Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Palo Alto Networks: Cortex XSIAM for Investigation and Analysis

Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Analysts roles, to use XSIAM

XSIAM is the industry's most comprehensive security incident and asset management platform, offering extensive coverage for securing and managing infrastructure, workloads, and applications across multiple environments.

This course reviews XSIAM intricacies, from fundamental components to advanced strategies and techniques, including skills needed to navigate incident handling, automation, and orchestrate cybersecurity excellence.

GK# 842007 Vendor# PAN-XSIAM-IA
Vendor Credits:
  • Global Knowledge Delivered Course
  • Training Exclusives
No matching courses available.
Start learning as soon as today! Click Add To Cart to continue shopping or Buy Now to check out immediately.
Access Period:
Scheduling a custom training event for your team is fast and easy! Click here to get started.
$
Your Selections:
Location:
Access Period:
No available dates

Who Should Attend?

This course is intended for SOC/CERT/CSIRT/XSIAM analysts and managers, MSSPs and service delivery partners/system integrators, internal and external professional-services consultants and sales engineers, incident responders and threat hunters..

What You'll Learn

Throughout this course, you will explore the key features of Cortex XSIAM. This course is designed to enable you to:

  • Investigate incidents, analyze key assets and artifacts, and interpret the causality chain.
  • Query and analyze logs using XQL to extract meaningful insights.
  • Utilize advanced tools and resources for comprehensive incident analysis.

Course Outline

Course Modules

  1. Introduction to Cortex XSIAM
  2. Endpoints
  3. XQL
  4. Alerting and Detection
  5. Threat Intel Management
  6. Automation
  7. Attack Surface Management
  8. Incident Handling
  9. Dashboards and Reports
BUY NOW

Prerequisites

  • Participants should have foundational understanding of cybersecurity principles and experience with analyzing incidents and using security tools for investigation.

Related Certifications