QRadar SIEM, deployment and management course

Curso de tres jornadas de duración para aprender a instalar, configurar y administrar con éxito QRadar SIEM. Orientado a personal con experiencia previa en QRadar ya sea en calidad de analistas, arquitectos de seguridad o pre-ventas técnicos. Esta capacitación se ofrece tanto en formato presencial como en remoto.

IBM Security QRadar SIEM allows you to minimize the time interval between suspicious activity and when it detects it. There are a variety of administrative tools that you can use to manage a QRadar SIEM deployment. This course covers system configuration, data source configuration, and remote network and service configuration. This course, with IBM BQ150 code, will allow you to fully understand all the features of the product.

Security analysts or SIEM tool managers with some experience in QRadar

  • Install and manage automatic updates of QRadar SIEM assets
  • Configure QRadar backup and restore policies
  • Leverage QRadar management tools to add, review, and interpret metrics
  • Use network hierarchy objects to manage SIEM QRadar objects and groups
  • Manage QRadar hosts and licenses and deploy assets
  • Monitor the status of resources in a QRadar deployment
  • Configure system settings and asset profiles
  • Configure the reasons QRadar administrators use to close crimes
  • Create and manage reference sets
  • Create the credentials used to perform authenticated scans
  • Manage, route, and store event and flow data
  • Use domains in QRadar SIEM to act as a filter for events, flows, scanners, assets, rules, violations, and retention policies.
  • Set up user accounts, including user profiles, authentication, and authorizations
  • Manage custom properties for assets, events, and flows
  • Manage QRadar log sources
  • Manage QRadar flow sources
  • Integrate Vulnerability Assessment Scanner Results into QRadar SIEM
  • Manage groups that monitor Internet networks and services
  • Unit 1: Auto Update
  • Unit 2: Backup and Recovery
  • Unit 3: Index and Aggregated Data Management
  • Unit 4: Network Hierarchy
  • Unit 5: System Managemen
  • Unit 6: License Management
  • Unit 7: Deployment Actions
  • Unit 8: High Availability management
  • Unit 9: System Health and Master Console
  • Unit 10: System Settings and Asset Profiler Configuration
  • Unit 11: Custom Offense Close Reasons
  • Unit 12: Store and Forward
  • Unit 13: Reference Set Management
  • Unit 14: Centralized Credentials
  • Unit 15: Forwarding Destinations
  • Unit 16: Routing Rules
  • Unit 17: Domain Management
  • Unit 18: Users, User Roles, and Security Profiles
  • Unit 19: Authentication
  • Unit 20: Authorized Services
  • Unit 21: Backup and Recovery
  • Unit 22: Custom Asset Properties
  • Unit 23: Log Sources
  • Unit 24: Log Soruce Groups
  • Unit 25: Log Source Extensions
  • Unit 26: Log Source Parsing Ordering
  • Unit 27: Custom Properties
  • Unit 28: Event and Flow Retention
  • Unit 29: Flow Sources
  • Unit 30: Flow Sources Aliases
  • Unit 31: VA Scanners
  • Unit 32: Remote Networks and Services

We also conduct tailor-made training, seminars and technical talks. On this website you have more information about it.