• Basics of z/OS RACF Administration

    COURSE CONTENT: • Review of z/Architecture, and z/O • An introduction to TSO/E and ISPF/PDF • An introduction to z/OS data sets • Batch processing • Security and RACF…

    Les mer
  • Effective RACF Administration

    COURSE CONTENT: Day 1 • Welcome • Unit 1 – Security and RACF overview • Unit 2 – Administering groups and users • Exercise 1 – Log on to…

    Les mer
  • IBM Guardium Data Protection Fundamentals

    COURSE CONTENT: Unit 1: Guardium overview Unit 2: Guardium architecture Unit 3: Guardium user interfaces Unit 4: Access management Unit 5: Guardium groups Unit 6: System management Unit 7:…

    Les mer
  • IBM QRadar SIEM Advanced Topics

    COURSE CONTENT: Unit 1: Custom log sources Unit 2: Reference data collections and custom rules Unit 3: IBM X-Force Threat Intelligence in QRadar Unit 4: User Behavior Analytics and…

    Les mer
  • IBM QRadar SIEM Foundations

    COURSE CONTENT: Topics • Unit 0: IBM Security QRadar 7.5 – Fundamentals • Unit 1: QRadar Architecture • Unit 2: QRadar UI – Overview • Unit 3: QRadar –…

    Les mer
  • IBM Verify: Adoption

    COURSE CONTENT: Verify architecture and sizing This unit introduces the architecture, core features, and extensibility of IBM Verify. It covers key capabilities such as single sign-on (SSO), multi-factor authentication…

    Les mer
  • IBM zSecure Admin Basic Administration and Reporting

    COURSE CONTENT: Unit 1: Run IBM Security zSecure Admin Unit 2: Select and display existing RACF profiles Unit 3: Perform profile maintenance Unit 4: Use Advanced options Unit 5:…

    Les mer
  • IBM zSecure Audit Rule-based Compliance Evaluation and Customization

    COURSE CONTENT: Unit 1: Rule-based compliance introduction and concepts Unit 2: Running compliance evaluations and interpret results Unit 3: Customizing compliance standards, rules, or tests   TARGET AUDIENCE:  The…

    Les mer
  • IBM zSecure CARLa Auditing and Reporting Language

    COURSE CONTENT: Unit 1: Introduction and the CARLa interface Unit 2: CARLa SELECT, SORTLIST, and DEFINE statements Unit 3: Frequently used CARLa functions Unit 4: NEWLIST and SUMMARY options…

    Les mer
  • IBM zSecure RACF and SMF Auditing

    COURSE CONTENT: Unit 1: Introduction to RACF auditing Unit 2: Auditing user IDs and passwords Unit 3: Auditing sensitive resources Unit 4: Auditing subsystems Unit 5: Auditing SMF Unit…

    Les mer
  • IBM zSecure RACF Management Workshop

    COURSE CONTENT: • Set up a RACF security environment for a hypothetical company based on their security policies and guidelines • Create and refresh the IBM Security zSecure Admin…

    Les mer
  • IBM zSecure UNIX System Services (USS) Security Overview

    COURSE CONTENT: Unit 1: UNIX System Services security introduction Unit 2: Protect files and directories Unit 3: Report and audit UNIX System Services   TARGET AUDIENCE:   This intermediate-level course…

    Les mer
  • QRadar EDR: Foundations

    COURSE CONTENT: Getting started • Dashboard overview • Architecture • QRadar EDR on-prem installation • Downloading, installing, and updating the QRadar EDR Agent Protecting your endpoints • Investigating threats…

    Les mer
  • QRadar EDR: Integrating with QRadar SIEM

    COURSE CONTENT: Unit 1: Integrating with QRadar SIEM • Configure an API application in QRadar EDR • Install a new log source in QRadar SIEM • Configure the correct…

    Les mer
  • QRadar SOAR: Foundations TDS_BQ405G

    COURSE CONTENT: Getting started • Describe architectural patterns • Install the product and configure license and access • Review the SOAR Console • Manage cases and use Breach Response…

    Les mer
  • QRadar SOAR: Integrating with SIEM TDS_BQ430G

    COURSE CONTENT: QRadar SOAR Integrating with SIEM • Installation of SIEM and SOAR apps from the X-Force Exchange • Configuring access to SOAR server on QRadar SIEM • Analyzing…

    Les mer
  • QRadar SOAR: Integration with Microsoft Active Directory TDS_BQ440G

    COURSE CONTENT: Section 1: Video of LDAP and Active Directory integration with QRadar SOAR Section 2: Lab   TARGET AUDIENCE:   • Security Operations Center (SOC) Analyst • Security…

    Les mer
  • QRadar UBA: Detecting Insider Threats

    COURSE CONTENT: Unit 1: Architecture and Overview Unit 2: Setup • Installation • Configuration • User Import • Machine Learning configuration Unit 3: Tuning Unit 4: An overview to…

    Les mer
  • Verify Access: Administration

    COURSE CONTENT: Architecture and deployment • Describe the components • Understand the deployment options • Install and configure Verify Access in a containerized environment • Install and configure Verify…

    Les mer
  • Verify Access: Deploy and Configure

    COURSE CONTENT: IBM Security Verify Access introduction • Understand the business context for identity and access management • Discuss the features and functions of IBM Security Verify Access Architecture…

    Les mer
  • Verify Access: PoPs- ACLs and Junctions

    COURSE CONTENT: • Managing access control • Explain the object space and the protected objects concept • Control access to the protected objects by using Access Control List (ACL)…

    Les mer