COURSE 6 – CYBER THREAT INTELLIGENCE

Module 5: SIEM Platforms

IBM CYBERSECURITY ANALYST PROFESSIONAL CERTIFICATE

Complete Coursera Study Guide

INTRODUCTION – SIEM Platforms

Welcome to an exciting module where you will delve into the realm of Security Information and Event Management (SIEM) platforms, unlocking their potential to bolster cybersecurity defenses. Throughout this course, you will explore the intricacies of SIEM platforms, gaining a comprehensive understanding of their functionalities, capabilities, and implementation strategies.

By immersing yourself in hands-on exercises and practical applications, you will have the opportunity to apply your newfound knowledge in real-world scenarios, honing your skills in threat detection, incident response, and security analytics. Get ready to harness the power of SIEM platforms to enhance organizational security posture and mitigate the ever-evolving cyber threats with confidence and proficiency.

Learning Objectives

  • Investigate cybersecurity events using QRadar Advisor with Watson
  • Describe the features and functions of an industry example using QRadar Advisor with Watson
  • Explain the benefits of artificial intelligence (AI) for cyberanalysts
  • List the challenges that SOCs face
  • List the advantages of an integrated UBA solution in a security operation center (SOC)
  • Describe use cases for UBA
  • Investigate user behavior using the IBM QRadar User Behavior Analytics app (UBA)
  • Analyze and report on cybersecurity events using IBM QRadar SIEM
  • Explain the features of QRadar for security analysis
  • Discuss different SIEM solutions and their components
  • Describe key considerations for deploying a SIEM system
  • Explore the role of SIEM in networks and moderate security operation centers
  • Define the key terms for security information event management (SIEM)

SIEM CONCEPTS KNOWLEDGE CHECK

1. Which three (3) of the following are core functions of a SIEM? (Select 3)

  • Consolidates log events and network flow data from thousands of devices, endpoints and applications distributed throughout a network (CORRECT)
  • Blocks actions or packet flows that violate security policies
  • Manages network security by monitoring flows and events (CORRECT)
  • Collects logs and other security documentation for analysis (CORRECT)

Partially correct!

2. True or False. SIEMs capture network flow data in near real time and apply advanced analytics to reveal security offenses.

  • True (CORRECT)
  • False

3. Which of these describes the process of data normalization in a SIEM?

  • Removes duplicate records from incoming data
  • Compresses incoming
  • Turns raw data into a format that has fields that SIEM can use (CORRECT)
  • Encrypts incoming data

4. True or False. A SIEM considers any event that is anomalous, or outside the norm, to be an offense.

  • True (CORRECT)
  • False

5. True or False. A large company might have QRadar event collectors in each of their data centers that are configured to forward all collected events to a central event processor for analysis.

  • True (CORRECT)
  • False

6. The triad of a security operations centers (SOC) is people, process and technology. Which part of the triad would vendor-specific training belong?

  • People (CORRECT)
  • Process
  • Technology
  • None of the above

ARTIFICIAL INTELLIGENCE IN SIEMS KNOWLEDGE CHECK

1. True or False. Information is often overlooked simply because the security analysts do not know how it is connected.

  • True (CORRECT)
  • False

2. The partnership between security analysts and technology can be said to be grouped into 3 domains, human expertise, security analytics and artificial intelligence. The human expertise domain would contain which three (3) of these topics?

  • Bias elimination
  • Common sense (CORRECT)
  • Generalization (CORRECT)
  • Morals (CORRECT)
  • Pattern identification
  • Anomaly detection

3. A robust cybersecurity defense includes contributions from 3 areas, human expertise, security analytics and artificial intelligence. Which of these areas would contain the ability for abstraction?

  • Human expertise (CORRECT)
  • Artificial intelligence
  • Security analytics

SIEM PLATFORMS GRADED ASSESSMENT

1. True or False. SIEMs can be available on premises and in a cloud environment.

  • True (CORRECT)
  • False

2. For a SIEM, what are logs of specific actions such as user logins referred to?

  • Logs
  • Actions
  • Events (CORRECT)
  • Flows

3. Which of these describes the process of data normalization in a SIEM?

  • Compresses incoming
  • Indexes data records for fast searching and sorting (CORRECT)
  • Removes duplicate records from incoming data
  • Encrypts incoming data

4. When a data stream entering a SIEM exceeds the volume it is licensed to handle, what are three (3) ways the excess data is commonly handled, depending upon the terms of the license agreement? (Select 3)

  • The data stream is throttled to accept only the amount allowed by the license (CORRECT)
  • The data is processed and the license is automatically bumped up to the next tier.
  • The excess data is dropped (CORRECT)
  • The excess data is stored in a queue until it can be processed (CORRECT)

Partially correct!

5. Which five (5) event properties must match before the event will be coalesced with other events? (Select 5)

  • Source Port
  • Destination Port (CORRECT)
  • Source IP (CORRECT)
  • QID (CORRECT)
  • Username (CORRECT)
  • Destination IP (CORRECT)

Partially correct!

6. What is the goal of SIEM tuning?

  • To get the SIEM to present all recognized offenses to the investigators
  • To get the SIEM to sort out all false-positive offenses so only those that need to be investigated are presented to the investigators (CORRECT)
  • To increase the speed and efficency of the data processing so license caps are never exceeded.
  • To automatically resolve as many offenses as possible with automated actions

7. True or False. QRadar event collectors send all raw event data to the central event processor for all data handling such as data normalization and event coalescence.

  • True
  • False (CORRECT)

8. The triad of a security operations centers (SOC) is people, process and technology. Which part of the triad would containment belong?

  • People
  • Process (CORRECT)
  • Technology
  • None of the above

9. True or False. There is a natural tendency for security analysts to choose to work on cases that they are familiar with and to ignore those that may be important but for which they have no experience.

  • True (CORRECT)
  • False

10. The partnership between security analysts and technology can be said to be grouped into 3 domains, human expertise, security analytics and artificial intelligence. The security analytics domain contains which three (3) of these topics?

  • Data correlation (CORRECT)
  • Generalization
  • Common sense
  • Anomaly detection (CORRECT)
  • Pattern identification (CORRECT)
  • Natural language

Partially correct!

11. A robust cybersecurity defense includes contributions from 3 areas, human expertise, security analytics and artificial intelligence. Which of these areas would contain the ability for data visualization?

  • Artificial intelligence
  • Security analytics (CORRECT)
  • Human expertise

CONCLUSION – SIEM Platforms

In conclusion, this module has provided participants with a deep understanding of Security Information and Event Management (SIEM) platforms and their pivotal role in fortifying cybersecurity defenses. Through hands-on learning and practical application, participants have honed their skills in leveraging SIEM platforms for threat detection, incident response, and security analytics.

Armed with this knowledge, participants are well-equipped to navigate the complexities of modern cybersecurity challenges and proactively safeguard organizational assets. As they continue to apply their expertise in SIEM implementation and utilization, participants will play a crucial role in maintaining a resilient and adaptive security posture in the face of evolving cyber threats.