Skip to main content

Security Intelligence Engineering Training

Learn how to use information security tools and techniques to secure your information and communication assets

Program Overview

Currently, the cost of cybercrime for the global economy has been estimated at $445 billion annually. The need to protect a company’s online data infrastructure is now more important as information technology continues to advance.

In partnership with IBM’s skills academy, the University of Wollongong in Dubai is offering the Security Intelligence Engineering Training.

This track enables professionals to learn the essential security intelligence and event management techniques to consolidate event logs from device endpoints within a network, in order to identify threats.

Through this training, attendees will gain knowledge and hands-on skills in topics such as data security, event offenses, asset profile offenses and event rules, thus enabling them to investigate oenses that are generated from network logs and create rules that will prevent them from happening further.

What the Programs Covers

This program will allow participants to:

  • Acquire knowledge and practical skills in the areas of Security Intelligence.
  • Gain an in-depth understanding of Information Security concepts, including the collection of events, flows, and vulnerability data, the investigation of an oense triggered by events, creation of SIEM reports and performing of advanced filtering.
  • Obtain an IBM Digital Certification in Security Intelligence Engineering.

Key Program Benefits

Upon completing this training and receiving your IBM Mastery Badge as Security Intelligence Engineer, you will be able to:

  • Identify enterprise business and IT drivers that influence the overall IT Security Architecture
  • Define the role of a centralized Security Intelligence solution and how it integrates with other IT enterprise security components
  • Explain how a Security Intelligence solution can be used to investigate and stop advanced threats and address IT governance and regulatory compliance
  • Describe how QRadar SIEM collects data to detect suspicious activities
  • Navigate and customize the QRadar SIEM dashboard
  • Investigate suspected attacks and policy breaches
  • Search, filter, group, and analyze security data
  • Search, filter, group, and analyze security data
  • Investigate the vulnerabilities and services of assets
  • Locate custom rules and inspect actions and responses of rules
  • Use QRadar SIEM to create customized reports

Who should take this course?

Information security constitutes a strategic objective in the UAE and worldwide, with the main aim of securing information and communication assets. This course is ideal for senior managers, middle managers, entrepreneurs and business owners who have a keen interest in investing in and adopting information security practices. It is also aimed at those in more technical roles who would like to take on a leadership role in using security tools to secure their organisations' information and communication infrastructures.

What you will learn

This training program consists of 40 hours of instructor-led training and self-paced readings. The instructor lead training combines traditional teaching components, with case studies, in-class discussions, and hands-on activities performed on virtual labs, to enable working knowledge and experience with security intelligence related tools.

Learning Modules

The training consists of three main modules, offered over five days:

MODULE 1 - Cyber Security Overview
  • Status quo of IT security
  • Security intelligence and operations
 
MODULE 2 – Security Intelligence Foundations
  • Designing a security intelligence solution
  • Security intelligence functional components
 
MODULE 3 – Security Intelligence Engineer
  • Collecting and processing events, flows, and
    vulnerability data
  • Investigating an offense that is triggered by events
  • Investigating the events of an offense
  • Using asset profiles to investigate offenses
  • Investigating an offense that is triggered by flows
  • False positives overview
  • Investigating super-flows
  • Using rules and building blocks
  • Creating SIEM reports
  • Performing advanced filtering

IBM Open Badges:

Security Intelligence Engineer: Explorer | Mastery Award

IBM Badge
IBM Badge
 

Meet the Instructor:

Dr Soly Mathew Biju

Dr Soly Mathew Biju is currently an Associate Professor at the Faculty of Engineering and Information Sciences, University of Wollongong in Dubai. Dr Biju has achieved the Chartered IT Professional status which is a symbol of excellence in the field of IT and is also an ISTQB-certified software testing professional. She is also a Fellow of the Higher Education Academy, UK

Dr Biju has been in the field of teaching, training, network administration and software development since 1999. Prior to joining UOWD, she worked for various universities including University of Wales, Robert Kennedy College and Champlain College. She is a certified online instructor and has worked extensively on online teaching methods and online material design and development.

Her research interests include machine learning, data security, software testing, cryptography, e-learning, innovations in teaching, agile software development, online teaching, network security and programming techniques. She has papers published in reputed journals and books and presented and reviewed papers at national and international conferences and journals. She has been a scientific and organising committee member on various national and international conferences.

 

For more information please email us on info@uowdubai.ac.ae

Copyright © 2019 University of Wollongong in Dubai   | Privacy | Disclaimer | Site map

Enquiry Form
WhatsApp