Skip to main Content

Palo Alto Networks: Cortex XSIAM: Security Operations, Integration and Automation

  • Código del Curso PAN-CXSIAMSOIA
  • Duración 3 días

Clase de calendario Precio

eur2,495.00

Solicitar Formación Grupal Inscribirse

Método de Impartición

Este curso está disponible en los siguientes formatos:

  • Cerrado

    Cerrado

  • Clase de calendario

    Aprendizaje tradicional en el aula

  • Aprendizaje Virtual

    Aprendizaje virtual

Solicitar este curso en un formato de entrega diferente.

Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and engineering roles, to use XSIAM.

XSIAM is the industry's most comprehensive security incident and asset management platform, offering extensive coverage for securing and managing infrastructure, workloads, and applications across multiple environments.

Calendario

Parte superior

Dirigido a

Parte superior
This course is intended for SOC/CERT/CSIRT/XSIAM engineers and managers, MSSPs and service delivery partners/system integrators, internal and external professional services consultants and sales engineers, SIEM and automation engineers.

Objetivos del Curso

Parte superior

This course is designed to enable you to:

  • Describe how endpoint agents, XDR collectors, NGFWs, and Broker VMs secure networks and devices.
  • Query and analyze logs using XQL for data ingestion and detection.
  • Configure Threat Intel Management features, automate workflows, and apply EDLs and indicator rules.

The course reviews XSIAM intricacies, from fundamental components to advanced strategies and techniques, including skills needed to configure security integrations, develop automation workflows, manage indicators, and optimize dashboards for enhanced security operations.

Course Modules

  1. Course Overview
  2. Overview of Cortex XSIAM
  3. Software Components
  4. XQL
  5. Detection Engineering
  6. Integrations
  7. Automation
  8. Threat Intel Management
  9. Attack Surface Management
  10. UI Customizations

Pre-requisitos

Parte superior
  • Participants should have foundational understanding of cybersecurity principles and experience with analyzing incidents and using security tools for investigation.