- Module 1 Evolving Threat Landscape
• Challenges of Endpoint Detection and Response in the environment
• How Symantec Endpoint Detection and Response meets those challenges
- Module 2 Increase the visibility of suspicious and malicious activity in the environment
• Understanding Suspicious & Malicious Activity
• Prerequisite SEDR configuration or considerations
• Identifying evidence of suspicious/malicious activity with SEDR
• Proactive Security Incident Notification with SEDR
• Understanding Indicators of Compromise
• Searching for Indicators of Compromise with SEDR
- Module 3 Decreasing Security Risk by Responding to Threats in the Environment
• Prerequisite configuration or considerations
• Methods used to Isolate threats
• Isolating threats using SEDR
• Methods Used to Block threats
• Blocking threats using SEDR
• Methods used to remove threats
• Removing threats using SEDR
- Module 4 Collecting and Reporting forensic data for further investigation of security incidents
• Prerequisite configuration or considerations
• Information Collected by SEDR
• Collecting forensic information using SEDR
• Creating reports with SEDR