Security Intelligence Analyst - Instructor Award for Professionals 2016 - Badge
Name
Security Intelligence Analyst - Instructor Award for Professionals 2016.
Issuer
IBM.
Description
Under guidance of an experienced instructor; this badge earner has demonstrated the ability to teach others correlating events and flows from a variety of applications and devices; establishing enterprise security rules; monitor policy compliance; and providing threat detection; using IBM QRadar SIEM. This individual has demonstrated proficiency teaching students topics such as investigating offenses identified from events and flows; and create operational rules.
Badge Criteria
What it takes to earn this badge:
- Expected to be an Information Technology professional working for IBM an IBM Customer or Business Partner and attending the IBM Skills Academy.
- Teaching of Module I - Cyber Security Overview: Covering Status quo of IT Security and Security Intelligence and Operations.
- Teaching of Module II - Security Intelligence Foundations: Covering Designing a Security Intelligence Solution and Security Intelligence functional components.
- Teaching of Module III - Security Intelligence Analsyt: Covering Collecting and processing events flows and vulnerability data Investigating an offense that is triggered by events Investigating the events of an offense Using asset profiles to investigate offenses Investigating an offense that is triggered by flows False positives overview Investigating superflows Using rules and building blocks Creating SIEM repts and Perfming advanced filtering.
- Teaching the course under the supervision of a qualified instruct and receiving teaching approval from the supervising instruct.
- Receiving a 70% positive survey feedback.
- Receiving the Mastery Award f Professionals 2016.
Tags
Skills indicated by the badge
QRadar SIEM|Security Offenses|Security Vulnerabilities|Security Offense Rules|Security Intelligence|Advanced Security Threats|Enterprise Security Architecture|Threat Intelligence Feed|Host Definition Building Blocks|Advanced Filtering|Investigating Security Offenses|False Positives|Event Offenses|Collecting Events|Processing Events|Vulnerability Data|Asset Profiles|SIEM Reports|Security Analyst