Course Search Results
Found 33 courses tagged with "Think 2018".
In this two part lab, you
learn how to configure MaaS360 Cloud Extender’s Certificate Integration module
to integrate with a Microsoft CA to provision identity certificates for mobile
devices. After you set up the Certificate Integration module, you configure the
Enterprise Gateway module to use identity certificates for authentication.
In these exercises, you configure Transport Layer Security (TLS) (also known as SSL) communication between IBM Directory Server and IBM Directory Integrator.
In this lab, you configure HTTP transformation rules to modify HTTP requests and responses passing through the reverse proxy junctions.
In this lab, you configure Access Manager V9.0.3 to facilitate
authentication to the WebSphere Liberty application using JSON Web Tokens (JWT).
This lab provides a sample configuration that enables Liberty application to authenticate and authorize against the Access Manager LDAP user registry using an LTPA cookie.
THIS COURSE IS RETIRED.
Visit the following course for the updated version: Configuring client certificate and step-up authentication
This lab covers how to use the user certificates issued by a trusted authority for the client certificate authentication. It also demonstrates step-up authentication using client certificate as a second level of authentication.
IBM Access Manager supports device fingerprinting to allow tracking of a user across multiple devices and browsers.
This lab provides steps to configure Advanced Access Control policies to register a client device or browser using one-time password (OTP) sent to a user's email address.
The user is allowed access once OTP verification is complete.
The lab demonstrates silent and consent-based device registrations. It also covers how administrators and end users can manage device fingerprints.
Duration: 1 hour 30 minutes
IRLP code: SEC9753
You generate the OTP either using the OTP Generator demo application provided in the lab or by using a mobile app on your phone, for example, IBM Verify or Google Authenticator.
Guardium gathers a large amount of data about your database environment. You use reports and queries to learn the details of your data security environment. In this virtual lab, you create a dashboard, simple query, and report that is used to examine user data you generate.
The lab environment reflects Guardium 10.5.
In this lab you create a replication topology. You do this by creating and configuring directory server instance idspeer2 that will serve as a second master in the peer to peer replication. (first master is idspeer1. You also create and configure a standalone instance idsalone that will be a forwarder from idsrepl1 and a partial replica of the o=sample subtree.
Guardium data security policies help flag suspicious database activity and events. In this virtual lab, you create a policy that will detect and alert on database login failures that occur multiple times over a short time period.
For each incoming event and flow, QRadar SIEM evaluates rules to test for indicators that suggest an attack or policy violation. In this lab, you learn how to create custom rules, building blocks, custom event properties, and a reference set to detect an example suspicious activity.
- Create and use custom event properties
- Create and use a reference set
- Add tests to new custom rules and building blocks
- Leverage function tests
- Configure rule actions and responses
The information in this Open Mic will help keep you out of trouble and possibly rescue you in the case of full appliance issues.
- First Response
- Getting to Root Cause
- Questions & Answers
In the follow-up to the Open Mic, John spends time answering audience questions on that and other topics.
- Reboot the appliance
- Issues with fixes
- The Discovery engine
- High CPU
The IBM Security App Exchange is a collaborative platform that can help integrate and utilize the collective knowledge of security professionals through code sharing. The App Exchange offers enhancements and integration between IBM Security products, and can include other security vendors, such as Trend Micro, Cisco, Qualys, and so on.
The majority of the security integration offerings today is available for the IBM® QRadar® product line. The IBM Security App Exchange provides an expanded hub of QRadar content. IBM QRadar provides a RESTful API that allows access to the QRadar resources and data.
This lab guide demonstrates the tools that can help you to develop new apps for QRadar. You can use two type of tools for your app development:
- QRadar App Editor
- QRadar SDK
The labs are using IBM QRadar Community Edition, or IBM QRadar CE.
This course teaches you how to take advantage of the information posted in IBM X-Force Exchange (XFE) platform by using the API, curl tool, and python language.
The course also demonstrates integration between XFE and QRadar SIEM using XFE SDK and direct integration or Threat Intelligence Application and TAXII endpoints.
- Learn how to leverage the X-Force Exchange API, curl tool, and python scripts to pull threat data from the X-Force Exchange platform
- Install the Threat Intelligence app in QRadar SIEM
- Test the API using online documentation
- Use curl commands and the X-Force Exchange API documentation to simulate browser requests
- Write a python script that uses X-Force Exchange API code
- Use TAXII feeds, collections, and the QRadar Threat Intelligence app to integrate the X-Force Exchange API and QRadar SIEM
- Configure threat data feeds to monitor and detect ransomware outbreaks
This Open Mic session was broadcast live from Think on 19-Mar-2018
Chris Weber from the IBM Support team delivered the "IBM Security Identity Governance and Administration Data Integrator (ISIGADI) Tips and Troubleshooting" Open Mic LIVE at the 2018 Think conference.
