Objectives

  • Create custom log sources to utilize events from uncommon sources
  • Create, maintain, and use reference data collections
  • Develop and manage custom rules to detect unusual activity in your network
  • Develop and manage custom action scripts to for automated rule reponse
  • Develop and manage anomoly detection rules to detect when unusual network traffic patterns occur

Audience

  • Security administrators
  • Security technical architects
  • Offense managers
  • Professional services using QRadar SIEM
  • QRadar SIEM administrators

Prerequisites

  • IT infrastructure
  • IT security fundamentals
  • Linux
  • Microsoft Windows
  • TCP/IP networking
  • Log files and events
  • Network flows

You should also have completed the IBM QRadar SIEM Foundations course.

Duration

Two days

Outline for IBM QRADAR SIEM ADVANCED TOPICS Training

Chapter 1. Creating log source types

Chapter 2. Leveraging reference data collections

Chapter 3. Developing custom rules

Chapter 4. Creating Custom Action Scripts

Chapter 5. Developing Anomaly Detection Rules