ZL1_BQ203

Ladda ner som PDF

IBM QRadar SIEM Advanced Topics

IBM® Security QRadar® enables you to minimize the time gap between when a suspicious activity occurs and when you detect it. Attacks and policy violations leave their footprints in log events and network flows of your IT systems. To connect the dots, QRadar SIEM correlates these scattered events and flows into offenses that alert you to suspicious activities. Using the skills taught in this course, you will be able to configure processing of uncommon events, work with reference data, and develop custom rules, custom actions, and custom anomoly detection rules.

The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.

Audience

Audience

  • Security administrators
  • Security technical architects
  • Offense managers
  • Professional services using QRadar SIEM
  • QRadar SIEM administrators

Prior knowledge

Prerequisites:

  • IT infrastructure
  • IT security fundamentals
  • Linux
  • Microsoft Windows
  • TCP/IP networking
  • Log files and events
  • Network flows

You should also have completed the IBM QRadar SIEM Foundations course.

  • Create custom log sources to utilize events from uncommon sources
  • Create, maintain, and use reference data collections
  • Develop and manage custom rules to detect unusual activity in your network
  • Develop and manage custom action scripts to for automated rule reponse
  • Develop and manage anomoly detection rules to detect when unusual network traffic patterns occur

Module 1: Creating log source types

Module 2: Leveraging reference data collections

Module 3: Developing custom rules

Module 4: Creating Custom Action Scripts

Module 5: Developing Anomaly Detection Rules

  • Create custom log sources to utilize events from uncommon sources
  • Create, maintain, and use reference data collections
  • Develop and manage custom rules to detect unusual activity in your network
  • Develop and manage custom action scripts to for automated rule reponse
  • Develop and manage anomoly detection rules to detect when unusual network traffic patterns occur

Module 1: Creating log source types

Module 2: Leveraging reference data collections

Module 3: Developing custom rules

Module 4: Creating Custom Action Scripts

Module 5: Developing Anomaly Detection Rules

Utbildningen levereras i samarbete med

Kursfakta

Kurs-ID: ZL1_BQ203
Längd: 2 dagar
Pris exkl moms: 16 500 kr
Inregistrering: 09.00
Kursstart: 09.30
Kursslut (ca): 17.00

Frågor om kursen?

Har du frågor om kursens innehåll, leveransdatum/ort eller behöver en företagsanpassad variant? Fyll i formuläret nedan!


Kan betalas med:
TRAINING CARD

Avtalsrabatter och kampanjer kan ej nyttjas på denna kurs.


Ort och datum

Stockholm
12 sep-13 sep
Boka nu!
21 nov-22 nov
Boka nu!
Cloud Access
i Läs mer

Delta på kursen från ditt hem, jobb eller annan plats.

12 sep-13 sep
Boka nu!
21 nov-22 nov
Boka nu!

Tipsa