- Overview & History of QRadar SIEM
- Key Concepts
- HA and capabilities of QRadar SIEM
- Home
- Mindmajix Technologies
- Courses
- IBM Security QRadar SIEM Training Course Online
Online
Quick facts
particular | details | ||
---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study, Virtual Classroom
|
Mode of Delivery
Video and Text Based
|
Frequency of Classes
Weekdays, Weekends
|
Course and certificate fees
certificate availability
certificate providing authority
The syllabus
Introduction to QRadar SIEM
Architecture of QRadar
- Event Collector & Event Processor
- Flow collector & Flow Processor
- Magistrate & Aerial Database
Logs collection(DSM)
- WinCollect
- Syslog Method
- Log source creation and Mgmt.
QRadar Console Management
- Dashboard
- Types of Dashboards
- Dashboard Customization
Log activity
- Real Time log Streaming
- Filter criteria and Event Search
- False positive and Tuning
Network Activity
- Real Time Flow Streaming
- Filter criteria and Flow Search
- False positive and Tuning
Offenses, Rules & Reports
- Offense Management
- Rules and building blocks
- Report Management
Assets & Vulnerability assessment
- Asset discovery, importing and exporting assets
- Vulnerability Assessment
Risks Mgmt & Admin
- Risk Assessment
- QRadar Administration
Backup
- Types of backup
Architecture
- High Level Architecture
- Flow Collector Architecture
- Event Collector Architecture
- Event Processor Architecture
- Console Architecture
- Data Storage Technology
Solution implementation
- QRadar Solution Scope
- Suggested default log activity Reports
- Deployment Steps
- Create a Network Hierarchy
- Configuring authentication
Custom Log Sources
- Obtain sample logs
- Creating Custom Parser Using DSM Editor
- Start Mapping the unknown Log Records
- About QRadar Identifiers (QID’s)
- Mapping the Log Source ID to the Custom QIDs
Rules Creation and Fine Tuning
- QRadar Rules
- Using Building Blocks
- Rule creation
- Offense analysis
- Using time series and anomaly rules
- False positive management
- Tuning Methodology
QRadar Reports
- Creating QRadar SIEM Reports
- Reporting Introduction
- Advanced Filtering Scenarios
Introduction to AQL
- AQL Basics
- Creating Advanced Queries using AQL.
- User Behaviour Analytics
- IBM QRadar with Watson Advisor
- IBM X-Force Threat Intelligence and integrate with QRadar
Practice Test & Interview Questions
Instructors
Mr Veena
Instructor
Freelancer