Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

IBM QRadar SIEM Foundations

Categories IBM
Add Your Heading Text Here
37,200.00

Objectives

  • Describe how QRadar SIEM collects data to detect suspicious activities
  • Describe the QRadar SIEM component architecture and data flows
  • Navigate the user interface
  • Investigate suspected attacks and policy violations
  • Search, filter, group, and analyze security data
  • Investigate events and flows
  • Investigate asset profiles
  • Describe the purpose of the network hierarchy
  • Determine how rules test incoming data and create offenses
  • Use index and aggregated data management
  • Navigate and customize dashboards and dashboard items
  • Create customized reports
  • Use filters
  • Use AQL for advanced searches
  • Analyze a real world scenario

Prerequisite

  • IT infrastructure
  • IT security fundamentals
  • Linux
  • Windows
  • TCP/IP networking
  • Syslog

Target Audience

  • This course is designed for security analysts, security technical architects, offense managers, network administrators, and system administrators using QRadar SIEM.

Course Curriculum

Module 1: Introduction to IBM QRadar

Module 2: IBM QRadar SIEM component architecture and data flows

Module 3: Using the QRadar SIEM User Interface

Module 4: Investigating an Offense Triggered by Events

Module 5: Investigating the Events of an Offense

Module 6: Using Asset Profiles to Investigate Offenses

Module 7: Investigating an Offense Triggered by Flows

Module 8: Using Rules

Module 9: Using the Network Hierarchy

Module 10: Index and Aggregated Data Management

Module 11: Using the QRadar SIEM Dashboard

Module 12: Creating Reports

Module 13: Using Filters

Module 14: Using the Ariel Query Language (AQL) for Advanced Searches

Module 15: Analyzing a Real-World Large-Scale Attack

0
    0
    Your Cart

    Enroll Now