Curso Security Incidents and Event Management with QRadar
16hVisão Geral
QRadar SIEM oferece uma visão profunda da atividade da rede, do utilizador e da aplicação. Fornece recolha, normalização, correlação e armazenamento seguro de eventos, fluxos, ativos e vulnerabilidades. As suspeitas de alegados ataques e violações de políticas são destacadas como ofensas. Neste curso, aprende-se a atravessar a interface do utilizador e investigar as infracções. Os participantes são treinados para procurar e analisar a informação a partir da qual o QRadar SIEM conclui uma atividade suspeita. Os exercícios práticos reforçam as competências aprendidas.
Objetivo
Após concluir o Curso Security Incidents and Event Management with QRadar, você será capaz de:
- Descrever como o QRadar SIEM recolhe dados para detectar actividades suspeitas
- Navegar e personalizar o painel de bordo do QRadar SIEM
- Investigar suspeitas de ataques e violações de políticas
- Pesquisar, filtrar, agrupar e analisar dados de segurança
- Investigar as vulnerabilidades e serviços dos bens
- Localizar regras personalizadas e inspeccionar acções e respostas de regras
- Use o QRadar SIEM para criar relatórios
- Utilize gráficos e aplique filtros avançados para examinar actividades específicas no seu ambiente
Publico Alvo
- Analistas de Segurança
- Arquitectos Técnicos de Segurança
- Gestores de ofensas
- Administradores de rede
- Administradores de sistema
Pre-Requisitos
- Conhecimentos básicos de Netwrok e administração de servidores.
Informações Gerais
Carga Horária: 16h
- Se noturno este curso é ministrado de Terça-feira à
sexta-feira, das 19h às 23h
- Se aos sábados este curso é ministrado das 9h às 18h
- Se in-company por favor fazer contato para mais detalhes.
Formato de entrega:
- 100% on-line ao vivo, via Microsoft Teams na presença de um
instrutor/consultor ativo no mercado.
- Nota: não é curso gravado.
Lab:
- Laboratório + Exercícios práticos
Materiais
Português | InglêsConteúdo Programatico
Introduction to IBM Security QRadar SIEM
- Purposes of QRadar SIEM
- QRadar SIEM and the IBM Security Framework
- Identifying suspected attacks and policy breaches
- Providing context
- Key QRadar SIEM capabilities
- QRadar SIEM Console
How QRadar SIEM collects security data
- Normalizing log messages to events
- Event collection and processing
- Flow collection and processing
- Reporting
- Asset profiles
- Active scanners
- QRadar Vulnerability Manager scanner
- Gathering asset information
Using the QRadar SIEM dashboard
- Navigating the Dashboard tab
- Dashboard overview
- Default dashboard
- QRadar SIEM tabs
- Other menu options
- Context-sensitive help
- Dashboard refresh
- Dashboard variety
- Creating a custom dashboard
- Managing dashboard items
Investigating an offense that is triggered by events
- Introduction to offenses
- Creating and rating offenses
- Instructor demonstration of offense parameters
- Selecting an offense to investigate
- Offense Summary window
- Offense parameters
- Top 5 Source IPs
- Top 5 Destination IPs
- Top 5 Log Sources
- Top 5 Users
- Top 5 Categories
- Last 10 Events
- Last 10 Flows
- Annotations
- Offense Summary toolbar
- Lesson 4 Acting on an offense
- Offense actions
- Offense status and flags
Investigating the events of an offense
- Navigating to the events
- List of events
- Event details: Base information
- Event details: Reviewing the raw event
- Event details: Additional details
- Returning to the list of events
- Filtering events
- Applying a Quick Filter to the payload
- Using another filter option
- Grouping events
- Grouping events by low-level category
- Removing grouping criteria
- Viewing a range of events
- Monitoring the scanning host
- Saving search criteria
- Event list using the saved search
- About Quick Searches
- Using alternative methods to create and edit searches
- Finding and loading a saved search
- Search actions
- Adding a saved search as a dashboard item
- Saving a search as a dashboard item
- Enabling time-series data
- Selecting the time range
- Displaying 24 hours in a dashboard item
- Modifying items in the chart type table
Using asset profiles to investigate offenses
- About asset profiles
- Creating asset profiles
- Navigating from an offense to an asset
- Assets tab
- Asset summary
- Vulnerabilities
Investigating an offense that is triggered by flows
- About flows
- Network Activity tab
- Grouping flows
- Finding an offense
- Offense parameters
- Top 5 Source and Destination IPs
- Top 5 Log Sources
- Top 5 Categories
- Last 10 Events
- Last 10 Flows
- Annotations
- Base information
- Source and destination information
- Layer 7 payload
- Additional information
- Creating a false positive flow or event
- Tuning a false positive flow or event
Using rules and building blocks
- About rules and building blocks
- About rules
- About building blocks and functions
- Navigating to rules
- Finding the rules that fired for an event or flow
- Finding the rules that triggered an offense
- Rule Wizard demonstration
- Rule Wizard
- Rule actions
- Rule response
Creating QRadar SIEM reports
- Reporting introduction
- Reporting demonstration
- Reports tab
- Finding a report
- Running a report
- Selecting the generated report
- Viewing a report
- Reporting demonstration
- Creating a new report template
- Choosing a schedule
- Choosing a layout
- Defining report contents
- Configuring the upper chart
- Configuring the lower chart
- Verifying the layout preview
- Choosing a format
- Distributing the report
- Adding a description and assigning the group
- Verifying the report summary
- Viewing the generated report
- Best practices when creating reports
Performing advanced filtering
- Filtering demonstration
- Flows to external destinations
- Remote to Remote flows
- Scanning activity
- Applications not running on the correct port
- Data loss
- Flows to suspect Internet addresses
- Filtering on custom rules and building blocks
- Grouping by custom rules
- Charts on Log and Network Activity tabs: Grouping
- Charts on Log and Network Activity tabs: Time range
- Capturing time-series data
- Viewing time series charts: Zooming to focus