Exam Vouchers: Palo Alto Networks: Certified Security Operations Professional (PAN-CSOP)
- Price: £155.00
- Code: PAN-CSOP
Description
TopThe Palo Alto Networks Certified Security Operations Professional certification is designed to validate knowledge, understanding, and the job-ready skills required for basic application of the Palo Alto Networks Cortex portfolio of solutions and related technologies in a Security Operations Center (SOC). The purpose of this document is to help you prepare for the exam and attain the certification. Please note that this document is intended to help identify the topics covered and to provide resources and references for understanding those topics. It is not intended to be used as the sole document to prepare for the Security Operations Professional exam.
Duration: 90 minutes
Format: Multiple-choice questions
Language: English
Further Information
TopTarget Audience
This exam is designed for the individuals with the following job roles:
Security Operations Center (SOC) professionals responsible for the basic application of Palo Alto Networks Cortex products and solutions:
- Cortex XDR
- Cortex XSIAM
- Cortex XSOAR
References:
Palo Alto Networks certification exam items are referenced to various publicly available technical or scholarly sources. The following list includes several sources that may have been referenced during the exam item development process.
- Palo Alto Networks TechDocs
- Palo Alto Networks Resource Center
- Palo Alto Networks Cyberpedia
- Palo Alto Networks Knowledge Base
- Palo Alto Networks Unit 42
English as a Second Language (ESL) Accommodation
All exams are delivered worldwide in English. A 30-minute time extension is provided by default to candidates testing in non-English speaking countries.
Blueprint
The blueprint table lists the domains covered and includes domain weighting. The percentage weights represent the portion of the exam score that is attributed to each domain. Many candidates find the table provides focus for studies during exam preparation. Also included in the blueprint table are the more specific tasks associated with each domain. Pay particular attention to these tasks, as they provide more targeted areas of study within the domains.
Content
Top- Security Operations Fundamentals 25%
- Explain the function of users, roles, log management, compliance, and data protection in Cortex XDR
- Explain the process of creating and managing reports and dashboards in Cortex products
- Explain the common components and functions of a Security Operations Center (SOC)
- Roles and responsibilities
- Tools, technologies, and analytics
- Differentiate between AI and machine learning (ML) in Security Operations
- Threat Intelligence and Incident Response 16%
- Identify and explain the steps of the NIST incident response plan
- Explain the concept of incident management and response
- Explain the role of threat intelligence in incident response
- Explain the function of incident categorization and prioritization
- Explain how file, IP address, domain, and URL indicator types are used in Cortex products
- Compare and contrast WildFire, Unit 42 intelligence, and VirusTotal
- Evaluate false positive, false negative, and true positive security incidents
- Conduct basic threat hunting based on a common indicator types
- Cortex XDR 23%
- Identify and explain the use of key Cortex XDR elements
- Sensors
- Log Stitching
- Causality View
- WildFire
- Detection and response
- Behavioral analytics
- Data sources, users, artifacts, and assets in investigations
- Explain the process of agent management and deployment, including cloud workloads
- Identify use cases where a business would benefit from Cortex XDR compared to an EDR solution
- Cortex XSOAR 16%
- Explain the features and functionality of Cortex XSOAR
- Marketplace
- Playbooks
- Third-party system integration
- Indicators and feeds in Threat Intelligence Management
- War Room
- Incident investigation
- Differentiate between scripts and jobs in Cortex XSOAR
- Cortex XSIAM 20%
- Explain the function of key Cortex XSIAM components
- Sensors
- Log Stitching
- Automations and integrations
- Content packs
- Playbooks
- Explain Cortex XSIAM processes, capabilities, use cases, and rules
- Data ingestion
- Key investigation artifacts and assets
- Threat management, detection, and response
- Threat hunting and investigation searches and queries
- IOC, BIOC, and correlations
Pre-requisites
TopThe successful candidate can demonstrate understanding of SecOps processes and procedures
- MITRE ATT&CK framework
- Incident response plans
- Investigative lifecycle
- Cortex XDR, Cortex XSIAM, Cortex XSOAR in the SOC
- Review dashboards and generate reports (compliance)
- Identify key components of incidents
- Initiate playbooks
- Identify IOCs
- Escalate incidents
- Initiate response actions
- Basic knowledge of analytics concepts, such as profiling and entity classification
- Alerts and incidents
- Interaction with playbook tasks to progress an investigation