Only a partial course catalog displayed. Please click here to log in to see the complete catalog.


Course Search Results

Found 28 courses tagged with "language_en".

In this lab course, you learn how to import structured data directly in the i2 Enterprise Intelligence Analysis Information Store.

This course demonstrates how IBM i2 Enterprise Insight Analysis (EIA) and IBM i2 Analyst's Notebook can enrich the analysis of an IBM QRadar offense by curating and importing data from several disparate sources into the EIA Information Store. In this use case, data from multiple sources is imported into i2 Analyst's Notebook where you use link analysis to uncover connections and networks among different entities as well as behavior patterns.

Among the topics that you will cover in this course are:

  • Using the Offense Investigator app to bring a QRadar offense into i2 Analyst's Notebook (ANB) and expanding on an offense
  • Connecting to (EIA) from i2 Analyst's Notebook to  to find data using Search and Visual Search tools from the Home toolbar
  • Using Expand and Expand with Conditions to bring linked items from the EIA Information Store into an ANB chart to visualize connections
  • Using i2 Analyst's Notebook analysis tools and the Analyze toolbar features like Search, List Items, Bar Charts and Histograms, Find Connecting Network
  • Bringing data from multiple sources into one analytical investigation to shut down security breaches and to find out who is behind them and why

Guardium S-TAP is a lightweight software agent installed on database servers. S-TAP agents collect the data that are used by traffic reports, alerts, and visualizations. S-TAP agents also enact certain policy rules.

In this hands on exercise, you install the S-TAP agent using the Guardium Installation Manager (GIM) and the Guardium GUI.

NEW

Threat Simulator is part of the QRadar Experience Center App. It contains five use cases for common threats, and for each of them, it generates a set of pre-defined logs in real time. These logs are displayed on the Log Activity tab of the Console as they are being received so that you can learn how to analyze them.

In this course, you learn how to run and analyze the results of each use case in the Threat Simulator.

Listen to one of MaaS360's subject matter experts quickly walk you through how to configure  MaaS360  for unified endpoint management (UEM). You will learn the key components to get you started managing all of your devices.

By default, IBM® Security QRadar® creates a backup archive of your configuration information daily at midnight. The backup archive includes your configuration information, data, or both from the previous day. You can customize this nightly backup and create an on-demand configuration backup, as required.

Importing a backup archive is useful if you want to restore a backup archive that was created on another IBM Security QRadar host.

By default, IBM® Security QRadar® creates a backup archive of your configuration information daily at midnight. The backup archive includes your configuration information, data, or both from the previous day. You can customize this nightly backup and create an on-demand configuration backup, as required.

You can back up and recover IBM® Security QRadar® configuration information and data by using the backup and recovery feature to back up your event and flow data.

When you create Guardium policies with multiple rules, you might want to ensure that processing does not stop when one rule is triggered. 

In this hands-on lab, you investigate the Continue to Next Rule check box and how it affects policy processing.

The prerequisite for this course is basic knowledge of configuring IBM Guardium Policy.

Example deployments of i2 Analyze have security schemas that allow the software to work, but are not suitable for production purposes. Before you go live, you must develop a security schema that meets the needs of your organization. An i2 Analyze security schema defines the security dimensions that exist in a deployment, and the dimension values that can be assigned to items and records. A security schema also defines the permissions that i2 Analyze users can receive.

The IBM i2 Enterprise Insight Analysis i2 Connect capability enables analysts to search for and retrieve data from external data sources that use the Opal quick search functionality, and then analyze the results on a chart in Analyst's Notebook Premium. To use i2 Connect, you must obtain or create a custom connector to the external data source that you want to search.

The web client is licensed as a part of the IBM i2 Enterprise Insight Analysis Investigate Add On. The web client can be used to search the Information Store.

This video demonstrates how to install QRadar Advisor with Watson and how to perform the initial setup. The video covers the prerequisites needed for the app and all settings relevant to the new configuration.

