Open-Source EDR Fundamentals: Deployment, Detection & Response Training Course
OpenEDR is an open-source endpoint detection and response solution that delivers continuous telemetry, detection, and analysis of adversarial activity on endpoints.
This instructor-led live training (available online or onsite) is designed for beginner to intermediate-level IT and security professionals who wish to deploy, configure, and operate OpenEDR to detect and respond to cyber threats.
By the end of this training, participants will be able to:
- Deploy and configure OpenEDR agents and server components for telemetry collection.
- Perform basic detection and monitoring using OpenEDR dashboards and event views.
- Analyze endpoint events to identify suspicious activity and potential threats.
- Integrate OpenEDR alerts into incident response workflows and reporting.
Course Format
- Interactive lecture and discussion.
- Plenty of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction & Course Orientation
- Course objectives, expected outcomes, and lab environment setup
- Overview of EDR concepts and OpenEDR platform architecture
- Understanding endpoint telemetry and data sources
OpenEDR Deployment
- Installing OpenEDR agents on Windows and Linux endpoints
- Setting up the OpenEDR server and dashboards
- Configuring basic telemetry and logging
Basic Detection and Alerting
- Understanding event types and their significance
- Configuring detection rules and thresholds
- Monitoring alerts and notifications
Event Analysis & Investigation
- Analyzing events for suspicious patterns
- Mapping endpoint behaviors to common attack techniques
- Using OpenEDR dashboards and search tools for investigation
Response & Mitigation
- Responding to alerts and suspicious activity
- Isolating endpoints and mitigating threats
- Documenting actions and integrating into incident response
Integration & Reporting
- Integrating OpenEDR with SIEM or other security tools
- Generating reports for management and stakeholders
- Best practices for continuous monitoring and alert tuning
Capstone Lab & Practical Exercises
- Hands-on lab simulating real-world endpoint threats
- Applying detection, analysis, and response workflows
- Review and discussion of lab results and lessons learned
Summary and Next Steps
Requirements
- An understanding of basic cybersecurity concepts
- Experience with Windows and/or Linux administration
- Familiarity with endpoint protection or monitoring tools
Audience
- IT and security professionals starting with endpoint detection tools
- Cybersecurity engineers
- Small to mid-sized business security staff
Open Training Courses require 5+ participants.
Open-Source EDR Fundamentals: Deployment, Detection & Response Training Course - Booking
Open-Source EDR Fundamentals: Deployment, Detection & Response Training Course - Enquiry
Open-Source EDR Fundamentals: Deployment, Detection & Response - Consultancy Enquiry
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.
Otilia Pasareti - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Sweden (online or onsite) targets beginner-level cybersecurity professionals eager to learn how to leverage AI for enhanced threat detection and response capabilities.
Upon completion of this training, participants will be able to:
- Grasp AI applications within cybersecurity.
- Deploy AI algorithms for threat detection.
- Automate incident response using AI tools.
- Integrate AI into existing cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in Sweden (online or onsite) is designed for cybersecurity professionals at intermediate to advanced levels who wish to enhance their expertise in AI-powered threat detection and incident response.
Upon completion of this training, participants will be capable of:
- Deploying advanced AI algorithms for real-time threat detection.
- Tailoring AI models to address specific cybersecurity challenges.
- Creating automation workflows for threat response.
- Protecting AI-driven security tools from adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Sweden (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves identifying security vulnerabilities in software, websites, or systems and responsibly reporting them to receive rewards or recognition.
This instructor-led live training (available online or onsite) is designed for beginner-level security researchers, developers, and IT professionals who want to learn the fundamentals of ethical bug hunting and how to participate in bug bounty programs.
By the end of this training, participants will be able to:
- Understand the core concepts of vulnerability discovery and bug bounty programs.
- Use key tools like Burp Suite and browser developer tools for testing applications.
- Identify common web security flaws such as XSS, SQLi, and CSRF.
- Submit clear, actionable vulnerability reports to bug bounty platforms.
Format of the Course
- Interactive lecture and discussion.
- Hands-on use of bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- To request a customized training for this course based on your organization's applications or testing needs, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation offers an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance methodologies, and the strategic tooling employed by top-tier bug bounty hunters.
