Incident Investigation with IBM Security QRadar
Offered By: Pluralsight
Course Description
Overview
The incident response team is responsible for investigating offenses, determining the impact of incidents, and creating eradication/remediation plans. This course will teach you
how to respond to cyber incidents using the IBM Security QRadar SIEM.
The IBM Security QRadar is a complete SIEM solution that helps you to detect threats and investigate incidents. In this course, Incident Investigation with IBM Security QRadar, you’ll learn how to respond to cybersecurity incidents using the QRadar SIEM solution. First, you’ll explore the overall incident response process and the QRadar investigation best practices. Next, you’ll discover through our demos how to find indicators of compromise and investigate the main incident types using the SIEM. Finally, you’ll learn how to define a proper containment, eradication, and recovery plan. When you’re finished with this course, you’ll have the skills and knowledge of QRadar needed to respond to cyber incidents.
how to respond to cyber incidents using the IBM Security QRadar SIEM.
The IBM Security QRadar is a complete SIEM solution that helps you to detect threats and investigate incidents. In this course, Incident Investigation with IBM Security QRadar, you’ll learn how to respond to cybersecurity incidents using the QRadar SIEM solution. First, you’ll explore the overall incident response process and the QRadar investigation best practices. Next, you’ll discover through our demos how to find indicators of compromise and investigate the main incident types using the SIEM. Finally, you’ll learn how to define a proper containment, eradication, and recovery plan. When you’re finished with this course, you’ll have the skills and knowledge of QRadar needed to respond to cyber incidents.
Syllabus
- Course Overview 1min
- The Incident Response Process 17mins
- Incident #1: The Compromised AWS Cloud 45mins
- Incident #2: The Botnet 40mins
Taught by
Ricardo Reimao
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network