Skip to main Content

Exam Vouchers: Palo Alto Networks - XSOAR Engineer Exam Voucher (PAN-XSOAR)

  • Price: £190.00
  • Code: PAN-XSOAR

£190.00

excl. VAT

Add to Cart Add to Cart

Description

Top

The Palo Alto Networks XSOAR Engineer certification validates the knowledge and skills required for skilled engineers to deploy, configure, manage, integrate, and troubleshoot Cortex XSOAR solutions in security operations environments.

Target Audience

This certification is designed for security operations engineers, security engineers, XSOAR specialists, SOC engineers, automation engineers, playbook developers, security architects, and support engineers responsible for deploying, configuring, integrating, managing, and troubleshooting Cortex XSOAR environments.

Further Information

Top

Palo Alto Networks certification exam items are developed and approved by exam development experts in conjunction with subject matter experts (SMEs) who represent a broad spectrum of roles relevant to each certification. Each item is referenced to a publicly available technical or scholarly source.

Objectives

Top

Candidates should be able to demonstrate:

  • Working knowledge of security operations, including incident response processes and workflows
  • Understanding of network security, infrastructure, protocols, and topology
  • Working knowledge of endpoint OS fundamentals and security concepts relevant to integration
  • Working knowledge of common security operations technologies (e.g., SIEM, EDR, threat intelligence platforms, ticketing systems, email security)
  • Working knowledge of programming and scripting languages, particularly Python, and to lesser extent JavaScript and PowerShell, as supported languages w writing automation scripts
  • Understanding of automation principles for efficient incident handling and security orchestration
  • Working knowledge of data source integration concepts, log normalization, and data parsing and extraction techniques
  • Understanding of integration methodologies, including third-party products and tools, and familiarity with API concepts (REST)
  • Working knowledge of the MITRE ATT&CK security frameworks (e.g., TTPs/APTs) for understanding threat intelligence object relationship models
  • Proficiency with common data formats (especially JSON) and understanding of data transformation principles (e.g., mapping, filtering, using transformers)

 

Content

Top

Planning, Installation, and Maintenance 14%

  • 1.1 Demonstrate knowledge of planning and configuring system authentication and authorization
  • 1.2 Explain the process of planning and deploying engines
  • 1.3 Explain the process of planning and managing a dev/prod deployment
  • 1.4 Demonstrate knowledge of managing Marketplace pack installations and version updates
  • 1.5 Identify and describe configuration and troubleshooting integration instances
  • 1.6 Explain the process of maintaining and troubleshooting the system

Use Case Planning and Development 22%

  • 2.1 Demonstrate understanding of incident and indicator lifecycles
  • 2.2 Explain field and layout configuration
  • 2.3 Demonstrate understanding of classifier and mapper configuration
  • 2.4 Identify and describe incident creation methods
  • 2.5 Identify and describe incident preprocessing and postprocessing functions
  • 2.6 Demonstrate knowledge of incident type playbooks, layouts, and SLAs
  • 2.7 Explain list configuration and management

Playbook Development 30%

  • 3.1 Explain playbook task input and output configuration and results
  • 3.2 Explain the process of referencing and manipulating context data to manage automation workflow
  • 3.3 Identify and describe the various playbook task types
  • 3.4 Demonstrate understanding of sub-playbook (inputs, outputs, looping) configuration
  • 3.5 Explain the process of applying filters and transformers to manipulate data in playbook tasks
  • 3.6 Explain the process of applying playbook debugger in development and troubleshooting
  • 3.7 Identify and describe built-ins, commands, and scripts
  • 3.8 Explain the process of creating and applying automation scripts
  • 3.9 Explain job creation and management

Incident Interactions and Reporting 16%

  • 4.1 Explain incident states and actions
  • 4.2 Demonstrate understanding of War Room activities
  • 4.3 Explain incident relationships
  • 4.4 Demonstrate understanding of dashboard and report configuration

Threat Intelligence Management 18%

  • 5.1 Identify and describe threat intelligence features
  • 5.2 Explain indicator creation methods
  • 5.3 Explain the process of indicator configuration 
  • 5.4 Explain indicator relationships
  • 5.5 Demonstrate knowledge of indicator enrichment and source reliability
  • 5.6 Explain threat intel sharing with external security services
  • 5.7 Demonstrate understanding of indicator exclusions list configuration and management

Pre-requisites

Top

Recommended Completion of:

  • Palo Alto Networks: Cortex XSOAR Engineering Security Automation Solutions