top of page
Course Highlights
Hands on Training
Certified & Experienced Trainers
Request for Flexible Timings
Certificate of Completion

Courses
Course Description
The Instructor-led course instructs intermediate responders in the best use of the Falcon Platform for incident triage. The course is appropriate for those who use the Falcon Platform on a day to day basis, focused on triaging and responding to alerts. It includes practical labs for students to develop hands-on skills.
About
Target Audience
This hands-on course is intended for technical contributors who use Falcon Insight to detect, investigate and respond to incidents.
Positions might include Security Analyst, SOC Analyst, Security Engineer, IT Security Operations Manager, Security Administrator, Endpoint Security Administrator, Channel Sales Engineers
Course Pre-Requisite
• Be familiar with the Microsoft Windows environment
• Have an intermediate knowledge of cyber security incident investigation and incident lifecycle.
• Perform basic operations on a personal computer
Course Outline
Detection Analysis
• Detections App
• Filtering
• Detection Types
• Prevention Types
Analytical Process
• Understand the detection
• Review process tree to understand origin
• Understand process(es) involved
• Examine what's normal for this system
• Examine what’s normal for this customer
• Peer review
Analyst Workflows
• Assigning a detection
• Updating detection status
• Commenting
• Network Contain
Student Exercise
• Use the analytical process to review a basic detection
EVENT DISCOVERY
Investigate App Overview
• What is Event Data
• ProcessData
• Context Data
• Key Event Types
Event Actions/workflows
Student Exercise
• Working with Event Data and Event Actions
Student Exercise
• Social Engineering Detections/Ransomware Detections
• Performing a hash search
Student Exercise
• PowerShell related detection
• PowerShell Hunting Reports
Student Exercise
• False Positives
• Encoded PowerShell commands
REPORTING
Detections
• Executive Summary Dashboard
• Detection Activity Dashboard
• Detection Resolution Dashboard
• Detection Activity Report
Exporting Process Data
• Process Table
• Process Activity
• PNG
Student Exercise
• Credential Theft
• NGAV Detections
PROACTIVE INVESTIGATIONS/HUNTING 101
• Bulk IP Search
• Bulk Domain Search
• Student Exercise
• IP and Domain Searching
FINAL EXERCISE
• Students work on their own to investigate a complex phishing attack
• Additional scenarios as time allows
Testimonials
Form
bottom of page