Skip to main Content

Cortex XDR: Investigation and Response (EDU-262)

  • Kursuskode PAN-EDU-262
  • Varighed 2 dage
  • Version 3.6

Leveringsmetoder

Åbent kursus (Virtuelt) Pris

DKR12.895,00

Ekskl. Moms

Anmod om gruppetræning Køb

Leveringsmetoder

Kurset er tilgængeligt i følgende formater:

  • Firma kursus

    Et lukket firma kursus

  • Åbent kursus

    Traditionel klasserumsundervisning

  • Åbent kursus (Virtuelt)

    Live klasserumsundervisning du tilgår virtuelt

Anmod om dette kursus Med en anden leveringsløsning

Beskrivelse

Toppen

This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics.

You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution.

Multiple modules focus on how to leverage the collected data. You will create simple search queries in one module and XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact-related data, such as IP and Hash Views. Additionally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external-data-collection capabilities, including the use of Cortex XDR API to receive external alerts.

Virtuel deltagelse

Et V&C Select kursus indholder nøjagtig det samme som et almindeligt kursus. Før kursusstart modtager man kursusmaterialet. Dernæst logger man på kurset via internettet og ser via sin pc den selvsamme præsentation som de øvrige deltagere, man kommunikerer via chat med underviseren og de øvrige deltagere på kurset. Denne uddannelsesmodel er både tids-og omkostningsbesparende og kan være et oplagt alternativ til almindelig klasseundervisning, hvis man f.eks. har et begrænset rejsebudget.

Kursusdato

Toppen
    • Leveringsmetode: Åbent kursus (Virtuelt)
    • Dato: 23-24 maj, 2024
    • Kursussted: Virtual
    • Sprog: engelsk

    DKR12.895,00

    • Leveringsmetode: Åbent kursus (Virtuelt)
    • Dato: 26-27 september, 2024
    • Kursussted: Virtual
    • Sprog: engelsk

    DKR12.895,00

    • Leveringsmetode: Åbent kursus (Virtuelt)
    • Dato: 30-31 januar, 2025
    • Kursussted: Virtual
    • Sprog: engelsk

    DKR12.895,00

Målgruppe

Toppen
  • Cybersecurity analysts and engineers
  • Security operations specialists

Kursets formål

Toppen

Successful completion of this instructor-led course with hands-on lab activities should enable participants to:

  • Investigate and manage incidents
  • Describe the Cortex XDR causality and analytics concepts
  • Analyze alerts using the Causality and Timeline Views
  • Work with Cortex XDR Pro actions such as remote script execution
  • Create and manage on-demand and scheduled search queries in the Query Center
  • Create and manage the Cortex XDR rules BIOC and IOC
  • Working with Cortex XDR assets and inventories
  • Write XQL queries to search datasets and visualize the result sets
  • Work with Cortex XDR’s external-data collection

Kursusindhold

Toppen

Course Modules

1 - Cortex XDR Incidents

2 - Causality and Analytics Concepts

3 - Causality Analysis of Alerts

4 - Advanced Response Actions

5 - Building Search Queries

6 - Building XDR Rules

7 - Cortex XDR Assets

8 - Introduction to XQL

9 - External Data Collection

Forudsætninger

Toppen

Participants must have completed EDU-260 (Cortex XDR: Prevention and Deployment).

Anbefalede forudsætninger:

Mere information

Toppen

Palo Alto Networks Education

The technical curriculum developed and authorized by Palo Alto Networks and delivered by Palo Alto Networks Authorized Training Partners helps provide the knowledge and expertise that prepare you to protect our digital way of life. Our trusted certifications validate your knowledge of the Palo Alto Networks product portfolio and your ability to help prevent successful cyberattacks, safely enable applications, and automate effective responses to security events.

Cookie Control toggle icon