QRadar SIEM

Click roadmap title to expand/collapse roadmap

QRadar Fundamentals

The total time required to complete this roadmap is 17h 24m.

This roadmap provides a QRadar platform overview and explains core concepts and functionality. This roadmap uses five pathways for navigation.

Overview

These courses introduce you to basic QRadar concepts and architecture.

Core functionality

These courses explain the functional components and core concepts of QRadar.

Apps

These courses introduce you to the extensibility of the QRadar platform through deployment of additional apps.

Skill badges

IBM Digital badges provide valuable credentials that prove the skills you have obtained in a specific role.

Commercial courses

Commercial courses cover a broad range of fundamental tasks.Tasks are described in the course summary of each course. If you prefer an instructor-led training program, these commercial courses are for you. The topics covered in the commercial courses can also be studied through Security Learning Academy online courses.

Click roadmap title to expand/collapse roadmap

QRadar SIEM Administrator

The total time required to complete this roadmap is 46h 53m.

QRadar Administrators deploy, configure, and maintain the overall QRadar infrastructure based on a holistic deployment architecture. They further maintain all operational tasks to ensure that the QRadar solution performs according to the key performance indicators.

Operational Tasks

These courses teach you how to perform operational tasks for your QRadar environment.
Sizing and Scoping your QRadar SIEM Deployment Open Mic
Intermediate
Deploy Changes in QRadar
Intermediate
Using QRadar SIEM License Management
Foundational
QRadar License Management event and flow processing capacity
Foundational
License Management in QRadar SIEM
Foundational
Index Management in IBM Security QRadar SIEM
Intermediate
Aggregated Data Management in IBM Security QRadar SIEM
Intermediate
QRadar foundations - Data retention
Foundational
QRadar SIEM Log Source Custom Properties
Advanced
Configuring the QRadar log source parsing order
Intermediate
QRadar Log Source Management App 6.0
Foundational
Configuring Log File log sources for QRadar
Intermediate
Managing Disconnected Log Collectors with the QRadar Log Source Management app
Intermediate
QRadar Log Source Management App - Webinar
Intermediate
How to add an App Host to QRadar SIEM
Intermediate
Planning your migration from QRadar App Node to App Host
Intermediate
Adding a QNI appliance to the QRadar deployment
Foundational
Setting up a QRadar Network Insights appliances stack
Foundational
How to use IBM X-Force Threat Intelligence and integrate with QRadar SIEM
Intermediate
QRadar SIEM Operational Tasks
Intermediate
Using QRadar SIEM backup management
Foundational
Deploying managed QRadar WinCollect agents
Intermediate
QRadar Software Updates and Best Practice Admin Checklist Open Mic
Advanced
QRadar upgrades best practices - Open Mic
Intermediate
QRadar Sysmon QRadar Sysmon and Windows Endpoint Detection - Open MicOpen Mic
Intermediate
Maintaining QRadar 101 - Open Mic
Intermediate
Keeping QRadar up-to-date
Foundational
Deployment resilience and high availability for QRadar
Intermediate
Academy Service Level Agreement and Contacts

DevOps

These courses teach you how to implement extensions and enhancements in your QRadar environment.
Determining indicators for threat detection with QRadar SIEM
Intermediate
Managing Custom Rules in QRadar SIEM
Intermediate
Developing Custom Rules in IBM QRadar SIEM
Intermediate
Local versus global rules in QRadar SIEM
Intermediate
Overview of Building Blocks in QRadar SIEM
Intermediate
How to configure rule actions in QRadar SIEM
Intermediate
Using host definition and host reference building blocks in QRadar SIEM
Intermediate
How to locate rules that triggered in QRadar SIEM
Foundational
Developing efficient rules in QRadar SIEM
Advanced
Using the Rule Explorer in the QRadar Use Case Manager app
Advanced
Investigating anomalies by understanding Anomaly Rules in QRadar
Intermediate
Developing Anomaly Detection Rules in IBM QRadar SIEM
Intermediate
QRadar reference data collections use cases
Intermediate
Introduction to Custom Action Scripts
Foundational
QRadar SIEM Integration & Extension
Intermediate
Creating custom log sources in QRadar SIEM
Intermediate
Log source autodetection and properties with the QRadar DSM Editor
Advanced
Developing log source types in QRadar SIEM
Intermediate
Configuration and benefits of an AWS log source in QRadar
Intermediate
Configuring and testing AWS CloudTrail log source with SQS queue in QRadar
Intermediate
Utilizing the Log Event Extended Format (LEEF) in QRadar
Foundational
QRadar log sources - General configuration tips
Foundational
Creating an offense for monitoring an internal log source in QRadar
Intermediate
QRadar Tuning - Open Mic
Intermediate
Tuning QRadar using the Use Case Manager App
NEW
Advanced
Protect against ransomware using Guardium Data Encryption and QRadar
Foundational
QRadar Use Case Manager Overview
Intermediate
QRadar Use Case Manager - New Features
Intermediate
QRadar Use Case Manager v2.3 Updates
Intermediate
Creating reports in QRadar SIEM
Foundational
QRadar SIEM API
Advanced

Troubleshooting

These courses teach you how to perform basic troubleshooting tasks in your QRadar environment.

