PCXDR-SOI: Cortex XDR: Security Operations and Integration

Become an EPIC Affiliate

To view the class schedule you need to become an Affiliate

  • Largest “Guaranteed To Run” public technical training schedules available
  • Easy to become an Affiliate – no charge or fee
Become an EPIC Affiliate

already an Affiliate?  Login

About this Course

This 3-day instructor-led course provides in-depth training on Cortex XDR, Palo Alto Networks’ powerful extended detection and response platform. You will gain hands-on expertise in security operations, incident investigation, and system optimization to effectively protect modern environments. Throughout this course you will explore the key features of Cortex XDR.

The course is designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and engineering roles, to use XDR. The course reviews XDR intricacies, from fundamental components to advanced strategies and techniques, including skills needed to configure security integrations, develop workflows, manage indicators, and optimize dashboards for enhanced security operations.

This is an update and replacement for the previous EDU-260 course, specifically intended for the individuals who are responsible for configuring Cortex XDR and managing integrations, data ingestion, and security policies as opposed to the analysts who investigate cases and issues. A retirement date for the EDU-260 and EDU-262 will be announced once the replacement course for EDU-262 is released (date TBA). For now the EDU-260 and EDU-262 will remain available, in addition to this new course offering

Audience Profile

SOC/CERT/CSIRT/XDR engineers and managers, MSSPs and service delivery partners/system integrators, security consultants and sales engineers.

At Course Completion

This course is designed to enable you to:

  • Describe the role of Cortex XDR components, including endpoint agents, XDR collectors, NGFWs, and Broker VMs, in securing networks and devices.
  • Utilize XQL to query and analyze logs for effective data ingestion and threat detection.
  • Design and implement workflows to streamline security operations.
  • Apply External Dynamic Lists and indicator rules to enforce security policies.

Outline

  • 0 - Course Overview
  • 1 - Overview of Cortex XDR
  • 2 - Software Components
  • 3 - Integrations
  • 4 - XQL
  • 5 - Detection Engineering
  • 6 - System Optimization
  • 7 - Dashboards and Reports

Prerequisites

Attendees should possess a solid understanding of cybersecurity principles, including network and endpoint security concepts.