EDU-380 Cortex XSOAR 6.2 : Automation and Orchestration

Upcoming Classes

EDU - 380 EDU-380 Cortex XSOAR 6.2 : Automation and Orchestration

This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.
The third module of the course demonstrates a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in subsequent modules.

Security-operations (SecOps), or security, orchestration, automation, and response (SOAR) engineers, managed security service providers (MSSPs), service delivery partners, system integrators, and professional services engineers

Participants must complete the Cortex XSOAR Analyst digital learning. Participants who have experience with scripting, the use of Python and JavaScript, and the use of JSON data objects will likely be able to apply what they learn more quickly than participants without such experience. However, completion of the course does not require proficiency in writing code.

The technical curriculum developed and authorized by Palo Alto Networks and delivered by Palo Alto Networks Authorized Training Partners helps provide the knowledge and expertise that prepare you to protect our digital way of life. Our trusted certifications validate your knowledge of the Palo Alto Networks product portfolio and your ability to help prevent successful cyberattacks, safely enable applications, and automate effective responses to security events.

1 – Core Functionality and Feature Sets
2 – Enabling and Configuring Integrations
3 – Playbook Development
4 – Classification and Mapping
5 – Layout Builder
6 – Solution Architecture
7 – Docker
8 – Automation Development and Debugging
9 – The Marketplace and Content Management
10 – Indicators and Threat Intelligence Management
11 – Jobs and Job Scheduling
12 – Users and Role-Based Access
Controls (RBAC)
13 – Integration Development

    Contact Us for more details