Only a partial course catalog is displayed. Please log in to see the complete catalog.
QRadar Network Insights Courses (3):
Attackers can't hide on your network with IBM QRadar Network Insights. Security teams are flooded with security log activity every day, but inspecting those logs does not always generate the level of insight required to detect modern threats. They are
eager to find additional methods to provide more accurate threat detection.
In this video, an attacker infiltrates and takes over a victim's computer by exploiting a phishing attack with a malicious attachment.
QRadar Network Insights analyzes network data in real-time to uncover the attacker’s footprint and expose the hidden security threats in this scenario.
The IBM QRadar Network Insights appliance can provide detailed analysis of network flows to extend the threat detection capabilities of IBM QRadar. This video demonstrates how to add an already installed QNI appliance into a QRadar deployment and how to deploy the license key.
This course teaches you how to configure a QRadar Network Insights appliances stack, which consists of a hardware and software setup. First, you learn how to use network ports in a stacking deployment. Then, you run an interactive simulation to configure
the QNI stack.