Download Our Latest Course Catalog | Download Now
Gain hands-on experience investigating security incidents and analyzing threat activity using Cortex XDR.
This two-day instructor-led course combines focused lectures with hands-on simulations to help security professionals investigate cases, analyze assets and artifacts, and use advanced analytics and automation to support effective incident response.
This instructor-led training introduces participants to Cortex XDR, Palo Alto Networks’ extended detection and response platform designed to unify endpoint data, analytics, and response workflows. The course provides a detailed view of how Cortex XDR supports investigation, detection, and case management across modern security operations.
Participants will learn how to investigate cases by analyzing alerts, assets, and causality chains, query and analyze logs using XQL, and apply advanced tools for forensic analysis and vulnerability investigation.
Through guided simulations, learners will also work with platform automation, dashboards, and reports to support efficient and consistent security investigations.
Participants should have a foundational understanding of cybersecurity principles and prior experience analyzing security incidents using investigation and response tools.
This course is designed for:
This course focuses on building practical investigation and analysis skills using Cortex XDR. While it does not currently align with preparation for a specific Palo Alto Networks certification, it strengthens core competencies in detection, investigation, and response that support professional growth within security operations roles.
#1. Can I take this course online?
Yes. This course is available as virtual instructor-led training, including live instruction and hands-on simulations.
#2. Is classroom training available?
Yes. In-person classroom sessions are available at select training locations and can also be delivered as private on-site training for teams.
#3. Will I receive official course materials?
Yes. Participants receive official Palo Alto Networks training materials in digital format as part of the course.
#4. Do I receive a certificate after completing the course?
Yes. Participants who successfully complete the course will receive an official Palo Alto Networks certificate of completion.
1 – Introduction to Cortex XDR
2 – Endpoints
3 – XQL
4 – Alerting and Detection
5 – Vulnerability & Forensics
6 – Platform Automation
7 – Case Management
8 – Dashboards & Reports
At DataCipher, we provide a range of payment options for our Palo Alto courses. Here’s what you can choose from:
Palo Alto Networks Training Credits and Vouchers – We accept both training credits and training vouchers issued by Palo Alto Networks. To enroll in a course using your credits or vouchers, please click the Register button. You’ll have the opportunity to apply these credits during the final step of the registration process.
Purchase Order (PO) – If your organization prefers using a purchase order, begin the registration by clicking the Register button. At the conclusion of the registration form, choose the option “My company will pay for it, please send an invoice with the payment details.” Our training team will then provide an official quote and any necessary additional information that your accounts department might need to issue the PO.
Bank Transfer – DataCipher maintains bank accounts in both the US and Europe, accommodating all standard bank transfer methods such as IBAN/BIC, Swift, ACH, or wire transfer. To make a payment via bank transfer, simply use the Register button to sign up for your selected course.
Credit Card Payments – We accept payments from all major credit cards, including Mastercard, VISA, American Express, Discover & Diners, and Cartes Bancaires. Payments can be made directly through the registration link or by requesting an invoice that includes a web link for online payment. All transactions are secure, and DataCipher does not store any credit card information.
These methods are designed to make the registration process as smooth and flexible as possible for all participants.
Guaranteed to Run – DataCipher is committed to running this class unless unforeseen events such as an instructor’s accident or illness occur.
Guaranteed on Next Booking – The course will proceed once an additional student registers.
Scheduled Class – We have scheduled this course and rarely cancel due to low enrollment. We offer a “Cancel No More Than Once” guarantee, ensuring that if a class is canceled due to insufficient enrollment, the next session will run regardless of the number of attendees.
Sold Out – If the class is fully booked, please use our contact form to join the waiting list or to inquire about additional sessions. We’re here to accommodate your training needs and keep you informed of new opportunities.
At DataCipher, we offer our training courses in both traditional full-day and convenient half-day formats. Our half-day classes are specifically designed for IT professionals who cannot be away from their workplaces for consecutive full days. This flexible schedule allows participants to dedicate a few hours to learning and then return to their regular work responsibilities.
The curriculum for both the full-day and half-day formats is identical. The primary difference is that the half-day classes spread the coursework over a more extended period, providing a balanced approach to professional education. DataCipher has been successfully running these half-day training sessions for several years, receiving consistently positive feedback from our customers. They appreciate the flexibility and report that the extended timeframe facilitates a deeper understanding of the material, as it gives them more time to absorb and reflect on the information learned.
This instructor-led training introduces participants to Cortex XDR, Palo Alto Networks’ extended detection and response platform designed to unify endpoint data, analytics, and response workflows. The course provides a detailed view of how Cortex XDR supports investigation, detection, and case management across modern security operations.
Participants will learn how to investigate cases by analyzing alerts, assets, and causality chains, query and analyze logs using XQL, and apply advanced tools for forensic analysis and vulnerability investigation.
Through guided simulations, learners will also work with platform automation, dashboards, and reports to support efficient and consistent security investigations.
Testimonials
Thanks for registering. Our training team will be in touch soon to confirm your class schedule and help you get started.