Carbon Black Technical Academy is your single-source portal for technical training on Cb Protection, Cb Response, and Cb Defense. Our training programs offer a progressive learning experience, beginning with introductory level through advanced and onto certification. All training materials are developed in conjunction with, and delivered by, technical expertise with security field experience and industry certifications.
Training Modalities We offer instructor-led, virtual training classes which are available to our customers, partners, and employees. These training classes are offered several times a month, in five primary time zones – Pacific US, Eastern US, Greenwich Mean Time, Singapore Standard Time, and Eastern Australia. These standard courses may be delivered privately, online or onsite, for only your team upon purchase. We also offer on-demand courses which have little to zero real-time engagement. These courses are designed to provide immediate access to learning content and maximum flexibility to learn at any time, from anywhere.
Role-Based Focus Our product-based curricula are delineated by role - administrator and analyst. Each course is focused on that role and its responsibilities. For role-based recommendations, please refer to the development infographics in the Cb How-To menu, Plan Your Development.
A Carbon Black Administrator is someone who needs an in-depth, technical understanding of the Cb system and who will be responsible for the configuration and maintenance of the system according to their organization’s security posture and operational policies. This is someone who may lead, or be a member of, the installation and configuration team. Every implementation typically has one Cb Administrator, though many organizations may have multiple administrators.
A Carbon Black Analyst is an individual who will use the Carbon Black product on a daily basis and who will be responsible for monitoring and enforcement of corporate security policy. A Cb Analyst will use the Cb Console for monitoring, reporting, and analysis, and approval of specific software and may also configure approval mechanisms per corporate security policy.