Vouchers de Exámenes: Palo Alto Networks Certified Security Automation Engineer (PCSAE)
- Precio: eur155.00
- Código: PCSAE
Descripción
TopThe Palo Alto Networks Security Automation Engineer (PCSAE) certification is designed to validate the knowledge and skills required to develop, analyze, and administer the Palo Alto Networks Cortex XSOAR platform with native threat intelligence management.
Más Información
TopTarget Audience
This certification is designed for anyone interested in demonstrating knowledge, skills, and abilities using Palo Alto Networks Cortex XSOAR functionality, including customers, partners, system engineers, analysts, and administrators.
Contenido
TopThe blueprint table lists the domains covered and includes domain weighting. The percentage weights represent the portion of the exam score that is attributed to each domain. Many candidates find the table provides focus for studies during exam preparation. Also included in the blueprint table are the more specific tasks associated with each domain. Pay particular attention to these tasks, as they provide more targeted areas of study within the domains.
1 Playbook Development 27%
1.1 Reference and manipulate context data to manage automation workflow
1.2 Summarize inputs, outputs, and results for playbook tasks
1.3 Configure inputs and outputs for subplaybook tasks
1.4 Enable and configure looping on a subplaybook
1.5 Differentiate among playbook task types
1.5.1 Manual
1.5.2 Automated
1.5.3 Conditional
1.5.4 Data collection
1.5.5 Subplaybook
1.6 Apply filters and transformers to manipulate data
1.7 Apply the playbook debugger to aid in developing playbooks
2 Incident Objects 13%
2.1 Configure incident types
2.2 Identify the role of an incident type within the incident lifecycle
2.3 Configure an incident layout
2.3.1 Fields and buttons
2.3.2 Tabs
2.3.3 New/Edit and Close Forms
2.4 Summarize the function, capabilities, and purpose of incident fields
2.5 Configure classifiers and mappers
3 Automations, Integrations, and Related Concepts 18%
3.1 Define the capabilities of automation across XSOAR functions
3.1.1 Playbook tasks
3.1.2 War room
3.1.3 Layouts (dynamic sections, buttons)
3.1.4 Jobs
3.1.5 Field trigger scripts
3.1.6 Pre/post-processing
3.2 Differentiate between automations, commands, and scripts
3.3 Interpret and modify automation scripts
3.3.1 Script helper
3.3.2 Script settings
3.3.3 Language types
3.3.4 Script text
3.4 Identify the properties and capabilities of the XSOAR framework for integration
3.5 Configure and manage integration instances
4 Content Management and Solution Architecture 17%
4.1 Apply marketplace concepts for the management of content
4.1.1 Searching in marketplace
4.1.2 Installation and updates
4.1.3 Dependencies
4.1.4 Version history
4.1.5 Partner supported versus XSOAR supported
4.1.6 Submitting content to the marketplace
4.2 Apply general content customization and management concepts
4.2.1 Custom versus system content
4.2.2 Duplicating content
4.2.3 Importing/exporting custom content
4.2.4 Version control
4.3 Manage local changes in a remote repository (dev-prod) configuration
4.4 Describe the components of the XSOAR system architecture
4.4.1 System hardware requirements
4.4.2 Remote repositories (dev-prod)
4.4.3 Engines
4.4.4 Multitenancy
4.4.5 Elasticsearch/HA
4.4.6 Docker
4.5 Describe the incident lifecycle within XSOAR
4.6 Define the capabilities of RBAC
4.6.1 Page access
4.6.2 Integration permissions
4.6.3 Incident tabs (layout specification)
4.6.4 Automation permissions
4.6.5 Incident viewing permissions by role
4.7 Identify the troubleshooting tools available to obtain more diagnostic information
4.7.1 Log bundles
4.7.2 Integration testing
4.8 Identify options available for performance tuning
4.8.1 Ignore output
4.8.2 Quiet mode
4.9 Monitor system health using the System Diagnostics page
5 UI Workflow, Dashboards, and Reports 13%
5.1 Identify methods for querying data
5.1.1 Indicators
5.1.2 Incidents
5.1.3 Dashboards
5.1.4 Global search
5.2 Summarize the workflow elements used during an investigation
5.2.1 Layouts
5.2.2 War Room
5.2.3 Work Plan
5.2.4 Evidence Board
5.2.5 Actions menu
5.3 Interact with layouts for incident management
5.3.1 Sections
5.3.2 Fields
5.3.3 Buttons
5.4 Summarize tools used for managing incidents
5.4.1 Bulk incident actions
5.4.2 Table view versus summary view
5.4.3 Table settings
5.5 Identify the capabilities of existing dashboards and reports
5.6 Summarize what information can be created, edited, or shared within dashboards
and reports
5.7 Summarize the capabilities of widget builder
6 Threat Intel Management 12%
6.1 Identify the parameters available for configuring indicator objects
6.1.1 Layouts and types
6.1.2 Fields
6.1.3 Reputation scripts and commands
6.1.4 Expiration
6.2 Generate threat intel reports
6.3 Describe the features of the Threat Intel page
6.3.1 Unit 42 intel feature
6.3.2 XSOAR indicators
6.3.3 Export/import capabilities
6.4 Configure threat intel feed integrations
6.5 Identify the options available to auto extract
6.5.1 Exclusion list
6.5.2 Playbook auto extract
6.5.3 Regex for auto extract
6.5.4 System defaults
6.5.5 Extraction settings for incident types
Prerrequisitos
TopInstructor-led courses:
(EDU-380) Cortex XSOAR: Automation and Orchestration
Certifications:
Palo Alto Networks Certified Cybersecurity Apprentice
Palo Alto Networks Certified Cybersecurity Practitioner
Palo Alto Networks Certified Security Operations Generalist
Cursos Relacionados
Parte superior- #000000
