Security Intelligence Engineer, IBM Skills Academy @ Kaplan

Kaplan Singapore


Course introduction

Through an instructor-led classroom, this course will equip individuals with the ability to correlate events and flows from a variety of applications and devices, establish enterprise security rules, monitor policy compliance, and provide threat detection, using IBM QRadar SIEM. Individuals would be able to demonstrate an understanding of topics such as investigating offenses identified from events and flows, and create operational rules.



Course Benefits


Career Prospects And Opportunities

The knowledge and abilities imparted in this course will help learners in job roles such as:

  • Application Security Engineer
  • Cloud Solution Administrator
  • Predictive Analytics Modeler
  • Watson Cognitive Specialist 
IBM Open Badges
  • Security Intelligence Engineer: Explorer | Mastery Award



Target Audience


The courses suit working adults and just about anyone keen to bridge their digital skills gap and stand out from the competition.



Course Outline


This course comprises the following learning modules:

Module I – Cyber Security Overview

  • Status Quo of IT Security
  • Security Intelligence and Operations
Module II – Security Intelligence Foundations
  • Designing a Security Intelligence Solution
  • Security lntelligence Functional Components
Module Ill – Security Intelligence Engineer
  • Collecting and Processing Events, Flows, and Vulnerability Data
  • Investigating an Offense that is Triggered by Events
  • Using Asset Profiles to Investigate Offenses
  • Investigating an Offense that is Triggered by Flows
  • False Positives Overview
  • Investigating Superflows
  • Using Rules and Building Blocks
  • Creating SIEM Reports
  • Performing Advanced Filtering



Available Course Sessions


Please click here to stay updated on upcoming sessions.



Trainer Profile


Johnson Yeo

Having conducted training since 2003, his scope of training is extensive and varied, and it includes topics ranging from Operating Systems, Content Management Servers, Database Servers, Business Process Servers to application development, IT Security as well as IT Process Best Practices like ITIL.

Johnson possesses a strong belief in professionalism; he is well-liked by his students for his ability to conduct class in a lively, engaging and thought-provoking manner. Using real-life examples and use cases, he ensures that his classes are not conducted passively but instead promotes interaction through open-ended questions and sharing.



 

Top