Сhat now

Security

Filters
Delivery format
Apply
Filters
Sort by
Sort by:
Default
View:
9I020UA
IBM i2 Analyst's Notebook Essentials
This course provides the essential skills required to use IBM i2 Analyst's Notebook as a tool in your analytical role to hold, search, analyze and disseminate data.
Classroom Live, virtual classroom live
3 Days, 24 Acad. Hours
9I030UA
IBM i2 Analysts Notebook Advanced
This i2 Analyst’s Notebook Advanced course is designed to provide students that have a working knowledge of Analyst’s Notebook, the opportunity to further their skills in search and discovery functions. This course will focus on how to set up Advanced Import Specifications, Advanced Analytic techniques using the i2 Analytic Tools, and use of the display tools that turn the data and analysis results into actionable intelligence.
Classroom Live, virtual classroom live
2 Days, 16 Acad. Hours
9I040UA
IBM i2 Analyst's Notebook Customizing and Semantics
Classroom Live, virtual classroom live
2 Days, 16 Acad. Hours
9I13UA
IBM i2 iBase Essentials
Classroom Live, virtual classroom live
2 Days, 16 Acad. Hours
9I14UA
IBM i2 iBase User
Classroom Live, virtual classroom live
3 Days, 24 Acad. Hours
BQ105GUA
IBM QRadar SIEM Foundations
New
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.
Classroom Live, virtual classroom live
3 Days, 24 Acad. Hours
BQ205GUA
IBM QRadar SIEM Advanced Topics
New
QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses.
This 2-day course walks you through various advanced topics about QRadar such as custom log sources, reference data collections and custom rules, X-Force data and the Threat Intelligence app, UBA and QRadar Advisor, tuning and custom action scripts. The course also discusses integration with IBM SOAR. Hands-on exercises reinforce the skills learned.
Classroom Live, virtual classroom live
2 Days, 16 Acad. Hours
Сhat now
Свяжитесь со мной
Сhat now
Отправить заявку
Registration for the webinar
Отправить заявку
Your application has been received! We will contact you soon.