- COURSE
Cortex XSIAM: Security Operations and Automation (EDU-270)
Price: $3,995.00
Duration: 4 days
Certification: Palo Alto Networks Certified Security Operations Generalist
Exam:
Continuing Education Credits:
Learning Credits:
The Palo Alto Networks Cortex XSIAM: Security Operations and Automation (EDU-270) course is an instructor-led training that will help you to:
- Deploy, configure, and install XDR agents and configure Agent Groups and profiles
- Investigate incidents, examine assets and artifacts, and understand the causality chain
- Create correlation rules, use XQL to query logs, and analyze incidents using available tools and resources
The course is designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use Cortex XSIAM.
The course reviews XSIAM intricacies, from fundamental components to advanced strategies and automation techniques, including skills needed to navigate incident handling, optimize log sources, and orchestrate cybersecurity excellence.
Course Outline and Details
Prerequisites
No previous Palo Alto Networks experience is required to take this Cortex XSIAM EDU 270 Palo Alto course while familiarity with enterprise product deployment, networking, and security concepts is recommended.
Target Audience
SOC/CERT/CSIRT/XSIAM engineers and managers, MSSPs and service delivery partners/system integrators, internal and external professional-services consultants and sales engineers, incident responders and threat hunters.
Course Objectives
The course is designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM. The course reviews XSIAM intricacies, from fundamental components to advanced strategies and automation techniques, including skills needed to navigate incident handling, optimize log sources, and orchestrate cybersecurity excellence.
Course Outline
- Introduction to Cortex XSIAM
- Elements of Security Operations
- Maturity Model
- Agent Deployment and Configuration
- Data Source Ingestion
- Visibility
- Data Model
- Analytics
- Alerting and Detecting
- Attack Surface Management
- Automation
- Incident Handling / SOC