TDS_BQ610G | QRadar UBA: Detecting Insider Threats | Training Course | IBM. Skip to main Content

QRadar UBA: Detecting Insider Threats

  • Course Code BQ610G
  • Duration 1 day

Course Delivery

Virtual Learning Price

eur850.00

excl. VAT

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview

Top

Learn how to detect insider threats triggered by anomalous or malicious user behavior. Get ready to install, configure, and tune IBM Security® QRadar UBA and the Machine Learning app. Improve your skill to investigate user behavior with UBA and expand your threat detection capabilities across your network with the QRadar® Advisor with Watson app.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Schedule

Top
    • Delivery Format: Virtual Learning
    • Date: 18 July, 2025
    • Location: Virtual

    eur800.00

    • Delivery Format: Virtual Learning
    • Date: 07 November, 2025
    • Location: Virtual

    eur800.00

Target Audience

Top

Security Analyst

Course Objectives

Top
  • Analyze UBA concepts, such as the senseValue variable, risk scores, and the IBM Sense DSM.
  • Identify how QRadar rules are connected to UBA and how user information is imported into the app.
  • Install and configure the app, as well as the User Import tool and the the Machine Learning app.
  • Tune UBA settings to improve the application's behavior and performance.
  • Analyze how UBA can help you detect and investigate insider threats.
  • Analyze how to use the UBA Dashboard.
  • Investigate how to detect malicious user behavior.

Course Content

Top

Unit 1: Architecture and Overview

Unit 2: Setup

  • Installation
  • Configuration
  • User Import
  • Machine Learning configuration

Unit 3: Tuning

Unit 4: An overview to detecting and investigating insider threats

Unit 5: Student exercise

Cookie Control toggle icon