USA: +1 909 233 6006

India: +91 6301 026190

FireEye Training

fireeye training

Introduction to FireEye Training:

FireEye Training – FireEye, is a pioneer in giving cybersecurity game plans, guarantees the most noteworthy assets on earth from the people who have them in their sights. FireEye’s blend of development, information, and inclination sustained with the most mighty event response bunch produce out the results of security breaks. Global Online Trainings provides best FireEye Online Training FireEye finds and stops aggressors at each period of an intrusion. With FireEye, you’ll perceive computerized ambushes as they happen, understand the risk they stand to your most regarded assets and have the resources for quickly respond and resolve security events. If you have any doubts regarding this FireEye online training, feel free to make call the help desk Global team.

Pre-requisites for FireEye Training:

  • Learners must have recognition with security issues and advancements and systems administration and PC ideas. Involvement in security advancements is suggested.
  • Working comprehension of fundamental data security standards and general comprehension of danger insight.

Course Outline for FireEye Training:

Course Name: FireEye Training course.

Duration of Course: 30 Hours (It can also be optimized as per required period).

Mode of training: Online, Classroom, and corporate training.

Timings: According to one’s feasibility.

Batch Type: Regular, weekends and fast track.

Materials: Yes, we are providing materials for FireEye Online Training. (We will get the soft copy material)

Sessions will be conducted through WEBEX, GoToMeeting OR SKYPE.

Basic Requirements: Good Internet Speed, Headset.

Trainer Experience: 10+ years.

Course Fee: please register on our website, so that one of our agents will assist you.

fireeye training Course Content

FireEye Core Technology
  • Malware infection cycle
  • MVX Engine
  • Appliance analysis phases
NX Series Deployment
  • Correct NX network positioning
  • Deployment mode
  • Initial NX configuration
Appliance Administration
  • Appliance updates
  • Role-based access & user accounts
  • Malware event notifications
  • System notifications
  • Reporting
  • Back-ups
Content Security-EX Series
  • Deployment
  • Initial appliance configurations
  • FireEye FX Web UI & Dashboard
  • Setting up file shares for analysis
  • Running on the demand or scheduled analysis on a network file share
  • Reviewing analysis results
Content Security-FX Series
  • Deployment
  • Initial appliance configurations
  • FireEye FX Web UI & Dashboard
  • Setting up file shares for analysis
  • Running on the demand or scheduled analysis on a network file share
  • Reviewing analysis results
Basics of Malware
  • Malware overview & definition
  • Motivations of malware
  • Types of malware
  • Spear phishing
  • Stages of an APT attack
Central Management CM Series
  • FireEye CM Web UI & Dashboard
  • Managing NX, EX, FX & AX
  • Correlating events detected via different vectors, e.g. web & email
  • Submitting alerts detected by the EX & NX to the AX for deep analysis
Forensic Analysis-AX Series
  • Primary functions AX platform
  • AX deployment
  • Initial AX configuration
  • FireEye AX Web UI & Dashboard
  • Setting up file shares & scheduling batch analysis
  • Submitting malware samples & specifying analysis parameters
  • Reviewing analysis results for submitted malware
Call backs
  • Malware Call back alerts
  • Domain Match alerts
  • Indicators of compromise
  • Encoded traffics
  • 3436Web Infection alert
  • Honey binary
  • Second stage payloads
  • Identify common IOCs
Malware Objects
  • Malware Object alert
  • MVX engine binary analysis of the files
  • Tracing downloads through HTTP headers
  • Determine origin of the malware object downloaded
  • Identify the IOCs in malware alerts
OS Change Walk-Through
  • OS Change detail
  • Windows API
  • Windows registry
  • Code injections
  • Alternate data streams
  • Auto-run behaviour
  • Driver loading
  • User Account Control

Overview of FireEye Training:

FireEye, an association giving equipment and programming to distinguish and avert different progressed relentless dangers, has been utilizing Inspired eLearning’s security mindfulness instructional classes to keep up a solid security act and make a culture of security mindfulness all through their association since 2016.

FireEye experienced fast development over a brief timeframe. In spite of the fact that the organization had constantly expected representatives to finish security preparing in some design, the huge increment in workers caused FireEye Training necessities and requirements to turn out to be progressively mind boggling. In addition to the fact that FireEye required a conventional security mindfulness program, however they required an approach to follow fruition that enabled them to catch up with the individuals who were resistant or required extra, more pinpointed preparing. “There comes a point in each association where extensive in-person preparing isn’t attainable and demise by PowerPoint doesn’t cut it any longer; we had hit that point,” said Alison Cramer, Facility Security Officer at FireEye.

 

What is FireEye Training?

FireEye discovered that the answer for their advancing preparing necessities was to send an all year, widely inclusive security mindfulness preparing program, which they found in Inspired eLearning’s contributions. Through Inspired eLearning’s courses, FireEye had the option to furnish representatives with shifting course lengths and styles structured in light of worker commitment.

 

Who is the right audience to take this FireEye Training?

  • Network security experts
  • Incident responders
  • FireEye heads and investigator clients

Learn FireEye Helix Training along with FireEye Training:

This introduction on FireEye Helix covers the Helix work process, from triaging Helix alarms, making and checking cases and utilizing Helix and Endpoint Security instruments to direct insightful ventures over the endeavor. Handson exercises incorporate composing MQL look just as examining and approving Helix, Network Security and Endpoint Security alarms.

 

What you will learn in this FireEye Training:

With FireEye Training, you’ll identify digital assaults as they occur, comprehend the hazard they posture to your most esteemed resources, and have the assets to rapidly react and resolve security episodes. The FireEye Global Defense Community incorporates in excess of 2,500 clients crosswise over 65 nations, including more than 150 of the Fortune 500.

 
Objectives of FireEye Training:

In the wake of finishing this course, students ought to have the option to:

  • Identify the parts expected to convey Helix.
  • Determine which information sources are generally helpful for Helix location and examination.
  • Search log occasions over the venture.
  • Locate and utilize basic data in a Helix alarm to evaluate a potential risk.
  • Pivot between the Helix web reassure and FireEye Network and Endpoint Security stages.
  • Validate Network Security and Endpoint Security cautions.
  • Utilize particular highlights of Network Security and Endpoint Security to examine and react to potential dangers crosswise over big business frameworks and endpoints.
  • Actively chase for obscure assailants.

Conclusion for FireEye Training:

Global Online Trainings presently offers, FireEye Training. FireEye is a pioneer in giving digital security arrangements, ensures the most important resources on the planet from the individuals who have them in their sights. FireEye’s mix of innovation, insight, and aptitude strengthened with the most forceful episode reaction group wipes out the effect of security breaks. FireEye finds and stops aggressors at each phase of an invasion.

Global Online Trainings provides senior trainers for this FireEye online training. We also provide classroom training at client premises Noida, Bangalore, Gurgaon, Hyderabad, Mumbai, Delhi, and Pune. If you have any doubts regarding this FireEye online training, please call the help desk and our Global team will assist you.

 

Online Trainings
Review Date
Course
640 members
Rating
51star1star1star1star1star