Отримати консультацію

IBM Security

Фільтри
Формат
Застосувати
Фільтри
Сортування
Сортування:
За замовченням
Вид:
9I13UA
IBM i2 iBase Essentials
Аудиторно, дистанційно
2 Днів, 16 Годин
9I14UA
IBM i2 iBase User
Аудиторно, дистанційно
3 Днів, 24 Годин
9I020UA
IBM i2 Analyst's Notebook Essentials
Аудиторно, дистанційно
3 Днів, 24 Годин
9I040UA
IBM i2 Analyst's Notebook Customizing and Semantics
Аудиторно, дистанційно
2 Днів, 16 Годин
9I030UA
IBM i2 Analysts Notebook Advanced
This i2 Analyst’s Notebook Advanced course is designed to provide students that have a working knowledge of Analyst’s Notebook, the opportunity to further their skills in search and discovery functions. This course will focus on how to set up Advanced Import Specifications, Advanced Analytic techniques using the i2 Analytic Tools, and use of the display tools that turn the data and analysis results into actionable intelligence.
Аудиторно, дистанційно
2 Днів, 16 Годин
9I150UA
i2 iBase Designer
Аудиторно, дистанційно
3 Днів, 24 Годин
8G101UA
IBM Security Guardium (V11) Foundations
Learn how to configure Guardium V11 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity.
Аудиторно, дистанційно
3 Днів, 24 Годин
BQ104GUA
IBM QRadar SIEM Foundations
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.
Аудиторно, дистанційно
3 Днів, 24 Годин
BQ204GUA
IBM QRadar SIEM Advanced Topics
QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses.
This 2-day course walks you through various advanced topics about QRadar such as custom log sources, reference data collections and custom rules, X-Force data and the Threat Intelligence app, UBA and QRadar Advisor, tuning and custom action scripts. The course also discusses integration with IBM SOAR. Hands-on exercises reinforce the skills learned.
Аудиторно, дистанційно
2 Днів, 16 Годин
Отримати консультацію
Свяжитесь со мной
Отримати консультацію
Отправить заявку
Реєстрація на вебінар
Отправить заявку
Ваша заявка отримана!
Ми зв`яжимося з вами найближчим часом.