Categories: Cyber Security
Wishlist Share
Share Course
Page Link
Share On Social Media
Popup Form Example

Add Suggestion

About Course

See Full Course Details

Schedule: MON – FRI 4 hours (Time: 9 AM to 1 PM & 2 PM to 6 PM ) |SAT/SUN 8 hours (9 AM to 6 PM)

What Will You Learn?

  • 1. **Introduction to QRadar**: Understanding its purpose, architecture, and components.
  • 2. **Log and Event Collection**: Configuring data sources to collect logs and events.
  • 3. **Rules and Offenses**: Creating and customizing rules to detect security incidents.
  • 4. **Dashboards and Reports**: Generating custom dashboards and reports to visualize security data.
  • 5. **Investigation and Incident Response**: Analyzing security events and responding to threats.
  • 6. **Asset and Vulnerability Management**: Identifying and prioritizing assets, vulnerabilities, and risks.
  • 7. **Integration with Other Systems**: Configuring integration with third-party security tools and solutions.
  • 8. **User Management and Access Control**: Managing user accounts, roles, and permissions.
  • 9. **Best Practices and Security Considerations**: Implementing best practices for optimal QRadar deployment.
  • 10. **Troubleshooting and Support**: Developing skills for system maintenance and seeking support when needed.

Course Modules

QRadar on Cloud
IBM Security QRadar, Administration Guide

  • QRadar on Cloud

User Guide
IBM QRadar Vulnerability Manager

Ariel Query Language Guide
IBM Security QRadar, Troubleshooting and System Notifications Guide

DSM Configuration
IBM QRadar Log Event Extended Format (LEEF) Version 2

Vulnerability Assessment Configuration
WinCollect User Guide, IBM Disconnected Log Collector

Student Ratings & Reviews

No Review Yet
No Review Yet