Training
IBM Security Verify Access Foundations ( TW108G )
IBM Security Verify Access* helps you simplify your users' access while more securely
adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a
virtual or hardware appliance, or containerized with Docker.
IBM QRadar SIEM Foundations ( BQ104G )
​IBM Security QRadar enables deep visibility into network, endpoint, user, and application
activity. It provides collection, normalization, correlation, and secure storage of events,
flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as
offenses. In this course, you learn about the solution architecture, how to navigate the user
interface, and how to investigate offenses. You search and analyze the information from
which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills
learned.
IBM Security Guardium Data Protection
Foundations ( 8G102G )
IBM Security® Guardium® Data Protection (Guardium) supports a zero trust
approach to security. It discovers and classifies sensitive data from across an
enterprise, providing real time data activity monitoring and advanced user behavior
analytics to help discover unusual activity around sensitive data.