Threat Hunt with IBM Security QRadar
Offered By: Pluralsight
Course Description
Overview
The threat hunter is responsible for investigating malicious
activity on the environment and detecting advanced
persistent threats (APTs). This course will teach you how to
hunt for threats using the IBM Security QRadar SIEM.
The IBM Security QRadar is a complete SIEM solution that helps you to detect threats and investigate cyber-attacks. In this course, Threat Hunt with IBM Security QRadar, you’ll learn how to investigate malicious activity and detect advanced persistent threats (APTs) using the QRadar SIEM solution. First, you’ll explore the overall threat hunt process and the hunting best practices. Next, you’ll discover through our demos how to find indicators of compromise and detect threats using behavior techniques and the QRadar SIEM. Finally, you’ll learn how to improve your detection mechanisms based on the results of your hunting. When you’re finished with this course, you’ll have the skills and knowledge of QRadar needed to threat hunt.
activity on the environment and detecting advanced
persistent threats (APTs). This course will teach you how to
hunt for threats using the IBM Security QRadar SIEM.
The IBM Security QRadar is a complete SIEM solution that helps you to detect threats and investigate cyber-attacks. In this course, Threat Hunt with IBM Security QRadar, you’ll learn how to investigate malicious activity and detect advanced persistent threats (APTs) using the QRadar SIEM solution. First, you’ll explore the overall threat hunt process and the hunting best practices. Next, you’ll discover through our demos how to find indicators of compromise and detect threats using behavior techniques and the QRadar SIEM. Finally, you’ll learn how to improve your detection mechanisms based on the results of your hunting. When you’re finished with this course, you’ll have the skills and knowledge of QRadar needed to threat hunt.
Syllabus
- Course Overview 1min
- The Threat Hunting Process 15mins
- Case #1: Intelligence-based Threat Hunting 38mins
- Case #2: Behavior-based Threat Hunting 45mins
Taught by
Ricardo Reimao
Related Courses
Ciberseguridad. Entender los ataques para desplegar contramedidasUniversidad Rey Juan Carlos via Miríadax The Security Challenge
nullcon via YouTube Behind Enemy Lines
Hack In The Box Security Conference via YouTube The State of the Stalkerware - Eva Galperin - USENIX Enigma Conference - 2020
USENIX Enigma Conference via YouTube Remote Access, the APT
BSidesLV via YouTube