Only a partial course catalog is displayed. Please log in to see the complete catalog.
Incident Response Courses (7):
- Global and workspace roles
- Role categories
- Predefined roles
- Creating roles
- Deleting roles
- Workspace key concepts
- Create workspace
- Delete workspace
This course covers several alternative mechanisms for authenticating users in the IBM Resilient product, including LDAP, SAML and two-factor authentication.
- LDAP authentication
- SAML authentication configuration
- Two-factor authentication
Duration: 22 minutes
This course demonstrates how to manage logs in the IBM Resilient appliance. This includes how to configure logging, audit logging and syslog.
- 1. Log configuration
- 2. Configuring audit logs
- 3. Configuring syslog
Duration: 8 minutes
This course covers aspects of managing users and groups in IBM Resilient such as creating users using the Resilient user-interface or by using terminal commands and how to reassign incidents and tasks to a different user.
- Creating a user using using the UI
- Creating a user using terminal commands
- Reassigning incidents and tasks
- Enabling LDAP authentication
- Enabling LDAP users in groups and deleting LDAP users
course reviews key issues in managing security in IBM Resilient. Topics
cover a broad range of issues such as how to defang a URL, change
ciphers and protocols, how to work with keyvaults, keystores and secrets
as well as how to encrypt and backup the keyvault password.
- Defanging URLs
- This video demonstrates how to "defang" your URLs in IBM Resilient to
help assure users do not inadvertently click on malicious links.
- This video demonstrates how to change the ciphers and protocol in IBM
Resilient. There is a review of which ciphers and protocols are used by
default using the nmap application, followed by a demonstration of which
files need to be edited in order to adjust the ciphers and protocols
- This video discusses keyvaults, keystores and secrets within IBM Resilient.
- This video describes how to encrypt a keyvault password in IBM Resilient. The keyvault password is stored as an unencrypted file by default but can be encrypted using gpg to protect it and decrypted whenever needed.
- The keyvault stores all passwords used within IBM Resilient. If the
keyvault were lost, it would result in a considerable loss of data. For
that reason, the Resilient platform runs a backup of keyvault files to
the system database anytime passwords are
added or removed and after each system upgrade. This video shows how
to use the resutil keyvaultrestore command to restore keyvault files from the system database.
Duration: 19 minutes
- Configuring SSL/TSL certificates
- Importing the Resilient License Key
- Updating the Resilient Appliance Software
- Installing optional packages
- Setting the time zoneSMTP Email configuration