IBM QRadar SIEM Foundations - BQ103G

PT21511
Summary
IBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles, and vulnerabilities. QRadar SIEM classifies suspected attacks and policy violations as offenses. In this 3-day instructor-led course, you learn how to perform the following tasks: Describe how QRadar SIEM collects data to detect suspicious activities Describe the QRadar SIEM component architecture and data flows Navigate the user interface Investigate suspected attacks and policy breaches Search, filter, group, and analyze security data Investigate the vulnerabilities and services of assets Use network hierarchies Locate custom rules and inspect actions and responses of rules Analyze offenses created by QRadar SIEM Use index management Navigate and customize the QRadar SIEM dashboard Use QRadar SIEM to create customized reports Use charts and filters Use AQL for advanced searches Analyze a real world scenario Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topi
Prerequisites
Before taking this course, make sure that you have the following skills: IT infrastructure IT security fundamentals Linux Windows TCP/IP networking Syslog
Duration
3 Days
Audience
This course is designed for security analysts, security technical architects, offense managers, network administrators, and system administrators using QRadar SIEM.
Topics
After completing this course, you should be able to perform the following tasks: Describe how QRadar SIEM collects data to detect suspicious activities Describe the QRadar SIEM component architecture and data flows Navigate the user interface Investigate suspected attacks and policy violations Search, filter, group, and analyze security data Investigate events and flows Investigate asset profiles Describe the purpose of the network hierarchy Determine how rules test incoming data and create offenses Use index and aggregated data management Navigate and customize dashboards and dashboard items Create customized reports Use filters Use AQL for advanced searches Analyze a real world scenarioSecuritySecurity SoftwareSecurity Threat ManagementSecurity IntelligenceQRadar Security Info and Event Management

Related Scheduled Courses