- Logs and logging settings
- IGI SDK
- Creating new IGI admin ID
- Verify assembly line
- ISIGtoISIM assembly line
- Delta assembly line
- Validate assembly line
- ISIM person attribute mapping
In this course, you will learn about ingesting data into the i2 Analyze Information
Store. This covers how to populate staging tables, how to create a
mapping file, as well as, how to run the data ingestion command.
Data that is stored within IBM i2 Analyze is secured on a need to know basis. The security model allows you to determine the type of access groups of users will get.
An IBM i2 Enterprise Insight Analysis (EIA) system comprises of a number of components that you must configure before data can be ingested. Staging tables have to be created and mapping files will need to be defined in order to ingested data into the Information Store. EIA comes with example files and data to assist with these tasks as well as ingestion commands to get data into the Information Store.This is a standalone lab, that will walk you through exercises needed to manually import data into iBase and search for that data via the Base Connector.
i2 Enterprise Insight Analysis (EIA) is an enterprise intelligence analysis solution that facilitates information sharing and intelligence production. This course will cover the deployment of an EIA product, specifically the process of updating and deploying a custom schema.
You will also learn how to edit or update an existing schema using the Schema Designer. This course will also walk you through the process of ingesting data in the EIA Information Store from an external data source.
In this course, you will deploy IBM i2 Analyze, which is part of the Enterprise Insight Analysis (EIA) solution. i2 Analyze provides the collaboration and search services in EIA. You will create an example Opal deployment that includes the Information Store that is connected to use the i2 Analyze Opal services. After you deploy the Information Store, you can access the data that it contains by using Analyst's Notebook Premium (ANBP). You will also learn to configure Quick Search and Visual Query.
i2 Enterprise Insight Analysis (EIA) is an enterprise intelligence analysis solution that facilitates information sharing and intelligence production. This course will walk students through an example implementation on how data from an external source, in this case QRadar, data can be extracted, transformed, and loaded in the i2 Enterprise Insight Analysis (EIA).
This course is intended for users who want to programmatically extract data on-demand from the QRadar ariel database and add it to the i2 EIA Information Store.
As part of an IBM i2 Analyze deployment, an iBase connector provides a mechanism for providing users with access to an IBM i2 iBase database. The database becomes available in the Intelligence Portal as a data source that users can select and interact with.
There are two reasons for integrating iBase with a deployment of i2 Analyze. One reason is that you already have an iBase deployment, and you want to retain your data and your data model as you upgrade or migrate to i2 Analyze. The other reason is that you already have a deployment of i2 Analyze 4.1, and you want to use iBase as a way to ingest data from other data sources.
Note: This is an online, interactive lab. You will download and follow the lab guide using the associated elab. The elab will be available for 4 hours of runtime so be sure to set aside enough time to complete the lab in one setting. You will only have access to the lab for a 5 day period from when you start the lab.
In this session presented live at Think 2018, we review the framework built to leverage IBM Security Access Manager (ISAM) REST APIs using Python/Ansible to fully automate all changes to ISAM. This provides an overview for new customers and assists those who are already leveraging this approach.
This Open Mic was presented LIVE at Think 2018 and covered use of the REST APIs with IBM Security Identity Manager.
IBM Security Identity Manager (ISIM) product experts answered client questions about identity and governance during this Security Learning Academy Live session at Think 2018, 19 March 2018.
In this lab, you will learn how to deploy a test environment that integrates IBM MaaS360 and IBM Cloud Identity Essentials with a third-party SaaS (cloud) application.
This lab covers the following three main OAuth 2.0 workflows supported by IBM Access Manager: Authorization code, Implicit grant, and Resource owner password credentials (ROPC).
This Open Mic Live session was originally broadcast from Think 2018 19-March-2018.
Nick Lloyd and Steven Hughes from Access Manager Technical Support deliver this Open Mic LIVE at
the 2018 Think conference.
This session covers IBM Security Access Manager appliance networking.
This Open Mic Live session was originally broadcast from Think 2018 19-March-2018.
Nick Lloyd and Thomas Ermis from Access Manager Technical Support deliver this Open Mic LIVE at the 2018 Think conference.
This session covers an overview of Docker and IBM Security Access Manager for Docker.
In this course you learn to plan and construct complex, distributed IBM
Directory Server (IDS) environments using several methods.
This course is designed for personnel who are responsible for the deployment, troubleshooting, and ongoing performance maintenance of IBM Directory Server distributed environments.
Intermediate to advanced knowledge of IBM Directory Server is required.
Distributed directories are essential to the successful deployment of IBM Directory Server (IDS). IDS provides a robust set of replication options you can use. In this course, you learn how to create two server instances and configure and test a simple replication.
The lab includes the following exercises:
- Intermediate / Advanced working knowledge of Directory Server
- Experience using Linux
Duration: 1hr 30m
Course version: 1.0