Course dates and application
Applying for closed-group training
Create custom log sources to utilize events from uncommon sources
Create, maintain, and use reference data collections
Develop and manage custom rules to detect unusual activity in your network
Develop and manage custom action scripts to for automated rule reponse
Develop and manage anomoly detection rules to detect when unusual network traffic patterns occur
Security technical architects
Professional services using QRadar SIEM
QRadar SIEM administrators
IT security fundamentals
Log files and events
You should also have completed the IBM QRadar SIEM Foundations course.
IBM Security QRadar enables you to minimize the time gap between when a suspicious activity occurs and when you detect it. Attacks and policy violations leave their footprints in log events and network flows of your IT systems. To connect the dots, QRadar SIEM correlates these scattered events and flows into offenses that alert you to suspicious activities. Using the skills taught in this course, you will be able to configure processing of uncommon events, work with reference data, and develop custom rules, custom actions, and custom anomaly detection rules.
The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.
Do you have any questions about the training?
FOUNDATION TRAININGS FOR THIS COURSE
Don't have enough knowledge to complete this training yet? Then get the basics you need with these courses.
IBM QRadar SIEM Foundations
You may also be interested in these courses and e-learning packages
You may find the courses below interesting
Engineering Cisco Meraki Solutions Part 1
Check Point Certified Admin
Designing HPE Nimble Solutions
Using HPE OneView
Designing HPE Hybrid IT Solutions
Designing HPE Server Solutions
Check Point Certified Expert
Designing Cisco Data Center Infrastructure e-learning
537 500 HUF + VAT now 472 500 HUF + VAT