An IBM Certified Administrator – Security Guardium v11.x is an individual familiar with the architecture and use cases of IBM Security Guardium. They can plan, install, configure, support, and maintain the IBM Security Guardium environment. Additionally, they will be familiar with database activity monitoring, policy rule definition, and custom report creation. They can complete these tasks with little to no assistance from product documentation, peers or support.
- Working knowledge of operating systems and databases
- Basic knowledge of hybrid cloud
- Working knowledge of hardware or virtual machines
- Working knowledge of networking and protocols
- Basic knowledge of risk management, auditing, and compliance
- Working knowledge of operating systems and databases
- Basic knowledge of hybrid cloud
- Working knowledge of hardware and virtual machines
- Working knowledge of networking and protocols
- Basic knowledge of risk management, auditing, and compliance
During exam development, the Subject Matter Experts (SMEs) define all of the tasks, knowledge and experience that an individual would need in order to successfully fulfill their role with the product or solution. These are represented by the objectives below and the questions on the exam are based upon these objectives.
-
Section 1: Plan for the IBM Security Guardium System10%
- Describe Guardium Architecture
- Define the differences between Guardium agents
- Identify the ports for Guardium and agents
- Define the roles of the Guardium appliances
- Explain how the firewall works on DAM and FAM
-
Section 2: Deploy & Configure the IBM Guardium System13%
- Configure Guardium appliances
- Install license keys
- Install Guardium agents
- Configure and attach Identity Providers
- Configure SMTP on the appliance
- Configure SIEM on appliance
-
Section 3: Discover & Classify7%
- Discover the databases on the network
- Locate and classify sensitive data
-
Section 4: Protect & Monitor18%
- Build a policy
- Define and implement Policy Rules logic
- Setup outlier detection settings
- Differentiate between policy actions
- Interpret results of analytic engines
- Monitor the resources of the appliance
-
Section 5: Audit & Report13%
- Create custom report queries
- Configure audit flow
-
Section 6: Assess & Harden7%
- Identify vulnerabilities in different databases and platforms
- Harden vulnerabilities in different databases and platforms
- Configure and operate CAS
-
Section 7: Maintain & Manage18%
- Configure high availability functions for appliances and agents
- Configure alerts
- Install patches
- Configure data management
- Manage and maintain groups
- Setup and maintain user accounts
-
Section 8: Problem Determination14%
- Troubleshoot installation issues
- Troubleshoot data capture issues
- Troubleshoot operational issues
- Generate must gathers
Reviews
There are no reviews yet.