Click roadmap title to expand/collapse roadmap

QRadar SIEM Analyst

The total time required to complete this roadmap is 22h 44m.

QRadar SIEM Analysts are responsible for monitoring security incidents, investigating security event log information and network flows, scheduling vulnerability scanning, and coordinating remediation activities.

Investigations

These courses teach you how to investigate and remediate security threats in your IT environment Operational Tasks

Click roadmap title to expand/collapse roadmap

QRadar SIEM Architect

The total time required to complete this roadmap is 16h 34m.

QRadar SIEM Architects work in unison with IT Security Architects in an organization to design the holistic QRadar deployment architecture by integrating important log sources, network flows, assets, and user population.

Operational Tasks

These courses teach you how to perform operational tasks for your QRadar environment.

DevOps

These courses teach you how to implement extensions and enhancements in your QRadar environment.

Click roadmap title to expand/collapse roadmap

Managed Security Service Providers (MSSP)

The total time required to complete this roadmap is 4h 50m.

This roadmap depicts enablement assets for Managed Security Service Providers (MSSP). In addition to this roadmap, MSSPs should consider the assets that are provided in the QRadarFundamentals roadmap.

MSSP Foundation

These courses provide you with MSSP-related content covering concepts and architecture.

Apps integration

These courses cover the extensibility of the QRadar platform by deploying additional apps, with special emphasis for MSSPs.

Domain and Tenant Management for QRadar

In this course, you learn about domain and tenant management capabilities in IBM Security QRadar. Managed Security Service Providers (MSSPs) use these capabilities to provide services to their customers in a shared multi-tenant environment. Multi-divisional organizations can benefit from these features as well.

Domain and tenant management capabilities are essential when you want to provide services from a shared QRadar environment. Every internal customer becomes a tenant in your QRadar deployment and each has different requirements. To separate your tenants' data, you define domains.

What's new in QRadar 7.4 - Webinar

In this video, you learn about the following new capabilities and features of IBM Security QRadar 7.4:

  • QRadar focus in 2020
  • Platform updates
  • Data management
  • QRadar Network Insights 
  • QRadar Vulnerability Manager 
  • QRadar Apps
  • QRadar Community Edition 

QRadar flow analysis and investigations

IBM Security QRadar flows represent network activity by normalizing IP addresses, ports, byte and packet counts, and other data, into flow records, which are records of network sessions between two hosts. Flows are a differentiating component in QRadar that provide detailed visibility into your network traffic.

In this course, you learn how QRadar analyzes your flow data for applications, flow direction, and superflows. You also learn how to build a QRadar flow rule, and how to perform flow searches in QRadar.


QRadar Log Source Management App 6.0

This video provides an overview of key Log Source Management app features. In addition to the overview, the video demonstrates how to bulk add and bulk edit log sources, and how to test log sources with the app.

Objectives

  • Learn about the new Disconnected Log Manager feature
  • Explore the Log Source Management app user interface
  • Learn how to bulk add and edit log sources
  • Learn how to test log sources to confirm whether they are configured correctly

Configuring Log File log sources for QRadar

This course teaches you how to avoid many common issues when configuring log sources for QRadar that use the Log File protocol.  In addition, you also learn how to configure both FTPS and passwordless SCP authentication for Log File log sources.  Finally, you learn how to configure and test Log File log sources in the QRadar Log Source Management app.

QRadar Architectural patterns for Managed Security Service Providers

This course provides an introduction to IBM Security QRadar architectural patterns for Managed Security Service Providers (MSSPs). 

An MSSP provides Security Operations Center (SOC) services to customers of different sizes and requirements. This will result in different architectural patterns and use of QRadar Console, Event collectors (EC), Event processors (EP), and Disconnected Log Collectors (DLC).

The intent of the MSSP SOC is to offer services to multiple clients and at the same time to ensure confidentiality, integrity, and availability of services and data to their clients. To accomplish this goal, the QRadar components can be deployed across three zones that rely on the QRadar core functions for data isolation, such as users access management, domains, and tenants.