IBM Security Join our 16,000+ members as we work together to overcome the toughest challenges of cybersecurity. Join the Community
After a customer requested this I thought I would create a blog, it seems there is no training course to date on this .
The attached presentation is based on a number of years of discussing this with customers and is intended to take you through this in detail but just enough to get you set up!
There is a slide at the end with links to existing technical documentation so you can learn more if you need.
Please use comments to give feedback as there may be gaps in this document.