IBM MaaS360 is a comprehensive mobile management and security solution for devices, applications, and content. In this module, you learn how to set up a MaaS360 organization account using the MaaS360 portal. You learn to navigate the portal and use portal workflows to complete account configuration and begin managing your mobile enterprise. Duration: 3 hr 40min (Lecture), 90 min (Exercises)



IBM MaaS360 is a comprehensive mobile management and security solution for devices, applications, and content. In this module, you learn how to use MaaS360 to manage and secure the mobile apps for your enterprise.You learn how to build an enterprise app catalog using the MaaS360 portal and distribute the app catalog to mobile devices. Duration: 1hr 15min (Lecture), 1 hr (Exercises)

IBM MaaS360 is a comprehensive mobile management and security solution for devices, applications, and content. MaaS360 supports both single-customer organization accounts and multitenant hierarchy accounts. Hierarchy accounts enable IBM Business Partners to cobrand and manage the MaaS360 service for many tenants. This module provides an introduction to the MaaS360 multitenant architecture and supported hierarchies for various delivery models that can be exploited by service providers, resellers, and distributors. You learn how to set up a multitenant hierarchy account, navigate the portal using a hierarchy account, and provision and manage your tenants. Duration: 2 hours


IBM MaaS360 Operations and Troubleshooting describes the common administration tasks that should be considered by administrators responsible for supporting the operation of an IBM MaaS360 mobile enterprise. In addition, there are troubleshooting techniques that administrators and support can use to aid in problem determination. The end user portal features are described and demonstrated to help organizations understand how users can take advantage of self- help actions to alleviate help desk and support calls. Finally, there are Frequently Asked Questions (FAQs) in the course guide. The FAQs are not recorded but they are available in the course guide because it’s expected they will be updated frequently. The module includes recorded lecture, demonstrations and a student guide.

IBM MaaS360 is a comprehensive mobile management and security solution for devices, applications, and content. This module explains MaaS360 product capabilities, architecture, and integration points. You learn how to scope, plan, and evaluate deployment strategies for your enterprise mobility implementation.

Duration: 2 hours lecture, 1 hour exercises

In this module, you learn the MaaS360 Productivity Suite features that can be used to protect your organization’s corporate content on mobile devices. You learn how to configure services and security settings in the MaaS360 portal with a focus on the WorkPlace Persona policy. You also learn how to build a Content Library and distribute content to devices. Duration: 70 min (Lecture), 60 min (Exercises)

In this course you learn how to implement MaaS360 Unified Endpoint Management (UEM) for Windows devices, using modern API management.  You learn how to configure services and enroll Windows 10 devices, configure Windows MDM policies, build and distribute a MaaS360 App catalog with Windows apps, and create  Maas360 alerts and configure compliance rules.

In this demonstration, as a MaaS360 administrator, you learn how to add iOS devices from the user directory, enroll them using a one-time passcode, and review them in Device Inventory.

In this demonstration, you learn how to set up the Apple Push Notification service (APNS) certificate that is required for MDM providers to manage Apple devices.

In this demonstration, you learn how to navigate the MaaS360  collaborative apps for mail, calendar, and contacts on an iOS device.

In this training module, you learn the high-level MaaS360 enterprise integration architecture, how Cloud Extender and its modules fit into the architecture, and the functions of each Cloud Extender module.  


NEW

The MaaS360 portal provides one uniform view for managing all of your devices, content, and apps. In this video, you learn to navigate the IBM MaaS360 portal home page. 

The General Data Protection Regulation requires organizations to provide transparency about stored user data and to adhere to requests to remove all user data from their IT systems.

This video shows how QRadar UBA version 2.7 and later addresses these GDPR compliance requirements. We examine what user data is collected, and we demonstrate how to remove individual user data from UBA and stop tracking that user.


You can back up and recover IBM QRadar configuration information as well as event and flow data by using the backup and recovery feature. However, you must restore event and flow data manually. There are two types of backups: configuration backups and data backups.


Objectives

  • View backup archives
  • Create an on-demand configuration backup archive
  • Delete a backup archive
  • Schedule nightly backup
  • Import a backup archive