrace’s worldwide Partner Program, Darktrace Education has developed a fast-paced training program that empowers Darktrace Partners to deploy and support Darktrace solutions. This program consolidates the vital learning objectives taken from our entire training portfolio and combines this with architectural design considerations, deployment, and best practices in order to provide an end-to-end training course for security professionals. Course name: Darktrace Cyber Security Professional Duration: 2 days Audience: Darktrace Partner Program Members Skills: Networking, network security, cyber security analytics Prerequisites: Experience with network administration/ network security Training Format: Practical hand-on course 70%, theory 30% Course Outline: This course first examines architectural considerations, installation, and best practices before moving on to detailed product training and workflow exercises. The final section of this course builds on the knowledge gained so far and focuses on how to conduct advanced threat hunting that enables security professionals to produce high quality Threat Intelligence Reports. Course Agenda Training material is provided for each participant which sets out the tasks and lessons planned. Key objectives include: 1. Learning Objectives • Introduction and welcome 2. Module I: Installation & Configuration The Installation and Configuration course covers architectural design considerations, deployment and best practices. Topics include: • Architecture • Sizing • Installation • Darktrace appliance console configuration • Reviewing traffic status in the Threat Visualizer • Setting up Call Home • Configuring vSensor • Configuring OS-Sensor • Creating backups • Restoring from backups • Upgrading Darktrace • LDAP authentication and enrichment of user details • Configuring HTTPs certification • Email alert configuration • User administration • Securely erasing captured data on your Darktrace appliance 3. Module II: Threat Visualizer This module is designed to provide you with a comprehensive guide to using Darktrace’s award- winning Threat Visualizer interface. Network security and compliance teams will feel empowered to use this fully featured application and gain unprecedented real-time visibility of networks. EDUCATION Partner Training: Darktrace Cyber Security Professional

Upload: others

Post on 23-May-2020

76 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Partner Training: Darktrace Cyber Security Professional · comprehensive guide to using Darktrace’s award-winning Threat Visualizer interface. Network security and compliance teams

As part of Darktrace’s worldwide Partner Program, Darktrace Education has developed a fast-paced training program that empowers Darktrace Partners to deploy and support Darktrace solutions.

This program consolidates the vital learning objectives taken from our entire training portfolio and combines this with architectural design considerations, deployment, and best practices in order to provide an end-to-end training course for security professionals.

Course name: Darktrace Cyber Security ProfessionalDuration: 2 daysAudience: Darktrace Partner Program MembersSkills: Networking, network security, cyber security analyticsPrerequisites: Experience with network administration/ network securityTraining Format: Practical hand-on course 70%, theory 30%Course Outline: This course first examines architectural considerations, installation, and best practices before moving on to detailed product training and workflow exercises. The final section of this course builds on the knowledge gained so far and focuses on how to conduct advanced threat hunting that enables security professionals to produce high quality Threat Intelligence Reports.

Course AgendaTraining material is provided for each participant which sets out the tasks and lessons planned. Key objectives include:

1. Learning Objectives

• Introduction and welcome

2. Module I: Installation & Configuration

The Installation and Configuration course covers architectural design considerations, deployment and best practices.

Topics include:

• Architecture

• Sizing

• Installation

• Darktrace appliance console configuration

• Reviewing traffic status in the Threat Visualizer

• Setting up Call Home

• Configuring vSensor

• Configuring OS-Sensor

• Creating backups

• Restoring from backups

• Upgrading Darktrace

• LDAP authentication and enrichment of user details

• Configuring HTTPs certification

• Email alert configuration

• User administration

• Securely erasing captured data on your Darktrace appliance

3. Module II: Threat Visualizer

This module is designed to provide you with a comprehensive guide to using Darktrace’s award-winning Threat Visualizer interface. Network security and compliance teams will feel empowered to use this fully featured application and gain unprecedented real-time visibility of networks.

EDUCATION

Partner Training: Darktrace Cyber Security Professional

Page 2: Partner Training: Darktrace Cyber Security Professional · comprehensive guide to using Darktrace’s award-winning Threat Visualizer interface. Network security and compliance teams

Topics include:

• Threat Visualizer overview• Subnet view• Device view• Investigating alerts• Device details• Navigation exercise• Tags• Advanced search• Advanced search exercises• TCP connection states• Export and API functions• Creating and editing models• A weighted model• Exercise: creating a new model• Whitelisting domains, IP addresses, and IP address ranges• Watched domains• Model tuning• Searching for models• Creating a Packet Capture (PCAP)• Additional tools• RegEx tester

4. Module III: Threat Intelligence Reporting

The Threat Intelligence Reporting course is designedfor security professionals that need to learn how writeand submit regular Threat Intelligence Reports (TIRs). Leveraging the Enterprise Immune System’s powerful machine learning and AI algorithms, participants will use the Threat Visualizer as a platform to carry out detailed Threat Hunting techniques and learn the craft of creating TIRs that highlight prioritized risks to the organization.

Topics include:

• Darktrace detection capabilities• Overview of latest Threat Visualizer updates and new functionality• Examples of recent breaches and new threats• Model changes and experimental Models• Introduction to Threat Intelligence Report (TIR)

Models

• Types of models• Process to create models• Model configuration• Model tuning• Examine key models, metrics, and filters• Exercise to explain how models work• Exercise to understand how different threats trigger different models• Creating advanced models

Investigating Anomalies

• Explore the analyst workflow• Threat Visualizer analysis levels• Metadata analysis in advanced search• PCAP analysis• Analyst toolset• Exercise: analyst questions• Exercise: anomalous file investigation

Threat Intelligence Reports

• What is a TIR?• Threat indicators• TIR security• TIR format• Executive summary• Incident summary• Incident details• Exercise: create a TIR• Present findings• TIR evaluation

Contact us

If you would like to inquire about our training services or schedule a training session, please do not hesitate to contact us at [email protected].

Contact UsEurope: +44 (0) 1223 394 100

North America: +1 (415) 229 9100

Latin America: +55 11 97242 2011

Asia Pacific: +65 6804 5010

[email protected]

darktrace.com

About DarktraceDarktrace is the world’s leading AI company for cyber security. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK, and has over 30 offices worldwide.