Seminar - Cegos Integrata GmbH
Overview
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.
In this 3-day instructor-led course, you learn how to perform the following tasks:
Describe how QRadar collects data to detect suspicious activities
Describe the QRadar architecture and data flows
Navigate the user interface
Define log sources, protocols, and event details
Discover how QRadar collects and analyzes network flow information
Describe the QRadar Custom Rule Engine
Utilize the Use Case Manager app
Discover and manage asset information
Learn about a variety of QRadar apps, content extensions, and the App Framework
Analyze offenses by using the QRadar UI and the Analyst Workflow app
Search, filter, group, and analyze security data
Use AQL for advanced searches
Use QRadar to create customized reports
Explore aggregated data management
Define sop...
Termin | Ort | Preis* |
---|---|---|
17.06.2024- 19.06.2024 | online | 2.856,00 € |
08.07.2024- 10.07.2024 | online | 2.856,00 € |
firmenintern | auf Anfrage | auf Anfrage |
Course Outline
Objective
After completing this course, you should be able to perform the following tasks:
Prerequisites
Before taking this course, make sure that you have the following skills:
Audience
This course is designed for security analysts, security technical architects, offense managers, network administrators, and system administrators using QRadar SIEM.