USA:+1-703-445-4802
India:+91-8143111555 / +91-8790216888
Whats app: +91-8143110555

IBM Resilient Online Training in Hyderabad india

IBM Resilient


IBM Resilient’s mission is to help organizations thrive in the face of cyber attacks and business crises. IBM Resilient helped create the market more than five years ago by building the industry-leading Incident Response Platform.

By using the Resilient Incident Response Platform, security teams can create a central hub for a response that orchestrates the full response process dynamically, enabling faster, more intelligent response and mitigation. The Resilient Incident Response Platform (IRP) is one of the industry's only platforms that enables complete incident response orchestration across people, process, and technology.

IBM Resilient Online Training in Hyderabad india



Key Features
  • Proactively Manage Response with the Security Module
  • Orchestrate and Automate with the Action Module
  • Manage Breach Notification Laws with the Privacy Module
  • Respond with Agility and Intelligence with Dynamic Playbooks
  • Understand Your Environment with Incident Visualization
  • Make Complex Processes Simple with Visual Workflows
  • Train Your Team and Processes with Resilient's Simulations

Duration: 25-30hrs

Course Content:

  • IBM Resilient v27 - Dynamic Playbooks / Rules
  • IBM Resilient v27 - Artifact Relation
  • IBM Resilient v27 - Custom Sections / Flags
  • IBM Resilient v27 - Deleting Incidents and Bulk Actions
  • IBM Resilient v27 - Deactivating users and Reassigning Incidents and Tasks
  • Carbon Black Response - Integrating with IBM Resilient
  • Carbon Black Response - Integrating with IBM Resilient, and IBM QRadar SIEM
  • Managing GDPR Data Breach Notification Requirements with the Resilient Incident Response Platform
  • Configuring SMTP Notifications for IBM Resilient
  • Changing Ciphers and Protocols in IBM Resilient
  • Setting up SAML Authentication in IBM Resilient
  • Resilient Prerequisites
  • Importing the Resilient License Key
  • An Introduction to the Resilient Incident Response Platform
  • Configuring Syslog for Resilient
  • Configuring Audit Logging in Resilient
  • Log Configuration in Resilient
  • Resilient - Setting the Time Zone
  • Resilient - Installing Optional Packages
  • Resilient - External Network Configuration
  • Resilient - Defanging URLs
  • Resilient - LDAP Authentication
  • Resilient - Two-Factor Authentication
  • Resilient - Keyvaults, Keystores and Secrets
  • Resilient - Configuring SSL/TLS Certificates
  • Resilient - Encrypting the Keyvault Password
  • Resilient - Backing up the Keyvault
  • Resilient - Backing up and Restoring
  • Resilient - Installing via an OVA File
  • Resilient - Predefined Roles
  • Resilient - Creating Roles
  • Resilient - Deleting a Workspace
  • Resilient - Roles permissions categories
  • Resilient - Creating a Workspace
  • Resilient - Workspace Key Concepts
  • Resilient - Organization Details
  • Resilient - Deleting Roles
  • Resilient - Global and Workspace Roles
  • Resilient - Migrating Organization Settings
  • Guardium and Resilient integration: Email Connector
  • Resilient - Organization Settings
  • Resilient - Creating a New User with Terminal Commands
  • Resilient - Creating a New User using the UI
  • Resilient - Reassigning Incidents and Tasks


  • Resilient - Deleting or Deactivating a User
  • Getting started with IBM Resilient
  • Using Resilient disaster recovery health checks
  • Running Resilient disaster recovery playbooks
  • Setting up Resilient disaster recovery
  • Creating custom graphs in the Resilient application
  • Common Resilient use cases
  • Resilient - Enabling LDAP users in groups and deleting LDAP users
  • Resilient - How to Create Wikis
  • Resilient - Threat Sources Overview
  • Resilient - Notifications and substitution
  • Resilient - Enabling LDAP authentication
  • Initial configuration of the IBM Resilient appliance
  • Upgrading the Resilient Appliance Software
  • Working with Resilient workspaces
  • Working with Resilient roles
  • Managing users and groups in Resilien
  • Resilient security
  • Managing logs in the IBM Resilient appliance
  • Setting up alternative authentication mechanisms in the IBM Resilient appliance