Security intelligence solutions have evolved from a number of technologies you may be familiar with. In short, security intelligence builds on the data collection capabilities and compliance benefits of log management, the correlation, normalization and analysis capabilities of SIEM (security information and event management), the network visibility and advanced threat detection of NBAD (network behavior anomaly detection), the ability to reduce breaches and ensure compliance provided by risk management, and the network traffic and application content insight afforded by network forensics.
Yet what distinguishes a modern Security Intelligence solution is that it’s not a gift basket of discrete technologies wrapped together with duct tape, or worse, PowerPoint. It’s a truly integrated solution built on a common codebase, with a single data management architecture and a single user interface.
Security Overview.
Basics of Networking .
OSI & TCP Model.
Data explosion .
Penetration Testing.
Essentials of Cyber Security.
Types of Attacks and Basic Vulnerability.
Ping Attack .
Traceroute and WHOIS IP.
High Level Architecture of QRadar
Event Collector Architecture
Flow Collector Architecture .
Event Processor Architecture .
Flow Processor .
Console Magistrate .
Deployment of Qradar .
QRoC .
QRADAR User Interface .
Wifi Penetration Testing .
Bruteforce Attack .
Aircrack-ng .
Introduction to Nmap .
Nmap Discovery .
Email FootPrinting .
NCPA .
SQL Injection.
Authentication Bypass .
Union Based SQL Injection .
Web-Application Firewall Based SQL Injection .