Course Overview
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you will learn about the solution architecture, how to navigate the user interface, and how to investigate offenses.
Topics Covered
• How QRadar collects data to detect suspicious activities
• QRadar architecture and data flows
• Navigate the user interface
• Define log sources, protocols, and event details
• How QRadar collects and analyzes network flow information
• QRadar Custom Rule Engine
• Usage of the Case Manager app
• Discover and manage asset information
• QRadar apps, content extensions, and the App Framework
• Analyze offenses
• Search, filter, group, and analyze security data
• Usage of AQL for advanced searches
• Create customized reports with QRadar
• Explore aggregated data management
• Usage of the Pulse Dashboards
• QRadar administrative tasks
Please note that this course is offered by NAIT in partnership with IBM. Accordingly, this outline originates from (was created by) IBM. If you wish to read IBM’s course outline, please follow this link: https://educationservices.bowriversolutions.com/cybersecurity-foundations/
View Course Outline