Need To Know: 1. WildFire analysis Security Profile a. What it is i. WildFire Analysis Security Profile: A security profile used to submit potentially malicious files or URLs to Palo Alto Networks' WildFire cloud-based sandboxing service for dynamic analysis, detecting and preventing unknown threats by analyzing their behavior in a controlled environment. b. What it’s used for i. Mainly used to analyze files for malware 2. Pros of a WPA3 over a WPA2 a. Why is it better b. WPA2 i. Personal mode (shared authentication) is secure, but ii. humans share the key (passcode) and never change it iii. Enterprise mode (each user is authenticated before connection is completed) is common and widely deployed c. WPA3 i. Will take many years to become wide-spread ii. Personal mode is more resistant to brute-force key (passcode) guessing iii. Enterprise mode increases key length from 128-bit to 192-bit 3. Know what an active passive firewall configuration is a. What are the benefits i. Active-passive firewall configuration involves deploying two firewalls in parallel, with one actively processing traffic and the other in standby mode. ii. Benefits include high availability with automatic failover, continuous protection during maintenance or failures, and scalability to accommodate increased traffic or security needs. iii. It enhances network reliability, resilience, and security by providing redundancy and ensuring uninterrupted protection against cyber threats. 4. Know Trusted Root CA (Certification Authority) a. Trusted Root CA (Certification Authority): A Certificate Authority (CA) that is implicitly trusted by operating systems and web browsers to issue digital certificates for verifying the authenticity of public key infrastructure (PKI) certificates used in secure communication protocols such as SSL/TLS. 5. VLAN tags a. Logically separate frames moving over a single port (VLAN tagging) b. VLAN Tags: Numeric identifiers added to Ethernet frames to designate which virtual LAN (VLAN) a particular frame belongs to, enabling network segmentation and isolation for traffic management and security purposes. 6. Primary Reason why an IDS Solution is vs over a IPS solution a. It's not necessarily "better" than an IPS solution; rather, it serves a different purpose. An IDS solution focuses on detection and alerting without actively blocking traffic, which can be useful for monitoring and analysis without risking false positives or potential disruptions to legitimate traffic. However, an IPS solution actively prevents and blocks identified threats, offering proactive protection but potentially causing disruptions if misconfigured or if false positives occur. The choice between an IDS and an IPS depends on specific security needs and risk tolerance. 7. Zero Trust a. Zero Trust, Zero Trust Network, Zero Trust Architecture i. Never trust, always verify ii. Authenticate ALL authorized actions and then log all actions to hold users accountable, regardless of their location b. Zero Trust is only possible at Layer 7 i. Segment the networks, and then authenticate and validate the access at the application layer (Layer 7) based on the user’s identity ii. This is one of the primary functions of a NextGen firewall iii. A Segmentation Gateway provides all security features c. What layer does it run on i. Zero Trust is only possible at Layer 7, but you can start now in other layers 8. Benefits of Network Segmentation a. Reduces the number of potential attackers for a given host (reduces the attack surface) b. Reduces propagation of malware (lateral movement) c. Reduces ability of attackers to “call home” from compromised computer 9. Know User ID & what a DNS Sinkhole is a. User ID: Identifies individual users or devices accessing a network, allowing for granular security policies and monitoring based on user identity rather than just IP addresses. b. DNS Sinkhole: A DNS sinkhole is a technique used to redirect malicious or unwanted domain name resolution requests to a controlled server, often used to block access to known malicious domains or to monitor and analyze malicious activity. 10. What is an External Dynamic List a. External Dynamic List: A list of IP addresses, domains, or other indicators of compromise sourced from external threat intelligence feeds or custom sources, used by security devices to enhance threat detection and prevention capabilities. 