Security Intelligence Latest

Security Intelligence Latest Courses:


Using a particular use case, this video demonstrates how to take advantage of reference data collections in QRadar SIEM.


In this video series, you learn how QRadar can map your network flows to applications using different techniques. 

In part 1, we configure QRadar to assign an application name to flow records when a specific source IP address and port combination is detected. In parts 2 and 3, we configure QRadar to assign an application name to flow records based on various information found in the payload of the flow data.


The IBM QRadar SIEM Foundation badge focuses on the foundation skills that are required for IBM QRadar customers in different roles: architects, administrators, and security analysts.

To earn the IBM QRadar SIEM Foundation badge, you must complete each of the 19 required courses and pass a 63 question quiz with a score of 80 percent or higher.

All courses are free of charge and can be found on the Security Learning Academy in the QRadar Security Intelligence > SIEM category.

Note: The two hours time estimate on the front page of this course refers to the time it can take to complete the quiz. The 19 required courses, which can be taken separately from this course, add up to 13 - 14 hours of learning.


Employees in every organization are granted different levels of clearance to access information and classified or restricted areas based on their job profiles, such as different network locations, applications, or data. This process includes users who manage and have access to IT security products that protect the organization's critical resources, such as QRadar. 

Every organization implements its own security policies to provide users with different permissions according to their roles. In this context, QRadar provides the ability to segment users' access based on a combination of factors, which can yield granular results. The information contained in QRadar includes network hierarchy and topology, assets, log and flow sources, event and flow data, offenses, scanning activity, management activity, and more. 

This course introduces QRadar user management foundations, where you learn about user accounts and the different methods to authenticate, and how to implement granular user controls, such as user roles, security profiles, domains, and tenants.