Skip to main Content

Palo Alto Networks: Cortex XSIAM: Security Operations, Integration and Automation

  • Kursuskode PAN-CXSIAMSOIA
  • Varighed 3 dage

Leveringsmetoder

Åbent kursus Pris

DKR19,950.00

Ekskl. Moms

Anmod om gruppetræning Køb

Leveringsmetoder

Kurset er tilgængeligt i følgende formater:

  • Åbent kursus

    Traditionel klasserumsundervisning

Anmod om dette kursus Med en anden leveringsløsning

Beskrivelse

Toppen

Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and engineering roles, to use XSIAM.

XSIAM is the industry's most comprehensive security incident and asset management platform, offering extensive coverage for securing and managing infrastructure, workloads, and applications across multiple environments.

Kursusdato

Toppen

Målgruppe

Toppen
This course is intended for SOC/CERT/CSIRT/XSIAM engineers and managers, MSSPs and service delivery partners/system integrators, internal and external professional services consultants and sales engineers, SIEM and automation engineers.

Kursets formål

Toppen

This course is designed to enable you to:

  • Describe how endpoint agents, XDR collectors, NGFWs, and Broker VMs secure networks and devices.
  • Query and analyze logs using XQL for data ingestion and detection.
  • Configure Threat Intel Management features, automate workflows, and apply EDLs and indicator rules.

The course reviews XSIAM intricacies, from fundamental components to advanced strategies and techniques, including skills needed to configure security integrations, develop automation workflows, manage indicators, and optimize dashboards for enhanced security operations.

Kursusindhold

Toppen

Course Modules

  1. Course Overview
  2. Overview of Cortex XSIAM
  3. Software Components
  4. XQL
  5. Detection Engineering
  6. Integrations
  7. Automation
  8. Threat Intel Management
  9. Attack Surface Management
  10. UI Customizations

Forudsætninger

Toppen
  • Participants should have foundational understanding of cybersecurity principles and experience with analyzing incidents and using security tools for investigation.