11. Know the difference b/w Access Controls and an Access Control list a. ACCESS CONTROL LISTS i. Lists of rules are often called Access Control Lists (ACLs) ii. Access Control Entries are rules in an ACL that are evaluated in order of placement, and once an ACE is “fired” the subsequent ACEs are ignored iii. On Cisco devices (and others) you type commands in, but systems with a visual editors are much easier to understand b. 12. Understand what layer reverse proxy runs on a. Layer 7 - Application b. Inbound (reverse proxy or Web Application Firewall) achieves this by installing the website’s SSL certificate at the proxy, instead of at the web server itself 13. Know Difference b/w EDR, XDR, MDR a. EDR i. (Endpoint Detection and Response): Focuses on detecting and responding to threats on individual endpoints, providing visibility and protection at the device level. ii. A software agent protecting each workstation, server, etc b. XDR i. (Extended Detection and Response): Offers broader threat detection and response capabilities by integrating data from multiple security solutions across different layers of the infrastructure. c. MDR i. (Managed Detection and Response): Provides a fully managed security service that combines technology, expertise, and continuous monitoring to detect and respond to threats across the entire environment, often including EDR and XDR capabilities. d. Definitions: i. Endpoint Detection and Response (EDR) – Detect and contain attacks at the endpoint ii. Endpoint Protection Platform (EPP) – Extends EDR to provide prevention iii. Extended Detection and Response (XDR) – Integrates with network detection to correlate attacks iv. Managed Detection and Response (MDR) – Outsource to an MSSP (Managed Security Service Provider) 14. Know Difference b/w Layer 3 & Layer 2 Switch a. Layer 3 Switch: i. Operates at the network layer (Layer 3) of the OSI model, allowing for IP routing between different subnets or VLANs. ii. Can make forwarding decisions based on IP addresses, enabling more efficient routing of traffic within a network and providing enhanced scalability and flexibility. b. Layer 2 Switch: i. Operates at the data link layer (Layer 2) of the OSI model, primarily forwarding traffic based on MAC addresses. ii. Typically used for local area networks (LANs) to segment network traffic into separate collision domains and reduce network congestion. 15. Know what a privilege account is and it’s benefits a. Privileged Account: An account with elevated permissions and access rights, typically used by system administrators or IT personnel to perform administrative tasks, configure systems, and manage resources. The benefits include enhanced security through access control, better accountability for actions performed, and reduced risk of unauthorized access or misuse of critical systems and data. 16. What Single sign on Tech is a. Single-Sign On is not the same as MFA i. One authentication server for multiple applications ii. Reduces MFA fatigue iii. Reduces effort of application-level authentication iv. Enables swift, broad revocation of access 17. Know Network Segmentation vs Micro Segmentation a. Network Segmentation i. Reduce visibility of assets to the minimum necessary ii. Reduces traffic on on all networks ● Enables intrusion detection sensors to work more efficiently and thus reduces load on traffic monitoring systems iii. Reduces the number of potential attackers for a given host (reduces the attack surface) iv. Reduces propagation of malware (lateral movement) v. Reduces ability of attackers to “call home” from compromised computer b. Micro Segmentation i. Makes segmentation more granular ii. Would be expensive with multiple hardware firewalls iii. Would be difficult with multi-homed hardware firewalls iv. Leverages virtual firewalls v. Allows application-level data flow restrictions within the virtual environment c. How to Implement Micro Seg i. Leverages virtual firewalls ii. Virtual network firewalls d. Pros & cons of Network Segmentation i. Reduces traffic on on all networks ● Enables intrusion detection sensors to work more efficiently and thus reduces load on traffic monitoring systems ii. Reduces the number of potential attackers for a given host (reduces the attack surface) iii. Reduces propagation of malware (lateral movement) iv. Reduces ability of attackers to “call home” from compromised computer 18. Know IPSec Crypto a. IPsec (Internet Protocol Security) Crypto refers to the cryptographic protocols and algorithms used to secure communications over IP networks. b. The version of encryption used in IPsec can vary depending on the specific configuration and negotiation between communicating devices. Common encryption algorithms used in IPsec include: c. What version of encryption is it using? i. AES (Advanced Encryption Standard) 19. Know What an attack surface is a. An “attack surface” is the sum of all potential points of entry of an attacker, which is nearly impossible to define 20. Know What a Security Profile is a. Security Profile: A comprehensive summary of an entity's security posture, including its security policies, configurations, vulnerabilities, and defenses, often used for assessment, monitoring, and improvement purposes. 