Palo Alto ATC Logo

Palo Alto Networks EDU-260

Cortex XDR: Prevention, Analysis, and Response

Palo Alto ATC Logo

This course replaces the trainings EDU-281 - Traps 4.x: Install, Configure and Manage, EDU-285 - Traps 4.x: Deploy and Optimize, and EDU-290 - Traps: Cloud Service Operations.

Successful completion of this instructor-led course with hands-on lab activities should enhance the student’s understanding of how to activate a Cortex XDR instance; create agent installation packages to install the Cortex XDR agents; create security policies and profiles to protect endpoints against multi-stage, fileless attack built using malware and exploits; respond to attacks using response actions; understand behavioral threat analysis, log stitching, agent-provided enhanced endpoint data, and causality analysis; investigate and triage attacks using the incident management page of Cortex XDR and analyze alerts using the Causality and Timeline analysis views; use API to insert alerts; create BIOC rules; and search a lead in raw data sets in Cortex Data Lake using Cortex XDR Query Builder.

Course Contents

  • Cortex XDR Family Overview
  • Working with the Cortex Apps
  • Getting Started with Endpoint Protection
  • Malware Protection
  • Exploit Protection
  • Exceptions and Response Actions
  • Behavioral Threat Analysis
  • Cortex XDR Rules
  • Incident Management
  • Alert Analysis Views
  • Search and Investigate
  • Basic Troubleshooting

E-Book Symbol You will receive the original course documentation by Palo Alto in English language as an e-book.

Target Group

Cybersecurity analysts and engineers, and security operations specialists

Knowledge Prerequisites

Participants must be familiar with enterprise security concepts.

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

This course replaces the trainings EDU-281 - Traps 4.x: Install, Configure and Manage, EDU-285 - Traps 4.x: Deploy and Optimize, and EDU-290 - Traps: Cloud Service Operations.

Successful completion of this instructor-led course with hands-on lab activities should enhance the student’s understanding of how to activate a Cortex XDR instance; create agent installation packages to install the Cortex XDR agents; create security policies and profiles to protect endpoints against multi-stage, fileless attack built using malware and exploits; respond to attacks using response actions; understand behavioral threat analysis, log stitching, agent-provided enhanced endpoint data, and causality analysis; investigate and triage attacks using the incident management page of Cortex XDR and analyze alerts using the Causality and Timeline analysis views; use API to insert alerts; create BIOC rules; and search a lead in raw data sets in Cortex Data Lake using Cortex XDR Query Builder.

Course Contents

  • Cortex XDR Family Overview
  • Working with the Cortex Apps
  • Getting Started with Endpoint Protection
  • Malware Protection
  • Exploit Protection
  • Exceptions and Response Actions
  • Behavioral Threat Analysis
  • Cortex XDR Rules
  • Incident Management
  • Alert Analysis Views
  • Search and Investigate
  • Basic Troubleshooting

E-Book Symbol You will receive the original course documentation by Palo Alto in English language as an e-book.

Target Group

Cybersecurity analysts and engineers, and security operations specialists

Knowledge Prerequisites

Participants must be familiar with enterprise security concepts.

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.