Welcome to the IBM Security Learning Academy

The course catalog, shown below, is organized by product segment. Click a product segment to start browsing the available courses and subjects.

Thank you for visiting the site. Please check back often as the site is continually updated with new content.

 

Only a partial course catalog displayed. Please click here to log in to see the complete catalog.


Click a product segment to view a list of subjects and courses

Latest Courses

Explore the latest additions to the Security Learning Academy.

Application Security

Products:

  • AppScan Enterprise
  • AppScan Standard
  • AppScan Source
  • Application Security in the Cloud

IBM’s industry leading application security solutions help the enterprise mitigate risk while strengthening compliance.

Data Security

Products:

  • Guardium
  • Security Key Lifecycle Management

IBM® Security Guardium® is designed to safeguard critical data wherever it resides.

IBM® Security Key Lifecycle Manager centralizes, simplifies, and automates the encryption key management process to help minimize risk and reduce operational costs of encryption key management.

Endpoint Management: IBM BigFix

Products:

  • BigFix Platform
  • BigFix Inventory
  • BigFix Lifecycle

IBM BigFix secures all your endpoints from laptops, desktops and servers to point-of-sale devices, ATMs and kiosks.

Identity, Access and Governance

Products:

  • Identity Manager
  • Access Manager
  • Identity Governance
  • Directory Suite
  • Privileged Identity Manager

IBM® Security identity and access management solutions help strengthen compliance and reduce risk by protecting and monitoring user access in today's multi-perimeter environments. 

Identity and access management solutions from IBM help:

  • Safeguard mobile, cloud and social access.
  • Prevent advanced insider threats.
  • Simplify cloud integrations and identity silos.
  • Deliver actionable identity intelligence.

Incident Response

Resilient Systems’ Incident Response Platform (IRP) is the leading platform for orchestrating and automating incident response processes.

Infrastructure Security

Products:

  • IBM QRadar Network Security (XGS)
  • IBM Security SiteProtector
  • IBM QRadar Network Security Manager

Learn what a next-generation IPS is, how to deploy it in your network, and how to install, set up, and configure to guard your network infrastructure with Ahead of the Threat® protection.

i2

Products:

  • IBM i2 Enterprise Insight Analysis
  • IBM i2 Analyst's Notebook
  • IBM i2 iBase

IBM i2 Enterprise Insight Analysis helps your organization turn overwhelming and disparate data into actionable insight and intelligence, in near real time. From national security and defense, to cyber and enterprise-wide threats, the solution helps you develop a comprehensive understanding of your threat landscape to identify vulnerabilities and disrupt threats. The combination of machine-led analytics and human-led analysis capabilities helps you quickly find hidden connections and critical patterns buried in internal, external and open-source data.  

IBM i2 Analyst's Notebook is a visual analysis tool that helps you turn data into intelligence. The solution provides innovative features such as connected network visualizations, social network analysis, and geospatial or temporal views to help you uncover hidden connections and patterns in data. This insight can help you better identify and disrupt criminal, cyber and fraudulent threats.

IBM i2 iBase is an intuitive intelligence data management application that enables collaborative teams of analysts to capture, control and analyze multi-source data in security-rich workgroup environments. It addresses the analyst’s daily challenge of discovering and uncovering networks, patterns and trends in today’s increasing volumes of complex structured and unstructured data. i2 iBase provides a multi-user data sharing environment that combines rich analysis and visualization capabilities with dissemination tools.

Mainframe: zSecure

Products:

  • zSecure

IBM mainframe security solutions can help you protect your enterprise, detect threats, comply with policy and regulations and reduce costs.

Managed Security Services

When you partner with IBM for all your managed security needs, you are accessing the full depth and breadth of IBM's expertise.

Mobile Security: IBM MaaS360

IBM® MaaS360® with Watson™ is a unified endpoint management (UEM) platform used to manage and safeguard enterprise mobile devices, apps and content. Thousands of organizations of all sizes across all industries trust MaaS360 with Watson as the foundation for their digital transformation with mobile. With Watson, MaaS360 delivers cognitive UEM with strong security controls across users, devices, apps and content to support endpoint and mobile deployments.

Delivered from a best-in-class IBM Cloud on a mature, trusted platform, MaaS360 helps to manage a wide variety of devices for multiple users from a single console, and provide integration with solutions from Apple, Google, Microsoft and other suppliers of management tools. IBM works hand-in-hand with these suppliers not only to provide integration but to ensure that integration can occur as soon as new tools or updates to existing tools are available

To follow a guided learning path based on your role, click Training roadmaps in the IBM MaaS360 General tile and select your role. For example, there are training roadmaps for Administrators, Help Desk, Business Partner Administrators, Trial Customers, and Integration Professionals:


  • Administrators are responsible for setting up the MaaS360 portal account and carrying out daily operations and troubleshooting for an enterprise.
  • Business Partner Administrators are responsible for setting up multiple customer accounts under their partner hierarchy account and can provide Level 1 support for their accounts.
  • Help Desk personnel, provide Level 1 support to the mobile device users in an enterprise. Level 1 support can include resetting passwords, helping with enrollment issues, lost devices, configuration problems, and access issues.
  • Trial customers are evaluating the MaaS360 product using a 30 day trial portal account and require high level introductions to various topics, features, and functions.
  • Integration Professionals are responsible for configuring cloud to on-premise and cloud to cloud integrations for an enterprise. This role primarily works with enabling and configuring MaaS360 Cloud Extender modules to integrate with email servers, corporate intranet resources, directory services, and certificate authorities.

Security Intelligence

Products:

  • QRadar SIEM
  • QRadar Vulnerability Manager
  • QRadar Incident Forensics
  • QRadar Advisor with Watson
  • User Behavior Analytics (UBA)
 
The IBM QRadar Security Intelligence Platform provides a unified architecture for integrating core functionality to prevent, detect and respond to attacks, including security analytics, threat hunting, incident response, and threat intelligence with network and endpoint protection, into one centralized Security Operations Center user interface.

Systems Integration

Point solutions do not solve security problems and fail to provide context and insights. IBM offers integrated security solutions that simplify management, include a broad span of coverage, and create intelligence from the security data gathered from your organization.

Threat Intelligence

Products:

  • X-Force Exchange

IBM X-Force Exchange is a collaborative threat intelligence platform that helps security analysts add external context to internal indicators and speed security investigations

IBM Trusteer

Outthink fraudsters with IBM Trusteer

IBM Trusteer products deliver a holistic fraud prevention platform. Here, you will find our solutions for online, mobile and cross-channel fraud.

Cyber Security Fundamentals

This category contains courses and presentations collected from cyber security experts and events around the world. These courses are designed to give a broad understanding of current cyber security principles, topics and threats. These fundamentals courses were selected to discuss over-arching cyber security principles and to demonstrate the context in which IBM products are used to solve complex security problems.

For technical training in the use of IBM Security products, you will find hundreds of free courses and hands on labs listed in the product-specific categories of the IBM Security Learning Academy.