21. Know the benefits & cons of Public VPS Services a. Benefits & Cons of Public VPS Services: i. Benefit: Cost-effective and scalable solution for hosting websites, applications, and services with flexible resources and pay-as-you-go pricing models. ii. Con: Shared infrastructure may result in reduced performance, security concerns, and limited customization options compared to dedicated hosting environments. 22. Know what a Secure Gateway is a. Modern, advanced outbound proxies are called Secure Web Gateways (on-premise or cloud-based) i. URL filtering (by name or category) ii. File caching for reducing page load time and bandwidth use Malware detection iii. Content analysis and filtering iv. VPN replacement 23. Know PAT vs NAT a. NAT i. maps a private IP address to a public IP address (Layer 3) within a router or firewall ● Used outbound it can be many-to-one ● Use inbound it is one-to-one (static NAT) ii. Rules are still written to control the flow of data between NAT’d IP addresses b. PAT i. PAT maps a specific port (Layer 4) on a private IP to specific port on a public IP, which allows many private IPs to share one public IP ii. Rules are still written to control the flow of data between the established ports 24. Know what a Vulnerability protection profile is 25. Know what Layer 4 (Transport) Protocols are a. TCP & UDP i. At Layer 4 the firewall rules will control the TCP and UDP connections between previously the approved IP addresses ii. Layer 4 (Transport) Protocols: TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are Layer 4 protocols responsible for facilitating communication between applications over a network, with TCP providing reliable, connection-oriented communication, and UDP offering simpler, connectionless communication. iii. Firewall Rules: At Layer 4, firewall rules regulate TCP and UDP connections between pre-approved IP addresses, enforcing security policies based on protocol, source and destination IP addresses, and port numbers. 26. Know what Lateral Movement is a. Lateral Movement refers to the technique used by attackers to move horizontally across a network, from one compromised system to another, in search of valuable targets. b. It involves exploiting vulnerabilities in interconnected systems within the same network segment, known as east-west or lateral traffic, bypassing traditional perimeter defenses. 27. Know what a Cloud Access Security Broker is (CasB) a. Cloud Access Security Brokers (CASB) have historically been used for reporting on use of “shadow IT” b. Modern CASBs are more invasive i. Uses a proxy server and API connectors to correlate activity ii. Monitors traffic moving between cloud applications iii. Enforces encryption of data-in-motion iv. Integrates with Single-Sign On systems to enforce policies c. SWGs are blurring the lines with CASBs d. Cloud-based CASBs are the future, not on-premise 28. Know What Anti Spyware profile is a. Anti-Spyware Profile: A security profile used to detect and prevent spyware, which is malicious software designed to monitor and gather information about a user's activities without their consent. 29. Know what a Jump Server is a. Jump Server: A secure intermediary server used to access and manage devices within a network, typically employed to enhance security by minimizing direct access to critical systems. b. Remote 30. Know Diff b/w State list vs Statefull Firewall a. Stateful Firewall vs. Stateless Firewall: i. Stateful Firewall: Monitors the state of active connections and enforces security policies based on the context of those connections, allowing only legitimate traffic to pass through. ii. Stateless Firewall: Filters network traffic based solely on predetermined criteria such as source and destination addresses, without considering the state or context of connections. 31. Know Basic Network Components a. Basic Network Components: i. ii. iii. iv. b. Router: Device used to forward data packets between computer networks. Switch: Device that connects multiple devices within a network, forwarding data only to the intended recipient. Firewall: Security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Access Point: Device that allows wireless devices to connect to a wired network using Wi-Fi technology.