Palo Alto Cortex XDR Training Workshop

Incent Management & Alert Analysis – see Threats in Action and learn how to analyze their behaviour with Cortex XDR

 

Introducing the “Cortex XDR: Prevention, Analysis, and Response” (EDU-260) training course, in this free training workshop, we will give you a taste of the course by teaching two full modules.

Palo Alto Cortex XDR Training Logo

Follow us on LinkedIn to hear when we run the next training workshop or .

What you will learn

  • The value of the “Cortex XDR: Prevention, Analysis, and Response” (EDU-260) training course – we will show you with some examples and use cases what you can learn in this course and how it can make your job easier
  • Incent Management & Alert Analysis – The instructor will teach the modules on Incident Management and Alert Analysis from the official Palo Alto Cortex XDR training course (EDU-260). He will demonstrate real-life use cases of how malware tries to infiltrate corporate networks and how you can identify such malicious behaviour using Cortex XDR.

Need Help?

Contact us or give us a call +353 (1) 5241014 / +1 (650) 407-1995​ – ​We are a Palo Alto Networks Certified Professional Service Provider (CPSP) and the Next-Generation Security Platform with Cortex XDR is what we do all day every day. Let us share our experience with you to make your Next-Generation Security project a smooth experience but most importantly a peace of mind by truly securing your valuable IT assets.

Palo Alto Certified Professional Service Provider (CPSP) Logo
Creative Commons Attribution ShareAlike for training courses

This document is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. You are free to share and adapt this document as long as you give appropriate credit to the author Lars Meyer. If you remix, transform or build upon the material, you must distribute your contributions under the same license as the original.

Disclaimer: Consigas Limited accepts no liability for the content of this blog post, or for the consequences of any actions taken on the basis of the information provided. Any views or opinions presented in this document are solely those of the author and do not necessarily represent those of Palo Alto Networks.