This instructor-led live training, available either online or on-site, is designed for security researchers, penetration testers, and bug bounty hunters at the intermediate to advanced levels who aim to automate their workflows, expand their reconnaissance capabilities, and identify complex vulnerabilities across diverse targets.
Upon completing this training, participants will be capable of:
- Automating reconnaissance and scanning processes across multiple targets.
- Utilizing state-of-the-art tools and scripts essential for bounty automation.
- Identifying complex, logic-based vulnerabilities that often elude standard scanning tools.
- Developing custom workflows for subdomain enumeration, fuzzing, and reporting.
Course Format
- Interactive lectures and discussions.
- Practical application of advanced tools and scripting for automation.
- Guided laboratory sessions focused on real-world bounty workflows and sophisticated attack chains.
Course Customization Options
- For customized training tailored to your specific bounty targets, automation requirements, or internal security challenges, please contact us to arrange a session.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led live training in Sweden (online or onsite) is aimed at beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is designed to train Cyber Crime and Fraud Investigators by teaching electronic discovery and advanced investigation techniques. This course is essential for anyone who encounters digital evidence while conducting an investigation.
The Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.
The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler program delivers a systematic methodology for managing and responding to cybersecurity incidents with both efficiency and effectiveness.
Delivered as instructor-led live training (available online or onsite), this course targets intermediate-level IT security professionals seeking to build the tactical expertise required to plan, categorize, contain, and manage security incidents.
Upon completion of this training, participants will be able to:
- Grasp the incident response lifecycle and its distinct phases.
- Implement procedures for incident detection, classification, and notification.
- Apply effective strategies for containment, eradication, and recovery.
- Create post-incident reports and continuous improvement plans.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures within simulated environments.
- Guided exercises centered on detection, containment, and response workflows.
Course Customization Options
- For customized training tailored to your organization's specific incident response procedures or tools, please contact us to make arrangements.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis live, instructor-led training in Sweden (online or onsite) targets intermediate cybersecurity professionals looking to implement CTEM within their organizations.
By the conclusion of this training, participants will be capable of:
- Understanding the core principles and stages of CTEM.
- Identifying and prioritizing risks using CTEM methodologies.
- Integrating CTEM practices into existing security protocols.
- Utilizing tools and technologies for continuous threat management.
- Developing strategies to validate and improve security measures continuously.
Cyber Emergency Response Team (CERT)
7 HoursThis course explores the management of an incident response team. In an era where cyber attacks are frequent and complex, the role of the first responder is pivotal, making incident response a critical organizational function.
As the final line of defense, incident response demands robust management processes to detect and address incidents efficiently. Leading an incident response team specifically requires specialized skills and expertise.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Sweden (online or onsite) is designed for advanced-level cybersecurity professionals who aim to understand Cyber Threat Intelligence and develop skills to effectively manage and mitigate cyber threats.
By the end of this training, participants will be able to:
- Understand the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Perform advanced threat analysis.
- Leverage Threat Intelligence Platforms (TIPs) and automate threat intelligence processes.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Sweden (online or onsite) explores various dimensions of enterprise security, ranging from AI to database protection. It also addresses the latest tools, processes, and mindsets required to defend against attacks.
Ethical Hacker
35 HoursThis course immerses participants in an interactive learning environment where they will discover how to scan, test, exploit, and secure their own systems. The lab-intensive setting provides each student with in-depth knowledge and practical experience regarding current essential security systems. Students will start by understanding how perimeter defenses operate before progressing to scanning and attacking their own networks, ensuring no real networks are affected. Participants will then learn how intruders escalate privileges and what measures can be taken to secure a system. Additionally, students will cover Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. Upon completing this intensive 5-day class, students will possess hands-on understanding and experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialed professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
The course is ideal for those working in roles such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
Certified Lead Ethical Hacker
35 HoursWhy Attend This Course?
The Certified Lead Ethical Hacker training is designed to equip you with the essential expertise needed to execute information system penetration tests. By applying recognized principles, procedures, and penetration testing techniques, you will learn to identify potential threats within computer networks. Throughout this course, you will acquire the knowledge and skills required to manage penetration testing projects or teams, as well as to plan and conduct internal and external pentests in compliance with standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Furthermore, you will gain a comprehensive understanding of how to draft reports and propose countermeasures. Through hands-on exercises, you will master penetration testing techniques and develop the ability to manage pentest teams, handle customer communication, and resolve conflicts effectively.
