0% found this document useful (0 votes)
295 views2 pages

Qradar Topics

This document provides an overview of a 3-day instructor-led course on using IBM QRadar SIEM. The course teaches students how to perform tasks like investigating suspected attacks, analyzing security data, using rules and the network hierarchy, managing indexes and dashboards, and creating reports. It includes both lectures and extensive hands-on lab exercises covering topics like using the user interface, investigating offenses, managing rules, and analyzing a real-world attack scenario. The course is designed for security analysts, architects, and administrators and assumes prerequisites in IT infrastructure, security, networking, and Linux/Windows systems.

Uploaded by

prasad d t
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
295 views2 pages

Qradar Topics

This document provides an overview of a 3-day instructor-led course on using IBM QRadar SIEM. The course teaches students how to perform tasks like investigating suspected attacks, analyzing security data, using rules and the network hierarchy, managing indexes and dashboards, and creating reports. It includes both lectures and extensive hands-on lab exercises covering topics like using the user interface, investigating offenses, managing rules, and analyzing a real-world attack scenario. The course is designed for security analysts, architects, and administrators and assumes prerequisites in IT infrastructure, security, networking, and Linux/Windows systems.

Uploaded by

prasad d t
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

IBM QRadar SIEM provides deep visibility into network, user, and application

activity. It provides collection, normalization, correlation, and secure storage of


events, flows, asset profiles, and vulnerabilities. QRadar SIEM classifies
suspected attacks and policy violations as offenses.

In this 3-day instructor-led course, you learn how to perform the following tasks:

Describe how QRadar SIEM collects data to detect suspicious activities


Describe the QRadar SIEM component architecture and data flows
Navigate the user interface
Investigate suspected attacks and policy breaches
Search, filter, group, and analyze security data
Investigate the vulnerabilities and services of assets
Use network hierarchies
Locate custom rules and inspect actions and responses of rules
Analyze offenses created by QRadar SIEM
Use index management
Navigate and customize the QRadar SIEM dashboard
Use QRadar SIEM to create customized reports
Use charts and filters
Use AQL for advanced searches
Analyze a real world scenario

Extensive lab exercises are provided to allow students an insight into the routine
work of an IT Security Analyst operating the IBM QRadar SIEM platform. The
exercises cover the following topics:

Using the QRadar SIEM user interface


Investigating an Offense triggered by events
Investigating the events of an offense
Investigating an offense that is triggered by flows
Using rules
Using the Network Hierarchy
Index and Aggregated Data Management
Using the QRadar SIEM dashboard
Creating QRadar SIEM reports
Using AQL for advanced searches
Analyze a real-world large-scale attack

The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.

Learning Journeys that reference this course:


IBM QRadar SIEM Administrator
IBM QRadar SIEM Analyst
IBM QRadar SIEM Architect

Audience

This course is designed for security analysts, security technical architects,


offense managers, network administrators, and system administrators using QRadar
SIEM.
Prerequisites

Before taking this course, make sure that you have the following skills:

IT infrastructure
IT security fundamentals
Linux
Windows
TCP/IP networking
Syslog

Objectives

After completing this course, you should be able to perform the following tasks:

Describe how QRadar SIEM collects data to detect suspicious activities


Describe the QRadar SIEM component architecture and data flows
Navigate the user interface
Investigate suspected attacks and policy violations
Search, filter, group, and analyze security data
Investigate events and flows
Investigate asset profiles
Describe the purpose of the network hierarchy
Determine how rules test incoming data and create offenses
Use index and aggregated data management
Navigate and customize dashboards and dashboard items
Create customized reports
Use filters
Use AQL for advanced searches
Analyze a real world scenario

You might also like