Important Links

Cisco CCNA/CCNP/CCIE Security
Checkpoint CCSA/CCSE
Juniper SRX
Cisco Meraki
CompTIA Linux+/LPIC1
CompTIA Network+/Security+
Microsoft MCSA

Useful Tools

Security Advisories:


Palo Alto:

EoL links:
Palo Alto:

CVE (Common Vulnerabilities and Exposures) and CVSS (Common Vulnerability Scoring System):

Important Organizations:
United States Computer Emergency Readiness Team (US-CERT)
National Cybersecurity and Communications Integration Center (NCCIC)
Cybersecurity and Infrastructure Security Agency (CISA)
National Institute of Standards and Technology (NIST)
National Cyber Security Centre (NCSC)
Government Communications Headquarters (GCHQ)


Steps: Adding HA devices to Panorama

1. Enable Config Sync (untick on both)(commit).
2. Specify Panorama Server on HA Firewalls and Enable Policy, Objects and Templates options (commit).
3. Add Firewalls as Manages devices in Panorama using serial numbers (Tick Group HA Peers) (commit Panorama).
4. Import Device configuration to Panorama (Post Rule/Leave ticked) (Primary)
5. Import Device configuration to Panorama (Post Rule/Leave ticked) (Secondary)
6. Commit (Panorama) (Creates Device Groups and Templates for both).
7. Remove Secondary Template and Device Group and Add both to the Primary Device Group and Template.
8. Export Configuration (Push and commit) Device Group config to Secondary only and Make the Primary suspended for Secondary to takeover.
9. Export Configuration (Push and commit) Device Group config to Primary now and Failback to the Primary.
(Both Should be showing In Sync under Managed Devices under Device Group and Templates)

Why Conduct Pen Test?

Why conduct a penetration test?

An organisation should carry out a penetration test:

When penetration testing is conducted within the UK, there are a number of laws that govern the activities that form part of a penetration test.

For the majority of tests, these laws include the following:

In order to ensure that penetration testing is conducted in line with UK law and also to ensure that the test is conducted as efficiently as possible, a testing consent form must always be used to capture the exact scope of the test and provides those responsible for an organisation’s infrastructure with a means of providing their consent.

CREST Exams (CPSA(CREST Practitioner Security Analyst)/CPIA(CREST Practitioner Incident Analyst))

0.0 Why Conduct a Pen Test?
1.0 Pen Testing Explained and Life Cycle
2.0 CPSA Syllabus
3.0 CPIA Syllabus
5.0 Practical Malware Analysis Book (Videos)
5.1 CPIA (Crest Practitioner Intrusion Analyst) Notes (Private)
5.2 Processor Registers (Video)
6.0 Ethical Hacking and Network Defense Book (Videos)
7.0 Advanced Ethical Hacking Book (Videos)
8.0 DNS Security Book (Videos)
9.0 Incident Response Book (Videos)
10.0 SANS Digital Forensics and Incident Response (Playlists)
11.0 Open Security Training (Playlists)
12.0 Why Base64 is dangerous?
16.0 Exfiltration Techniques

Upload ASA software image without ASDM (CLI)(Using SCP)

(use pscp for windows)


ssh scopy enable

pscp C:\Users\fali\Desktop\asa964-17-lfbff-k8.SPA Nettitude@

(use pscp -1 …… for version 1)


no boot system disk0:/asa952-6-lfbff-k8.SPA
boot system disk0:/asa964-17-lfbff-k8.SPA
boot system disk0:/asa952-6-lfbff-k8.SPA
wr mem
reload in 8:00