BQ105G

New IBM QRadar SIEM Foundations

IBM QRadar SIEM system administration fundamentals
Form of participation
Form of training
Length of training
  • 3 day (3×8 Lessons)
  • daily 9:00 - 17:00
Available languages
  • Hungarian
Dates

Training price

740 000 Ft
+ VAT/person
Please choose the date and form of participation!
Would you like a custom made solution, group training on this topic?
Find out more about our customised training services here.

Description

IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.

Suggested For

This course is designed for security analysts, security technical architects, offense managers, network administrators, and system administrators using QRadar SIEM.

Benefits

After completing this course, you should be able to perform the following tasks:

  • Describe how QRadar collects data to detect suspicious activities
  • Describe the QRadar architecture and data flows
  • Navigate the user interface
  • Define log sources, protocols, and event details
  • Discover how QRadar collects and analyzes network flow information
  • Describe the QRadar Custom Rule Engine
  • Utilize the Use Case Manager app
  • Discover and manage asset information
  • Learn about a variety of QRadar apps, content extensions, and the App Framework
  • Analyze offenses by using the QRadar UI and the Analyst Workflow app
  • Search, filter, group, and analyze security data
  • Use AQL for advanced searches
  • Use QRadar to create customized reports
  • Explore aggregated data management
  • Define sophisticated reporting using Pulse Dashboards
  • Diiscover QRadar administrative tasks

Outline

In this 3-day instructor-led course, you learn how to perform the following tasks:

  • Describe how QRadar collects data to detect suspicious activities
  • Describe the QRadar architecture and data flows
  • Navigate the user interface
  • Define log sources, protocols, and event details
  • Discover how QRadar collects and analyzes network flow information
  • Describe the QRadar Custom Rule Engine
  • Utilize the Use Case Manager app
  • Discover and manage asset information
  • Learn about a variety of QRadar apps, content extensions, and the App Framework
  • Analyze offenses by using the QRadar UI and the Analyst Workflow app
  • Search, filter, group, and analyze security data
  • Use AQL for advanced searches
  • Use QRadar to create customized reports
  • Explore aggregated data management
  • Define sophisticated reporting using Pulse Dashboards
  • Discover QRadar administrative tasks

Extensive lab exercises are provided to allow learners an insight into the routine work of an IT Security Analyst operating the QRadar SIEM platform. The lab environment for this course uses the IBM QRadar SIEM 7.5 platform.

  • Architecture exercises
  • UI Overview exercises
  • Log Sources exercises
  • Flows and QRadar Network Insights exercises
  • Custom Rule Engine (CRE) exercises
  • Use Case Manager app exercises
  • Assets exercises
  • App Framework exercises
  • Working with Offenses exercises.
  • Search, filtering, and AQL exercises
  • Reporting and Dashboards exercises
  • QRadar Admin tasks exercises
Outline (PDF)

Prerequisites

Before taking this course, make sure that you have the following skills: IT infrastructure and IT security fundamentals, Linux and/or Windows administration skills, TCP/IP networking and Syslog knowledge and experience.