Skip to main Content

Palo Alto Networks: Cortex XSIAM: Security Operations, Integration and Automation

  • Course Code PAN-CXSIAMSOIA
  • Duration 3 days

Course Delivery

Public Classroom Price

£2,295.00

excl. VAT

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Public Classroom

    Traditional Classroom Learning

Request this course in a different delivery format.

Course Overview

Top

Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and engineering roles, to use XSIAM.

XSIAM is the industry's most comprehensive security incident and asset management platform, offering extensive coverage for securing and managing infrastructure, workloads, and applications across multiple environments.

Course Schedule

Top

Target Audience

Top
This course is intended for SOC/CERT/CSIRT/XSIAM engineers and managers, MSSPs and service delivery partners/system integrators, internal and external professional services consultants and sales engineers, SIEM and automation engineers.

Course Objectives

Top

This course is designed to enable you to:

  • Describe how endpoint agents, XDR collectors, NGFWs, and Broker VMs secure networks and devices.
  • Query and analyze logs using XQL for data ingestion and detection.
  • Configure Threat Intel Management features, automate workflows, and apply EDLs and indicator rules.

The course reviews XSIAM intricacies, from fundamental components to advanced strategies and techniques, including skills needed to configure security integrations, develop automation workflows, manage indicators, and optimize dashboards for enhanced security operations.

Course Content

Top

Course Modules

  1. Course Overview
  2. Overview of Cortex XSIAM
  3. Software Components
  4. XQL
  5. Detection Engineering
  6. Integrations
  7. Automation
  8. Threat Intel Management
  9. Attack Surface Management
  10. UI Customizations

Course Prerequisites

Top
  • Participants should have foundational understanding of cybersecurity principles and experience with analyzing incidents and using security tools for investigation.