Introducing the Metabyte IBM Security training for Managers and Engineers.
The IBM QRadar supported by the IBM X-Force threat intelligence, provides security intelligence and analytics for advanced threats by Consolidating, Normalizing and Correlating log events and network flows to identify advanced Security threats viewed through a real-time dashboard across the entire infrastructure.
This in-depth FREE training is provided by Metabyte’s Security Architect, Jeff McCardel, an expert in QRadar, XGS, BigFix, Guardium and Resilient.
This in-depth FREE training is provided by Metabyte’s Security Architect, Jeff McCardel, an expert in QRadar, XGS, BigFix, Guardium and Resilient.
This training will be conducted for both Managers and Engineers as a 2 part training on Wednesday, March 29th 2017.
8:00AM - 9:00AM PST for Managers
9:10AM - 10:00AM PST for Engineers
8:00AM - 9:00AM PST for Managers
9:10AM - 10:00AM PST for Engineers
Training for Managers - Part 1
In the first hour, Jeff will present an overview of QRadar, where you will:
In the first hour, Jeff will present an overview of QRadar, where you will:
- Learn about the most advanced and robust threat detection, prioritization and remediation Security solution
- Learn the purpose and capabilities of the QRadar SIEM
- Learn how QRadar is the centerpiece of IBM security integration
- Learn how dashboards can be used to consolidate research for network and system teams, in addition to security.
- Learn how QRadar can replace several tools with one by providing a unified console for vulnerability management, risk management, and forensics in addition to SEIM
- Learn how to use charts and advanced filters to improve your security metrics and response times
Training for Architects - Part 2
In the second hour, Jeff will get more technical, and demonstrate a workflow for researching a security incident discovered in QRadar. In this demonstration, you will:
- Learn how to investigate the information contained in an offense and respond to an offense
- Learn how to find, filter, and group events in order to gain critical insights about the offense
- Learn how to create and edit a search that monitors the events of suspicious hosts
- Learn how to find custom rules in the QRadar SIEM console, assign actions and responses to the rule, and how to configure rules
- Learn how to navigate and customize the dashboard tab