IBM QRadar SIEM

IBM QRadar SIEM Training

Course Overview

IBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles, and vulnerabilities. QRadar SIEM classifies suspected attacks and policy violations as offenses.

In this 5-day instructor-led course, participant will learn how to perform the following tasks:

  • Describe how QRadar SIEM collects data to detect suspicious activities
  • Describe the QRadar SIEM component architecture and data flows
  • Navigate the user interface
  • Investigate suspected attacks and policy breaches
  • Search, filter, group, and analyze security data
  • Investigate the vulnerabilities and services of assets
  • Use network hierarchies
  • Locate custom rules and inspect actions and responses of rules
  • Analyze offenses created by QRadar SIEM
  • Use index management
  • Navigate and customize the QRadar SIEM dashboard
  • Use QRadar SIEM to create customized reports
  • Use charts and filters
  • Use AQL for advanced searches
  • Analyze a real world scenario
  • Create custom log sources to utilize events from uncommon sources
  • Create, maintain, and use reference data collections
  • Develop and manage custom rules to detect unusual activity in your network
  • Develop and manage custom action scripts to for automated rule response
  • Develop and manage anomaly detection rules to detect when unusual network traffic patterns occur

Who Should Attend

This course is intended for learners who are familiar with have following skills -

  • IT infrastructure, IT security fundamentals, Linux, Windows and TCP/IP

The training program is ideal for those working in positions such as, but not limited to –

  • Security Analysts, SOC Professionals, Security Technical Architects, Network & System Administrators or anyone want to learn using QRadar SIEM as Security Incident and Event Management (SIEM) toll.

Course Duration

  • 40 Hours (5 Days * 8 Hours).

Course Content / Outline

Foundation Training (3 Days * 8 Hours)

  • Module 1 - Introduction to IBM QRadar
  • Module 2 - IBM QRadar SIEM component architecture and data flows
  • Module 3 - Using the QRadar SIEM User Interface
  • Module 4 - Investigating an Offense Triggered by Events
  • Module 5 - Investigating the Events of an Offense
  • Module 6 - Using Asset Profiles to Investigate Offenses
  • Module 7 - Investigating an Offense Triggered by Flows
  • Module 8 - Using Rules
  • Module 9 - Using the Network Hierarchy
  • Module 10 - Index and Aggregated Data Management
  • Module 11 - Using the QRadar SIEM Dashboard
  • Module 12 - Creating Reports
  • Module 13 - Using Filters
  • Module 14 – Using the Ariel Query Language (AQL) for Advanced Searches
  • Module 15 - Analyzing a Real-World Large-Scale Attack

Advanced Training (2 Days * 8 Hours)

  • Module 1 - Creating log source types
  • Module 2 - Leveraging reference data collections
  • Module 3 - Developing custom rules
  • Module 4 - Creating Custom Action Scripts
  • Module 5 - Developing Anomaly Detection Rules