Workforce Development / PAN EDU-260: Cortex XDR: Prevention and Deployment

PAN EDU-260: Cortex XDR: Prevention and Deployment

This course enables you to take steps to prevent attacks on your endpoints. After an overview of the Cortex XDR components, this training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create security profiles and policies. Learn to perform and track response actions, tune profiles and work with Cortex XDR alerts. The course concludes by discussing basic troubleshooting of the agent, the on-premises Broker VM component and Cortex XDR deployment.  

Length: Three days
Price: $3,70 CAD

Who Should Attend:

  • Cybersecurity analysts and engineers 
  • Security operations specialists 
Expertise Icon

Describe the architecture and components of the Cortex XDR family 
Create Cortex XDR agent installation packages, endpoint groups and policies 
Create and manage Exploit and Malware Prevention profiles 
Tune security profiles using Cortex XDR exceptions 
Perform basic troubleshooting related to Cortex XDR agents 
Understand Cortex XDR deployment concepts and activation requirements 
 

Expertise Icon

Use the Cortex XDR management console, including reporting 
Deploy Cortex XDR agents on endpoints 
Investigate alerts and prioritize them using starring and exclusion policies 
Perform and track response actions in the Action Centre 
Deploy a Broker VM and activate the Local Agents settings applet 
Work with the customer support portal and Cortex XDR Gateway for authentication and authorization 
 

Topics Covered:

  • Cortex XDR introduction 
  • Cortex XDR main components 
  • Cortex XDR management console 
  • Profiles and policies 
  • Malware protection 
  • Exploit protection 
  • Cortex XDR alerts 
  • Exclusions and exceptions 
  • Response actions 
  • Basic troubleshooting 
  • Broker VM overview 
  • Deployment considerations 

Prerequisites:

  • Participants must be familiar with enterprise product deployment, networking and security concepts 
Complete the form to get more information on this course:
Complete the form to get more information on this course: