Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Palo Alto Networks: Cortex XSIAM: Security Operations, Integration, and Automation

Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and engineering roles, to use XSIAM.

XSIAM is the industry's most comprehensive security incident and asset management platform, offering extensive coverage for securing and managing infrastructure, workloads, and applications across multiple environments.

GK# 842008 Vendor# PAN-XSIAM-SOIA
Vendor Credits:
  • Global Knowledge Delivered Course
  • Training Exclusives
No matching courses available.
Start learning as soon as today! Click Add To Cart to continue shopping or Buy Now to check out immediately.
Access Period:
Scheduling a custom training event for your team is fast and easy! Click here to get started.
$
Your Selections:
Location:
Access Period:
No available dates

Who Should Attend?

This course is intended for SOC/CERT/CSIRT/XSIAM engineers and managers, MSSPs and service delivery partners/system integrators, internal and external professional services consultants and sales engineers, SIEM and automation engineers.

What You'll Learn

This course is designed to enable you to:

  • Describe how endpoint agents, XDR collectors, NGFWs, and Broker VMs secure networks and devices.
  • Query and analyze logs using XQL for data ingestion and detection.
  • Configure Threat Intel Management features, automate workflows, and apply EDLs and indicator rules.

The course reviews XSIAM intricacies, from fundamental components to advanced strategies and techniques, including skills needed to configure security integrations, develop automation workflows, manage indicators, and optimize dashboards for enhanced security operations.

Course Outline

Course Modules

  1. Course Overview
  2. Overview of Cortex XSIAM
  3. Software Components
  4. XQL
  5. Detection Engineering
  6. Integrations
  7. Automation
  8. Threat Intel Management
  9. Attack Surface Management
  10. UI Customizations
BUY NOW

Prerequisites

  • Participants should have foundational understanding of cybersecurity principles and experience with analyzing incidents and using security tools for investigation.

Related Certifications