Curso de tres jornadas de duración para aprender a instalar, configurar y administrar con éxito QRadar SIEM. Orientado a personal con experiencia previa en QRadar ya sea en calidad de analistas, arquitectos de seguridad o pre-ventas técnicos. Esta capacitación se ofrece tanto en formato presencial como en remoto.
IBM Security QRadar SIEM allows you to minimize the time interval between suspicious activity and when it detects it. There are a variety of administrative tools that you can use to manage a QRadar SIEM deployment. This course covers system configuration, data source configuration, and remote network and service configuration. This course, with IBM BQ150 code, will allow you to fully understand all the features of the product.
Security analysts or SIEM tool managers with some experience in QRadar
Install and manage automatic updates of QRadar SIEM assets
Configure QRadar backup and restore policies
Leverage QRadar management tools to add, review, and interpret metrics
Use network hierarchy objects to manage SIEM QRadar objects and groups
Manage QRadar hosts and licenses and deploy assets
Monitor the status of resources in a QRadar deployment
Configure system settings and asset profiles
Configure the reasons QRadar administrators use to close crimes
Create and manage reference sets
Create the credentials used to perform authenticated scans
Manage, route, and store event and flow data
Use domains in QRadar SIEM to act as a filter for events, flows, scanners, assets, rules, violations, and retention policies.
Set up user accounts, including user profiles, authentication, and authorizations
Manage custom properties for assets, events, and flows
Manage QRadar log sources
Manage QRadar flow sources
Integrate Vulnerability Assessment Scanner Results into QRadar SIEM
Manage groups that monitor Internet networks and services
Unit 1: Auto Update
Unit 2: Backup and Recovery
Unit 3: Index and Aggregated Data Management
Unit 4: Network Hierarchy
Unit 5: System Managemen
Unit 6: License Management
Unit 7: Deployment Actions
Unit 8: High Availability management
Unit 9: System Health and Master Console
Unit 10: System Settings and Asset Profiler Configuration
Unit 11: Custom Offense Close Reasons
Unit 12: Store and Forward
Unit 13: Reference Set Management
Unit 14: Centralized Credentials
Unit 15: Forwarding Destinations
Unit 16: Routing Rules
Unit 17: Domain Management
Unit 18: Users, User Roles, and Security Profiles
Unit 19: Authentication
Unit 20: Authorized Services
Unit 21: Backup and Recovery
Unit 22: Custom Asset Properties
Unit 23: Log Sources
Unit 24: Log Soruce Groups
Unit 25: Log Source Extensions
Unit 26: Log Source Parsing Ordering
Unit 27: Custom Properties
Unit 28: Event and Flow Retention
Unit 29: Flow Sources
Unit 30: Flow Sources Aliases
Unit 31: VA Scanners
Unit 32: Remote Networks and Services
We also conduct tailor-made training, seminars and technical talks. On this website you have more information about it.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
Essential Website Cookies
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, you cannot refuse them without impacting how our site functions. You can block or delete them by changing your browser settings and force blocking all cookies on this website.
Other external services
We also use different external services like Google Webfonts, Google Maps and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Vimeo and Youtube video embeds: