-
Basics of z/OS RACF AdministrationLes mer
COURSE CONTENT: • Review of z/Architecture, and z/O • An introduction to TSO/E and ISPF/PDF • An introduction to z/OS data sets • Batch processing • Security and RACF…
-
Effective RACF AdministrationLes mer
COURSE CONTENT: Day 1 • Welcome • Unit 1 – Security and RACF overview • Unit 2 – Administering groups and users • Exercise 1 – Log on to…
-
IBM Guardium Data Protection FundamentalsLes mer
COURSE CONTENT: Unit 1: Guardium overview Unit 2: Guardium architecture Unit 3: Guardium user interfaces Unit 4: Access management Unit 5: Guardium groups Unit 6: System management Unit 7:…
-
IBM QRadar SIEM Advanced TopicsLes mer
COURSE CONTENT: Unit 1: Custom log sources Unit 2: Reference data collections and custom rules Unit 3: IBM X-Force Threat Intelligence in QRadar Unit 4: User Behavior Analytics and…
-
IBM QRadar SIEM FoundationsLes mer
COURSE CONTENT: Topics • Unit 0: IBM Security QRadar 7.5 – Fundamentals • Unit 1: QRadar Architecture • Unit 2: QRadar UI – Overview • Unit 3: QRadar –…
-
IBM Verify: AdoptionLes mer
COURSE CONTENT: Verify architecture and sizing This unit introduces the architecture, core features, and extensibility of IBM Verify. It covers key capabilities such as single sign-on (SSO), multi-factor authentication…
-
IBM zSecure Admin Basic Administration and ReportingLes mer
COURSE CONTENT: Unit 1: Run IBM Security zSecure Admin Unit 2: Select and display existing RACF profiles Unit 3: Perform profile maintenance Unit 4: Use Advanced options Unit 5:…
-
IBM zSecure Audit Rule-based Compliance Evaluation and CustomizationLes mer
COURSE CONTENT: Unit 1: Rule-based compliance introduction and concepts Unit 2: Running compliance evaluations and interpret results Unit 3: Customizing compliance standards, rules, or tests TARGET AUDIENCE: The…
-
IBM zSecure CARLa Auditing and Reporting LanguageLes mer
COURSE CONTENT: Unit 1: Introduction and the CARLa interface Unit 2: CARLa SELECT, SORTLIST, and DEFINE statements Unit 3: Frequently used CARLa functions Unit 4: NEWLIST and SUMMARY options…
-
IBM zSecure RACF and SMF AuditingLes mer
COURSE CONTENT: Unit 1: Introduction to RACF auditing Unit 2: Auditing user IDs and passwords Unit 3: Auditing sensitive resources Unit 4: Auditing subsystems Unit 5: Auditing SMF Unit…
-
IBM zSecure RACF Management WorkshopLes mer
COURSE CONTENT: • Set up a RACF security environment for a hypothetical company based on their security policies and guidelines • Create and refresh the IBM Security zSecure Admin…
-
IBM zSecure UNIX System Services (USS) Security OverviewLes mer
COURSE CONTENT: Unit 1: UNIX System Services security introduction Unit 2: Protect files and directories Unit 3: Report and audit UNIX System Services TARGET AUDIENCE: This intermediate-level course…
-
QRadar EDR: FoundationsLes mer
COURSE CONTENT: Getting started • Dashboard overview • Architecture • QRadar EDR on-prem installation • Downloading, installing, and updating the QRadar EDR Agent Protecting your endpoints • Investigating threats…
-
QRadar EDR: Integrating with QRadar SIEMLes mer
COURSE CONTENT: Unit 1: Integrating with QRadar SIEM • Configure an API application in QRadar EDR • Install a new log source in QRadar SIEM • Configure the correct…
-
QRadar SOAR: Foundations TDS_BQ405GLes mer
COURSE CONTENT: Getting started • Describe architectural patterns • Install the product and configure license and access • Review the SOAR Console • Manage cases and use Breach Response…
-
QRadar SOAR: Integrating with SIEM TDS_BQ430GLes mer
COURSE CONTENT: QRadar SOAR Integrating with SIEM • Installation of SIEM and SOAR apps from the X-Force Exchange • Configuring access to SOAR server on QRadar SIEM • Analyzing…
-
QRadar SOAR: Integration with Microsoft Active Directory TDS_BQ440GLes mer
COURSE CONTENT: Section 1: Video of LDAP and Active Directory integration with QRadar SOAR Section 2: Lab TARGET AUDIENCE: • Security Operations Center (SOC) Analyst • Security…
-
QRadar UBA: Detecting Insider ThreatsLes mer
COURSE CONTENT: Unit 1: Architecture and Overview Unit 2: Setup • Installation • Configuration • User Import • Machine Learning configuration Unit 3: Tuning Unit 4: An overview to…
-
Verify Access: AdministrationLes mer
COURSE CONTENT: Architecture and deployment • Describe the components • Understand the deployment options • Install and configure Verify Access in a containerized environment • Install and configure Verify…
-
Verify Access: Deploy and ConfigureLes mer
COURSE CONTENT: IBM Security Verify Access introduction • Understand the business context for identity and access management • Discuss the features and functions of IBM Security Verify Access Architecture…
-
Verify Access: PoPs- ACLs and JunctionsLes mer
COURSE CONTENT: • Managing access control • Explain the object space and the protected objects concept • Control access to the protected objects by using Access Control List (ACL)…