Architectures and Technologies
Define the term cybersecurity
Identify types of cybersecurity vulnerabilities
Recognize attack mitigation strategies
Describe the stages of an attack from the point of view of the attacker
Identify different types of cybersecurity attacks
Identify examples of behaviors associated with security tactics, techniques, and procedures
Identify examples of indicators of compromise
Identify the pillars of a zero-trust approach to security
Describe a defense-in-depth security approach
Identify the functions of basic security controls
Distinguish between antivirus and next-generation antivirus solutions
Explain the purpose of a watchlist
VMware Products and Solutions
Recognize the central concepts in the intrinsic approach to security developed by VMware
Identify the control points in the VMware approach to security
Recognize VMware products that support the implementation of a zero-trust approach to security
Identify features of VMware Carbon Black Cloud solutions
Identify the priority of different reputations in VMware Carbon Black Cloud
Recognize when and how to assign reputations in VMware Carbon Black Cloud
Identify use cases for Carbon Black Cloud Endpoint Standard
Identify use cases for Carbon Black Cloud Audit and Remediation
Identify use cases for Carbon Black Cloud Enterprise EDR
Identify tasks that can be performed in the VMware Carbon Black Cloud console
Describe the term unknown file in the context of VMware Carbon Black Cloud
Describe how cloud analysis helps prevent malware
Describe how to remove malware from endpoints
Describe when and how to use the Inbox in the VMware Carbon Black Cloud console
Describe when and how to use audit logs in the VMware Carbon Black Cloud console
Determine the appropriate VMware Carbon Black Cloud sensor installation method for given use cases
Recognize the steps for performing an attended installation of a VMware Carbon Black Cloud sensor
Recognize the steps for performing an unattended installation of a VMware Carbon Black Cloud sensor
Identify types of data collected in VMware Carbon Black Cloud
Recognize the search capabilities in VMware Carbon Black Cloud
Describe the use cases for watchlists in VMware Carbon Black Cloud
Recognize different alert types
Identify ways to respond to and dismiss alerts in VMware Carbon Black Cloud
Describe the purpose of using recommended queries in VMware Carbon Black Cloud
Identify categories of recommended queries
Describe when and how to use Live Response
Recognize the purpose of built-in policies
Recognize how to modify settings on the Policy page in VMware Carbon Black Cloud
Describe the benefits to integrating security solutions
Identify the integration capabilities of VMware Carbon Black Cloud
Planning and Designing
Installing, Configuring, and Setup
Performance-tuning, Optimization, and Upgrades