After completing this course, you should be able to perform the following tasks:

  • Describe how QRadar SIEM collects data to detect suspicious activities
  • Describe the QRadar SIEM component architecture and data flows
  • Navigate the user interface
  • Investigate suspected attacks and policy violations
  • Search, filter, group, and analyze security data
  • Investigate events and flows
  • Investigate asset profiles
  • Describe the purpose of the network hierarchy
  • Determine how rules test incoming data and create offenses
  • Use index and aggregated data management
  • Navigate and customize dashboards and dashboard items
  • Create customized reports
  • Use filters
  • Use AQL for advanced searches
  • Analyze a real world scenario


This course is designed for security analysts, security technical architects, offense managers, network administrators, and system administrators using QRadar SIEM.


Before taking this course, make sure that you have the following skills:IT infrastructure

  • IT security fundamentals
  • Linux
  • Windows
  • TCP/IP networking
  • Syslog


Three days.


Chapter 1. Introduction to IBM QRadar
Chapter 2. IBM QRadar SIEM component architecture and data flows
Chapter 3. Using the QRadar SIEM User Interface
Chapter 4. Investigating an Offense Triggered by Events
Chapter 5. Investigating the Events of an Offense
Chapter 6. Using Asset Profiles to Investigate Offenses
Chapter 7. Investigating an Offense Triggered by Flows
Chapter 8. Using Rules
Chapter 9. Using the Network Hierarchy
Chapter 10. Index and Aggregated Data Management
Chapter 11. Using the QRadar SIEM Dashboard
Chapter 12. Creating Reports
Chapter 13. Using Filters
Chapter 14. Using the Ariel Query Language (AQL) for Advanced Searches
Chapter 15. Analyzing a Real-World Large-Scale Attack
Appendix A. A real-world scenario introduction to IBM QRadar SIEM
Appendix B. IBM QRadar architecture