Palo Alto PCSAE Certification Training Institute | Emigo

Palo Alto Networks Certified Security Automation Engineer (PCSAE) Certification Training

Advance your cybersecurity career with Emigo Networks' comprehensive Palo Alto Networks Certified Security Automation Engineer (PCSAE) certification training.

Palo Alto Networks Certified Security Automation Engineer (PCSAE) Certification Training

Advance your cybersecurity career with Emigo Networks' comprehensive Palo Alto Networks Certified Security Automation Engineer (PCSAE) certification training. This specialized course is designed to provide in-depth knowledge of security automation tools and processes. Master the configuration, management, and optimization of Palo Alto Networks' automation solutions to improve security operations. Gain practical experience in security workflows, incident response, and automation scripting, preparing you for the PCSAE exam. Boost your expertise and take your role in cybersecurity to the next level with this prestigious certification.

Course Overview

The PCSAE certification is designed to validate the skills and expertise needed to develop, manage, and optimize the Cortex XSOAR security orchestration, automation, and response platform, with a focus on native threat intelligence management.

This certification ensures that professionals possess the knowledge to effectively utilize both out-of-the-box and custom playbooks, integrations, and other XSOAR functionalities. It demonstrates their ability to identify business processes that can be automated through XSOAR, customize workflows to enhance security operations, and leverage integrated security tools to significantly reduce mean time to resolution.

Emigo Networks offers comprehensive training to prepare you for the PCSAE certification, equipping you with the necessary skills to excel in the growing field of security automation and orchestration.

What You'll Learn

  • Validates expertise in developing, analyzing, and managing the Cortex XSOAR platform.
  • Focuses on security orchestration, automation, and response (SOAR) techniques.
  • Covers native threat intelligence management capabilities of Cortex XSOAR.
  • Demonstrates the ability to integrate and automate security operations processes.
  • Equips candidates with the skills to design, deploy, and manage automated workflows for security incidents.

Syllabus Summary

Playbook Development

1.1 Reference and manipulate context data to manage automation workflow 

1.2 Summarize inputs, outputs, and results for playbook tasks 

1.3 Configure inputs and outputs for subplaybook tasks 

1.4 Enable and configure looping on a subplaybook 

1.5 Differentiate among playbook task types 

1.5.1 Manual 

1.5.2 Automated 

1.5.3 Conditional 

1.5.4 Data collection 

1.5.5 Subplaybook

1.6 Apply filters and transformers to manipulate data 

1.7 Apply the playbook debugger to aid in developing playbooks 

Incident Objects

2.1 Configure incident types 

2.2 Identify the role of an incident type within the incident lifecycle 

2.3 Configure an incident layout 

2.3.1 Fields and buttons 

2.3.2 Tabs 

2.3.3 New/Edit and Close Forms 

2.4 Summarize the function, capabilities, and purpose of incident fields 

2.5 Configure classifiers and mappers 

Automations, Integrations, and Related Concepts

3.1 Define the capabilities of automation across XSOAR functions 

3.1.1 Playbook tasks 

3.1.2 War room 

3.1.3 Layouts (dynamic sections, buttons) 

3.1.4 Jobs 

3.1.5 Field trigger scripts 

3.1.6 Pre/post-processing 

3.2 Differentiate between automations, commands, and scripts 

3.3 Interpret and modify automation scripts 

3.3.1 Script helper 

3.3.2 Script settings 

3.3.3 Language types 

3.3.4 Script text 

3.4 Identify the properties and capabilities of the XSOAR framework for integration 

3.5 Configure and manage integration instances 

Content Management and Solution Architecture

4.1 Apply marketplace concepts for the management of content 

4.1.1 Searching in marketplace 

4.1.2 Installation and updates 

4.1.3 Dependencies 

4.1.4 Version history 

4.1.5 Partner supported versus XSOAR supported 

4.1.6 Submitting content to the marketplace 

4.2 Apply general content customization and management concepts 

4.2.1 Custom versus system content 

4.2.2 Duplicating content 

4.2.3 Importing/exporting custom content 

4.2.4 Version control

4.3 Manage local changes in a remote repository (dev-prod) configuration 

4.4 Describe the components of the XSOAR system architecture 

4.4.1 System hardware requirements 

4.4.2 Remote repositories (dev-prod) 

4.4.3 Engines 

4.4.4 Multitenancy 

4.4.5 Elasticsearch/HA 

4.4.6 Docker 

4.5 Describe the incident lifecycle within XSOAR 

4.6 Define the capabilities of RBAC 

4.6.1 Page access 

4.6.2 Integration permissions 

4.6.3 Incident tabs (layout specification) 

4.6.4 Automation permissions 

4.6.5 Incident viewing permissions by role 

4.7 Identify the troubleshooting tools available to obtain more diagnostic information 

4.7.1 Log bundles 

4.7.2 Integration testing 

4.8 Identify options available for performance tuning 

4.8.1 Ignore output 

4.8.2 Quiet mode 

4.9 Monitor system health using the System Diagnostics page 

UI Workflow, Dashboards, and Reports

5.1 Identify methods for querying data 

5.1.1 Indicators 

5.1.2 Incidents 

5.1.3 Dashboards 

5.1.4 Global search 

5.2 Summarize the workflow elements used during an investigation 

5.2.1 Layouts 

5.2.2 War Room 

5.2.3 Work Plan 

5.2.4 Evidence Board 

5.2.5 Actions menu 

5.3 Interact with layouts for incident management 

5.3.1 Sections 

5.3.2 Fields 

5.3.3 Buttons 

5.4 Summarize tools used for managing incidents 

5.4.1 Bulk incident actions 

5.4.2 Table view versus summary view 

5.4.3 Table settings

5.5 Identify the capabilities of existing dashboards and reports 

5.6 Summarize what information can be created, edited, or shared within dashboards and reports 

5.7 Summarize the capabilities of widget builder 

Threat Intel Management

6.1 Identify the parameters available for configuring indicator objects 

6.1.1 Layouts and types 

6.1.2 Fields 

6.1.3 Reputation scripts and commands 

6.1.4 Expiration 

6.2 Generate threat intel reports 

6.3 Describe the features of the Threat Intel page 

6.3.1 Unit 42 intel feature 

6.3.2 XSOAR indicators 

6.3.3 Export/import capabilities 

6.4 Configure threat intel feed integrations 

6.5 Identify the options available to auto extract 

6.5.1 Exclusion list 

6.5.2 Playbook auto extract 

6.5.3 Regex for auto extract 

6.5.4 System defaults 

6.5.5 Extraction settings for incident types


Pre-requisites

  • Palo Alto Networks Certified Cybersecurity Apprentice
  • Palo Alto Networks Certified Cybersecurity Practitioner
  • Palo Alto Networks Certified Security Operations Generalist

Required Exams

  • Exam: PCSAE
  • Cost: $175 USD
  • Duration: 90 Minutes

Who should attend

Designed for individuals aiming to demonstrate their proficiency in using Palo Alto Networks Cortex XSOAR functionality.

Suitable for various roles, including:

  • Customers
  • Partners
  • System Engineers
  • Analysts
  • Administrators

Focuses on building knowledge, skills, and abilities in security automation and incident response using Cortex XSOAR.

Related Courses

experts-banner-background

EMIGO Expert Training Team

new-batch-mage

New Batches Commence On

Testimonials

enquiry-section1-bg
enquiry-form-model1

Learn like a Leader
Not a follower

Scan or Click on the QR Code to submit your enquiry

Enquiry
enquiry-section1-qrcode
footer-enquiry footer-enquiry