name :
BQ203G
title :
IBM QRadar SIEM Advanced Topics
category :
Security
vendor :
IBM
classroomDeliveryMethod :
Classroom IBM
descriptions :
description :
OverviewIBM® Security QRadar® enables you to minimize the time gap between when a suspicious activity occurs and when you detect it. Attacks and policy violations leave their footprints in log events and network flows of your IT systems. To connect the dots, QRadar SIEM correlates these scattered events and flows into offenses that alert you to suspicious activities. Using the skills taught in this course, you will be able to configure processing of uncommon events, work with reference data, and develop custom rules, custom actions, and custom anomoly detection rules. The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.AudienceAudience
  • Security administrators
  • Security technical architects
  • Offense managers
  • Professional services using QRadar SIEM
  • QRadar SIEM administrators
PrerequisitesPrerequisites:
  • IT infrastructure
  • IT security fundamentals
  • Linux
  • Microsoft Windows
  • TCP/IP networking
  • Log files and events
  • Network flows
You should also have completed the IBM QRadar SIEM Foundations course.  Objective
  • Create custom log sources to utilize events from uncommon sources
  • Create, maintain, and use reference data collections
  • Develop and manage custom rules to detect unusual activity in your network
  • Develop and manage custom action scripts to for automated rule reponse
  • Develop and manage anomoly detection rules to detect when unusual network traffic patterns occur
Course OutlineModule 1: Creating log source typesModule 2: Leveraging reference data collectionsModule 3: Developing custom rulesModule 4: Creating Custom Action ScriptsModule 5: Developing Anomaly Detection Rules
overview :
[IBM® Security QRadar® enables you to minimize the time gap between when a suspicious activity occurs and when you detect it. Attacks and policy violations leave their footprints in log events and network flows of your IT systems. To connect the dots, QRadar SIEM correlates these scattered events and flows into offenses that alert you to suspicious activities. Using the skills taught in this course, you will be able to configure processing of uncommon events, work with reference data, and develop custom rules, custom actions, and custom anomoly detection rules., The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.]
abstract :
IBM® Security QRadar® enables you to minimize the time gap between when a suspicious activity occurs and when you detect it. Attacks and policy violations leave their footprints in log events and network flows of your IT systems. To connect the dots, QRadar SIEM correlates these scattered events and flows into offenses that alert you to suspicious activities. Using the skills taught in this course, you will be able to configure processing of uncommon events, work with reference data, and develop custom rules, custom actions, and custom anomoly detection rules. The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.
prerequisits :
objective :
Overview IBM® Security QRadar® enables you to minimize the time gap between when a suspicious activity occurs and when you detect it. Attacks and policy violations leave their footprints in log events and network flows of your IT systems. To connect the dots, QRadar SIEM correlates these scattered events and flows into offenses that alert you to suspicious activities. Using the skills taught in this course, you will be able to configure processing of uncommon events, work with reference data, and develop custom rules, custom actions, and custom anomoly detection rules. The lab environment for this course uses the IBM QRadar SIEM 7.3 platform. Audience Audience
  • Security administrators
  • Security technical architects
  • Offense managers
  • Professional services using QRadar SIEM
  • QRadar SIEM administrators
Prerequisites Prerequisites:
  • IT infrastructure
  • IT security fundamentals
  • Linux
  • Microsoft Windows
  • TCP/IP networking
  • Log files and events
  • Network flows
You should also have completed the IBM QRadar SIEM Foundations course.   Objective
  • Create custom log sources to utilize events from uncommon sources
  • Create, maintain, and use reference data collections
  • Develop and manage custom rules to detect unusual activity in your network
  • Develop and manage custom action scripts to for automated rule reponse
  • Develop and manage anomoly detection rules to detect when unusual network traffic patterns occur
topic :
Course OutlineModule 1: Creating log source typesModule 2: Leveraging reference data collectionsModule 3: Developing custom rulesModule 4: Creating Custom Action ScriptsModule 5: Developing Anomaly Detection Rules
startDate :
2021-12-09T04:00:46Z
endDate :
2022-01-30T00:00:00Z
lastModified :
2021-12-08T08:00:37Z
created :
2018-06-29T08:01:05Z
duration :
16
durationUnit :
HOURS
ibmIPType :
listPrice :
1190
currency :
GBP
badge_Template_ID :
a6516216-86ec-47dd-81e1-19daf684309e
badge_Title :
IBM QRadar SIEM Advanced Topics - Code: BQ203G
badge_Url :
https://www.credly.com/org/ibm/badge/ibm-qradar-siem-advanced-topics-code-bq203g

    Enquire about this course: