Получить консультацию

IBM Security

Фильтры
Формат
Применить
Фильтры
Сортировка
Сортировка:
По умолчанию
Вид:
9I13UA
IBM i2 iBase Essentials
Аудиторно, дистанционно
2 Дней, 16 Ак. Часов
9I14UA
IBM i2 iBase User
Аудиторно, дистанционно
3 Дней, 24 Ак. Часов
9I020UA
IBM i2 Analyst's Notebook Essentials
Аудиторно, дистанционно
3 Дней, 24 Ак. Часов
9I040UA
IBM i2 Analyst's Notebook Customizing and Semantics
Аудиторно, дистанционно
2 Дней, 16 Ак. Часов
9I030UA
IBM i2 Analysts Notebook Advanced
This i2 Analyst’s Notebook Advanced course is designed to provide students that have a working knowledge of Analyst’s Notebook, the opportunity to further their skills in search and discovery functions. This course will focus on how to set up Advanced Import Specifications, Advanced Analytic techniques using the i2 Analytic Tools, and use of the display tools that turn the data and analysis results into actionable intelligence.
Аудиторно, дистанционно
2 Дней, 16 Ак. Часов
9I150UA
i2 iBase Designer
Аудиторно, дистанционно
3 Дней, 24 Ак. Часов
8G101UA
IBM Security Guardium (V11) Foundations
Learn how to configure Guardium V11 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity.
Аудиторно, дистанционно
3 Дней, 24 Ак. Часов
BQ104GUA
IBM QRadar SIEM Foundations
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.
Аудиторно, дистанционно
3 Дней, 24 Ак. Часов
BQ204GUA
IBM QRadar SIEM Advanced Topics
QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses.
This 2-day course walks you through various advanced topics about QRadar such as custom log sources, reference data collections and custom rules, X-Force data and the Threat Intelligence app, UBA and QRadar Advisor, tuning and custom action scripts. The course also discusses integration with IBM SOAR. Hands-on exercises reinforce the skills learned.
Аудиторно, дистанционно
2 Дней, 16 Ак. Часов
Получить консультацию
Свяжитесь со мной
Получить консультацию
Отправить заявку
Регистрация на вебинар
Отправить заявку
Ваша заявка получена!
Мы свяжемся с вами в ближайшее время.