C110024G - Monitoring and Managing Security Threats on IBM Cloud

This module provides an overview of monitoring and managing security threats on IBM Cloud. The module explores two IBM Cloud deployment models and the features and benefits to expect within each environment. Finally, this module discusses the various security options that are available in IBM Cloud and how to apply code patterns to a solution.

Duration: 1.0 day

Enquire Now

Start learning today!

Click Hereto customize your Training


  • Identify cloud deployment models and understand the security incident response management
  • Apply monitoring, security insights and incident response code patterns
  • Review Security Reference Architecture's security monitoring and intelligence options


Module Introduction

  • Topic 1: Cloud Deployment Models and How They Impact Security Incident Response Management
  • Topic 2: Security Reference Architecture's Security Monitoring and Intelligence Options
  • Topic 3: Code Patterns

Module Summary


This course is intended for learners who are pursuing professional-level site reliability engineer certification on IBM Cloud.


Before starting this curriculum, the target audience should understand:

  • System Thinking
  • DevOps practices
  • Cloud Architecture
  • Software engineering principles
  • System administration
  • Network and OSI model
  • Networking and security practices for IBM Cloud
  • Incident management
  • Root cause analysis

The target audience should also be able to:

  • Proficiently write code
  • Create run books as a reference
  • Make system components serviceable
  • Interpret data and statistics to determine actions
  • Use LogDNA, SysDig, Grafana, Prometheus, Kibana
  • Interpret schematics
  • Drive incidents to resolution
  • Remediate underlying sources of unreliability
  • Create and configure VMs
  • Create and configure Containers on IBM Kubernetes Service (IKS)/Red Hat OpenShift Kubernetes Services (ROKS)
  • Create and configure Containers using OpenShift
  • Create and configure Serverless applications
  • Configure for high availability and scalability



Course Benefits

  • Career growth
  • Broad Career opportunities
  • Worldwide recognition from leaders
  • Up-to Date technical skills
  • Popular Certification Badges
Enquire Now
By clicking "Submit", I agree to the Terms Of Use and Privacy Policy