Skip to main Content

Palo Alto Networks: Cortex XSIAM: Security Operations, Integration and Automation

  • Code training PAN-CXSIAMSOIA
  • Duur 3 dagen

Andere trainingsmethoden

Op locatie klant Prijs

op aanvraag

Vraag een groepstraining aan Schrijf je in

Methode

Deze training is in de volgende formats beschikbaar:

  • Klassikale training

    Klassikaal leren

  • Op locatie klant

    Op locatie klant

  • Virtueel leren

    Virtueel leren

Vraag deze training aan in een andere lesvorm.

Trainingsbeschrijving

Naar boven

Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and engineering roles, to use XSIAM.

XSIAM is the industry's most comprehensive security incident and asset management platform, offering extensive coverage for securing and managing infrastructure, workloads, and applications across multiple environments.

Company Events

These events can be delivered exclusively for your company at our locations or yours, specifically for your delegates and your needs. The Company Events can be tailored or standard course deliveries.

Doelgroep

Naar boven
This course is intended for SOC/CERT/CSIRT/XSIAM engineers and managers, MSSPs and service delivery partners/system integrators, internal and external professional services consultants and sales engineers, SIEM and automation engineers.

Trainingsdoelstellingen

Naar boven

This course is designed to enable you to:

  • Describe how endpoint agents, XDR collectors, NGFWs, and Broker VMs secure networks and devices.
  • Query and analyze logs using XQL for data ingestion and detection.
  • Configure Threat Intel Management features, automate workflows, and apply EDLs and indicator rules.

The course reviews XSIAM intricacies, from fundamental components to advanced strategies and techniques, including skills needed to configure security integrations, develop automation workflows, manage indicators, and optimize dashboards for enhanced security operations.

Inhoud training

Naar boven

Course Modules

  1. Course Overview
  2. Overview of Cortex XSIAM
  3. Software Components
  4. XQL
  5. Detection Engineering
  6. Integrations
  7. Automation
  8. Threat Intel Management
  9. Attack Surface Management
  10. UI Customizations

Voorkennis

Naar boven
  • Participants should have foundational understanding of cybersecurity principles and experience with analyzing incidents and using security tools for investigation.