
Learn Modern Technology This program enables you to minimize the time gap between when a suspicious activity occurs and when you detect it.
- Create custom log sources to utilize events from uncommon sources
- Create, maintain, and use reference data collections
- Develop and manage custom rules to detect unusual activity in your network
- Develop and manage custom action scripts to for automated rule response
- Develop and manage anomaly detection rules to detect when unusual network traffic patterns occur
Security administrators, Security technical architects, Offense managers, Professional services using QRadar SIEM, QRadar SIEM administrators
Completion of IBM QRadar SIEM Foundations course is mandatory.
- IT infrastructure
- IT security fundamentals
- Linux
- Microsoft Windows
- TCP/IP networking
- Log files and events
- Network flows
Learn to
- To connect the dots, which correlates these scattered events and flows into offenses that help in alerting to suspicious activities.
- Should be able to configure processing of uncommon events, work with reference data, and develop custom rules, custom actions, and custom anomaly detection rules.
Delivery Method : Classroom Training
Duration : 16 hours
Level : Advanced
Languages : English
Duration : 16 hours
Level : Advanced
Languages : English
Related Courses

Access Manager Platform Foundations

Administration of DataPower Gateway V7.6

Creating, Publishing & Securing APIs with API Connect

Guardium (V10) Foundations

MQ V9 System Administration

QRadar SIEM Advanced Topics

QRadar SIEM Foundations

Spectrum Protect 8.1.2 Implementation and Administration

Storwize V7000 Implementation Workshop
