Palo Alto Networks Cortex XSOAR: Automation and Orchestration
This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.
The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course.
- Configure integrations, create tasks, and develop playbooks
- Build incident layouts that enable analysts to triage and investigate incidents efficiently
- Identify how to categorize event information and map that information to display fields
- Develop automations, manage content, indicator data, and artifact stores, schedule jobs, organize users and user roles, oversee case management, and foster collaboration
Security-operations (SecOps), or security, orchestration, automation, and response (SOAR) engineers, managed security service providers (MSSPs), service delivery partners, system integrators, and professional services engineers.
Participants must complete the Cortex XSOAR Analyst digital learning. Participants who have experience with scripting, the use of Python and JavaScript, and the use of JSON data objects will likely be able to apply what they learn more quickly than participants without such experience. However, completion of the course does not require proficiency in writing code.
- Overview of Cortex SOAR core functionality and feature sets
- Understanding the overall solution architecture and components
- Enabling and configuring integrations with external systems
- Managing marketplace content and updates
- Building and customizing playbooks for automated workflows
- Developing and debugging automation scripts
- Utilizing Docker for custom automation environments
- Configuring classification and mapping of incidents
- Customizing layouts with the layout builder
- Managing indicators and threat intelligence data
- Configuring jobs and job scheduling for automation tasks
- Implementing user management and role-based access control (RBAC)
- Developing and maintaining custom integrations