Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Palo Alto Networks Cortex XDR Investigation & Analysis

Gain hands-on expertise in endpoint management, case management, forensic analysis and platform automation

XDR is the industry's most powerful extended detection and response platform. You will gain hands-on expertise in endpoint management, case management, forensic analysis and platform automation. Throughout this course, you will explore the key features of Cortex XDR.

This course is designed to enable you to:

  • Investigate cases, analyze key assets and artifacts, and interpret the causality chain.
  • Query and analyze logs using XQL to extract meaningful insights.
  • Utilize advanced tools and resources for comprehensive case analysis
GK# 842013 Vendor# PAN-CXDRIA
Vendor Credits:
  • Global Knowledge Delivered Course
  • Training Exclusives
No matching courses available.
Start learning as soon as today! Click Add To Cart to continue shopping or Buy Now to check out immediately.
Access Period:
Scheduling a custom training event for your team is fast and easy! Click here to get started.
$
Your Selections:
Location:
Access Period:
No available dates

Who Should Attend?

This course is for a wide range of security professionals, including SOC, CERT, CSIRT, and XDR analysts, managers, incident responders, and threat hunters. It is also well-suited for professional-services consultants, sales engineers, and service delivery partners.

What You'll Learn

  • The course is designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Analysts roles, to use XDR.
  • The course reviews XDR intricacies, from fundamental components to advanced strategies and techniques, including skills needed to navigate case management, platform automation, and orchestrate cybersecurity excellence.

Course Outline

  • Module 1: Introduction to Cortex XDR
  • Module 2: Endpoints
  • Module 3: XQL
  • Module 4: Alerting and Detection
  • Module 5: Vulnerability & Forensics
  • Module 6: Platform Automation
  • Module 7: Case Management
  • Module 8: Dashboards & Reports
BUY NOW

Prerequisites

Participants should have a foundational understanding of cybersecurity principles and experience with analyzing incidents and using security tools for investigation.