Course Overview
This four-day instructor-led training enabled you deploy and manage Cortex XSIAM to collect and ingest various data sources, logs and alerts, to drive machine learning for natively autonomous response actions, such as cross-correlation of alerts and data, detection of highly sophisticated threats, and automated remediation based on native threat intelligence and attack surface data.
Course Objectives
- Deploy and manage Cortex XSIAM
- Collect and ingest various data sources
- Drive machine learning for natively autonomous response actions
- Detect highly sophisticated threats
- Create auto-remediation responses
Who Should Attend?
SOC/CERT/CSIRT/XSIAM engineers, MSSPs and service delivery partners/system integrators, professional-services consultants, and sales engineers, both internal and external, SOC managers, IR, and hunt team members.
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
- Introduction to Cortex XSIAM
- Elements of Security Operations
- Maturity Model
- Agent Deployment and Configuration
- Data Source Ingestion
- Visibility
- Data Model
- Analytics
- Alerting and Detecting
- Attack Surface Management
- Automation
- Incident Handling / SOC