Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

IBM Security QRadar SIEM Administration

GK# 4378 Vendor# BQ150G

$1695 - $2395 CAD

Enroll Request Group Training

Course Overview

TOP

In this course, you will learn how to minimize the time between when suspicious activity occurs and when you detect it. There are a variety of administrative tools you can use to manage a QRadar SIEM deployment. This course covers system configuration, data source configuration, and remote networks, and services configuration.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Install and manage automatic updates to QRadar SIEM assets
  • Configure QRadar backup and restore policies
  • QRadar administration tools to aggregate, review, and interpret metrics
  • Network hierarchy objects to manage QRadar SIEM objects and groups
  • Manage QRadar hosts and licenses and deploy assets
  • Monitor the health of assets in a QRadar deployment
  • Configure system settings and asset profiles
  • Configure reasons that QRadar administrators use to close offenses
  • Create and manage reference sets
  • Configure user accounts including user profiles and authorizations
  • Manage QRadar log sources
  • Store event and flow data
  • Manage QRadar flow sources
  • Manage groups that monitor Internet networks and services

Outline

TOP
Viewing outline for:

Classroom Live Outline

Course Outline:

  1. Auto Update
  2. Backup and Recovery
  3. Index and Aggregated Data Management
  4. Network Hierarchy
  5. System Management
  6. License Management
  7. Deployment Actions
  8. High Availability management
  9. System Health and Master Console
  10. System Settings and Asset Profiler Configuration
  11. Custom Offense Close Reasons
  12. Reference Set Management
  13. Authorized Services
  14. Users, User Roles, and Security Profiles
  15. Log Sources
  16. Log Source Extensions
  17. Log Source parsing Ordering
  18. Event and Flow Retention
  19. Flow Sources
  20. Flow Sources Aliases
  21. Remote Networks and Services

Prerequisites

TOP
  • Basic knowledge of the purpose and use of a security intelligence platform
  • Familiarity with the Linux command line interface and PuTTY
  • Familiarity with Custom Rules engine (CRE) rules
  • Familiarity with the Ariel database and its purpose in QRadar SIEM
  • Have attended IBM Security QRadar SIEM Foundations or be able to navigate and use the QRadar SIEM Console

Who Should Attend

TOP

QRadar SIEM administrators and professional services personnel managing QRadar SIEM deployments

Course Delivery

This course is available in the following formats:

Classroom Live

Receive face-to-face instruction at one of our training center locations.

Duration: 3 day

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 3 day

Request this course in a different delivery format.
Enroll