logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Palo Alto Networks: Cortex XDR: Prevention and Deployment (EDU-260)

SS Course: GK821200

Course Overview

TOP

This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies.

The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. It concludes by discussing basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment.

                                                                  

Scheduled Classes

TOP
04/29/24 - GVT - Virtual Classroom - Virtual Instructor-Led
05/22/24 - GVT - Virtual Classroom - Virtual Instructor-Led
06/03/24 - GVT - Virtual Classroom - Virtual Instructor-Led
07/15/24 - GVT - Virtual Classroom - Virtual Instructor-Led
08/26/24 - GVT - Virtual Classroom - Virtual Instructor-Led
09/30/24 - GVT - Virtual Classroom - Virtual Instructor-Led
10/21/24 - GVT - Virtual Classroom - Virtual Instructor-Led
11/18/24 - GVT - Virtual Classroom - Virtual Instructor-Led
12/09/24 - GVT - Virtual Classroom - Virtual Instructor-Led

Outline

TOP
  • Module 1: Cortex XDR Overview
  • Module 2: Cortex XDR Main Components
  • Module 3: Cortex XDR Management Console
  • Module 4: Profiles and Policy Rules
  • Module5: Malware Protection
  • Module 6 : Exploit Protection
  • Module 7: Cortex XDR Alerts
  • Module 8: Tuning Policies Using Exceptions
  • Module 9: Response Actions
  • Module 10: Basic Agent Troubleshooting
  • Module 11: Broker VM Overview
  • Module 12: Deployment Considerations

    Prerequisites

    TOP

    Participants must be familiar with enterprise product deployment, networking, and security concepts.

      Who Should Attend

      TOP

      Cybersecurity analysts and engineers and security operations specialists, as well as administrators and product deployers.