Courses by IBM Security

  • Course: StarLink - IBM InfoSphere Guardium V10
  • Length: 3 days

Course Details:


  • Windows User Skills
  • Relational Databas Skills
  • Linux Administrator Skills

Key Takeaways:

  1. Learn how to implement & support Guardium solutions in your environment
  2. Learn how to create reports, audits, alerts, compliance oversight processess and database access policies and controls
  3. Learn about systems administration, archiving, purging and back-ups


– Introduction and Technical Overview – Presentation
– Guardium Architecture – Presentation
– Installation and Configuration – Presentation
– Installation and Configuration – Lab
– Security Policy and Logging – Presentation
– Security Policy and Reporting – Lab


Domains and Reporting – Presentation

– Real-time and Correlation Alerts – Presentation
– Correlation Alerts – Lab
– Quarantine – Presentation
– Quarantine – Lab
– Compliance Automation – Presentation
– Compliance Automation – Lab


– Data Classification - Presentation 
– Data Classification – Lab
– Access Management  – Presentation
– Access Management – Lab
– Vulnerability Assessment - Presentation
– Vulnerability Assessment - Lab


– Redaction -Presentation
– Redaction – Lab
– What is the difference in v10? - Presentation
– Query Rewrite - Presentation
– File Activity Monitoring – Presentation
– File Activity Monitoring – Lab
– Advanced Administration – Presentation

- Q&A session

Certificates will be provided upon completion of the training.

  • Course: StarLink - IBM QRadar Training
  • Length: 3 Days

Course Summary -

QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, topologies, and vulnerabilities. Suspected attacks and policy
breaches are highlighted as offenses. In this course, you learn how to navigate QRadar SIEM to detect anomalies and unusual behavior. Using the skills taught in this course, you can identify and investigate threats and attacks. Hands-on
exercises reinforce the skills learned.

Pre-Requisites -

This training program is aimed for Security Analysts, Network Administrators & System Admins with basic understanding of TCP/IP networking, Familiarity with log-files and events. Also basic understanding of IT security fundamentals and
LINUX fundamentals is recommended.

Course Outlines -

DAY 1 -
-Introduction to SIEM
-Log Activity
-Network Activity
-Advanced Filtering
-Hands - on Labs

Day 2 -
-Asset and Vulnerability Assessment
-Offense Investigation
-Hands-On Labs

Day 3 -
-Building Rules and Offenses
-Building Universal DSM Log Sources
-Qradar Tuning
-Fine tuning false positives
-Hands-On Labs

Certificates will be provided on completion of the training.

Register Now