This Certified Lead Ethical Hacking course offers a technical perspective on information security through ethical hacking, utilizing common techniques like information gathering and vulnerability detection both inside and outside corporate networks.
The training is also aligned with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
Upon mastering the necessary knowledge and skills in ethical hacking, you may take the exam to apply for the "PECB Certified Lead Ethical Hacker" credential. Holding a PECB Lead Ethical Hacker certificate demonstrates that you have acquired the practical skills required to perform and manage penetration tests in accordance with best practices.
Who Should Attend?
- Individuals interested in IT Security, particularly Ethical Hacking, who wish to learn more about the field or initiate a professional career change.
- Information security officers and professionals aiming to master ethical hacking and penetration testing techniques.
- Managers or consultants seeking to understand how to oversee the penetration testing process.
- Auditors who wish to perform and conduct professional penetration tests.
- Personnel responsible for maintaining the security of information systems within an organization.
- Technical experts looking to learn how to prepare for a pentest.
- Cybersecurity professionals and members of information security teams.
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker (CEH) credential is a globally recognized and highly valued certification in the field of cybersecurity.
This comprehensive program combines theoretical instruction with practical exercises to prepare students for both the CEH certification exam and the CEH Practical Exam. Upon successfully passing both assessments, candidates are awarded the CEH Master credential alongside their standard CEH certification.
Participants have the option to enhance their learning package by including either the Certified Penetration Testing Professional (CPENT) or the Computer Hacking Forensic Investigator (CHFI) course.
Instruction for either the CPENT or CHFI course is delivered through EC-Council’s online, self-paced streaming video platform.
CPENT (Penetration Testing):
This module teaches students how to apply the concepts and tools learned in the CEH program to a penetration testing methodology within a live cyber range environment.
CHFI (Computer Forensics):
This module instructs students on a methodological approach to computer forensics, covering searching and seizing, chain-of-custody procedures, acquisition, preservation, analysis, and reporting of digital evidence.
Course Description
The CEH program offers an in-depth exploration of ethical hacking phases, diverse attack vectors, and preventative countermeasures. It aims to teach participants how hackers think and operate with malicious intent, thereby enabling them to better design security infrastructure and defend against future threats. By understanding system weaknesses and vulnerabilities, organizations can strengthen their security controls to minimize incident risks.
The CEH curriculum is designed to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology. This approach provides the opportunity to demonstrate the knowledge and skills required to achieve the CEH credential. Participants will gain a fundamentally different perspective on the responsibilities and measures necessary to maintain security.
Who Should Attend
- Law enforcement officers
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Financial sector professionals
- Cybersecurity specialists
About the Certified Ethical Hacker Master
To achieve the CEH Master certification, candidates must pass the CEH Practical exam. This exam is designed to verify that students can effectively apply the principles taught in the CEH course. It requires demonstrating the application of ethical hacking techniques, including threat vector identification, network scanning, OS detection, vulnerability analysis, and system hacking.
The CEH Practical exam does not rely on simulations. Instead, candidates engage with a live cyber range designed to mimic a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the final step after obtaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical Exam results in the additional CEH Master certification.
About the Certified Ethical Hacker Practical
To validate your ethical hacking skills, you will face real-world challenges in a realistic environment. Using labs and tools, you will need to complete specific ethical hacking tasks within a time limit, simulating conditions encountered in the professional world.
The EC-Council CEH (Practical) exam features a complex network that replicates the real-life infrastructure of a large organization, including various network systems such as a DMZ. You must apply your ethical hacking skills to discover and exploit vulnerabilities in real-time while also auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses on penetration testing, teaching you how to operate within an enterprise network environment that needs to be attacked, exploited, evaded, and defended. If your experience is limited to flat networks, CPENT’s live practice range will elevate your skills by teaching you to penetrate IoT and OT systems, write custom exploits, build specialized tools, conduct advanced binary exploitation, perform double pivots to access hidden networks, and customize scripts and exploits to reach the innermost segments of a network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course provides a vendor-neutral perspective on the security discipline of digital forensics. It is a comprehensive course covering major forensic investigation scenarios, enabling students to gain hands-on experience with various forensic techniques and standard tools necessary to successfully conduct computer forensic investigations.