Length – 16 hours
IBM® Security QRadar® enables you to minimize the time gap between when a suspicious activity occurs and when you detect it. Attacks and policy violations leave their footprints in log events and network flows of your IT systems. To connect the dots, QRadar SIEM correlates these scattered events and flows into offenses that alert you to suspicious activities. Using the skills taught in this course, you will be able to configure processing of uncommon events, work with reference data, and develop custom rules, custom actions, and custom anomoly detection rules.
IT security fundamentals.
Log files and events.
You should also have completed the IBM QRadar SIEM Foundations course.
Security technical architects
Professional services using QRadar SIEM
QRadar SIEM administrators
Creating log source types.
Leveraging reference data collections.
Developing custom rules.
Creating Custom Action Scripts.
Developing Anomaly Detection Rules.