- What is the difference between Network, Cyber and Information Security?
- Cybersecurity vs Network security vs Information security (Video)
- What is Assurance and Compliance and how it can be applied to NGFWs?
- Certification Roadmap (Network, Cyber, Cloud and Information Security/GRC/ITSM)
- ***Standards, Regulations, Frameworks and Compliance: CIS CSC v8/CIS Benchmarks/ISO27001:2022/ISO27002:2022/PCI-DSS v4/NCSC CAF/NCSC Cyber Essentials/GDPR/NIST CSF/NIST SP 800-53/NIST SP 800-171/SOC2/MITRE ATT&CK/COBIT/CSA CCM/CMMC/HIPPA/OWASP Top10***
- CIS (Center for Internet Security) Controls v7.1 and v8 (Download Link)
- CIS v7 / v8 Security Controls Navigator (Mapping to other Frameworks)(CIS Contorls v8 (18 controls) (153 safeguards or subcontrols)CIS Contorls v7.1 (20 controls) (171 safeguards or subcontrols)(IG1/IG2/IG3)(IG1/IG2/IG3))
- The 18 CIS Critical Security Controls (Formerly the SANS Critical Security Controls (SANS Top 20))
- CIS (Center for Internet Security) Critical Security Controls and Mapping to other Frameworks (pdf)
- CIS Security Controls v7 / v8 and mappings
- NIST (National Institute of Standard and Technology) SP 800-53 Full Control List
- The 20 NIST Control Families
- NIST CSF (Cyber Security Framework
- *****Security Compliance, Best Practices and Hardening******
- NCSC (National Cyber Security Centre) S2S IKE VPN Parameters
- CIS Benchmarks (Cisco(Routers/Switches/FTD)/Fortigates/Palo etc.)
- Palo Alto PCI Compliance White Paper
- Palo Alto NIST CSF Compliance Whitepaper
- Palo Also Compliance NCSC CSP (Cloud Security Principles) 2022 Whitepaper
- Fortinet ISO 27001 Compliance
- Fortinet NIST Compliance
- Fortinet PCI DSS Compliance
- Implementing Best Practices for Zero Trust (Video)
- Best Practices to Achieve Zero Trust in Your Internet Edge (Video)
- Security Best Practices Checklist for Palo Alto Networks Next-Generation FireWalls (Excel Checklist)
- Firewall Hardening Best Practices for Palo Alto Networks (Video Explaining BPA Checklist)
- Cisco Guide to Harden Cisco IOS Devices
- Firepower Threat Defense – Common Practice Guide Walkthrough (Video)
- Cisco FTD Policy Management Common Practices (pdf)
- Cisco FTD Device Management Common Practices (pdf)
- ***********Useful Network and Security Tools***********
- Useful Links
- Auvik Network Monitoring and Management Tool for MSPs (Managed Service Providers)
- Auvik RMM (Remote Monitoring and Management) fo MSP Walk Trough
- Cloud Based Multi Tenant OpenVPN (Cloud Connexa)
- Cloud Based Radius as a Service (RaaS)
- Manage Engine Firewall Analyzer (Firewalls Compliance Tool)(Firewalls Audit and Compliance Tool)
- Best Practice Assessment (BPA) Tool – Introduction
- Best Practice Assessment Plus (BPA+) Overview Video
- Meraki PCI Compliance Reports
- Tenable Nessus Professional Overview(Vulnerability Scanner and Audit Tool)
- Nmap Tutorial to find Network Vulnerabilities(Vulnearbilities Scanner)
- ********MSP (Manged Service Provider)/MSSP (Managed Security Service Provider)/CSP (Cloud Service Provider)**********
- 1 of 3: What is an MSP? Managed Service Providers in the tech industry
- 2 of 3: Valuing an MSP business for potential sale. Exit strategy for entrepreneurs.
- 3 of 3: What is involved in selling your MSP business? Entrepreneurs need an exit strategy.
- **(Consultant/Engineer/Project Engineer (Professional and Managed Services (MSP/Managed Service Provider))**
- HLD (High Level Design) vs LLD (Low Level Design)
- Network Professional Services/Consultancies
- Common Network Architectures/Designs/Topologies
- Cisco Device Hardening for IOS, IOS-XE, IOS-XR, NX-OS
- Cisco Parts and Materials (BOM (Bill of Materials)/Cisco CCW (Cisco Commerce Renewals)/SKU Tool)
- Check Device Coverage
- Power Connectors (Video)
- UK BS1363 Male Plug Angled Down to IEC320 C13 Connector (Kettle Lead) Vs. IEC320 C14 Male Plug to C13 Connector (Jumper Cord)
- UK BS1363 Male Plug Angled Down to IEC320 C13 Connector (Kettle Lead) Vs. IEC320 C14 Male Plug to C13 Connector (Jumper Cord)
- 5 Considerations: Sizing Your Next-Gen Firewall (NGFW)
- ************Cisco CCNA/CCNP Enterprise************
- HP vs Cisco Commands Comparison
- Recommended Releases for Catalyst 9200/9300/9400/9500/9600 and Catalyst 3650/3850 Platforms
- Cisco Catalyst 9000 Series Licensing
- Subnet Calculator
- Subnetting and TCP/IP
- EtherChannel L2 and L3
- Easy transfer of files to/from Cisco Router/Switch (pscp -scp -v -P 32254 cat3k_caa-universalk9.16.12.05b.SPA.bin COMPANY@X.X.X.X:cat3k_caa-universalk9.16.12.05b.SPA.bin)
- Bundle Mode or Install Mode: How to Upgrade your Cisco IOS Switch (Video)
- Catalyst 9300 Upgrading IOS-XE 16.6.2 onward (Install Mode)
- Comparison: Cisco ISR vs ASR
- Cisco VRF Configuration and Verification Commands
- Difference Between Cisco ISR and ASR
- Netflow vs. SNMP for Network Monitoring System (NMS)
- NetFlow vs SNMP for Network Monitoring?
- Install a remote probe for PRTG in 4 steps
- Cisco NetFlow Intro and Config
- PRTG Tutorial – Bandwidth Monitoring (Channels List/TopLists) With Flow/NetFlow
- Five Things To Know About DHCP Snooping
- *************Palo Alto PCCET/PCNSA/PCNSE*************
- Palo Alto Security Advisories
- PAN-OS and Panorama Software End of Life (EoL) Summary
- Palo Alto Hardware End-of-Life Dates
- Palo Alto Networks Firewalls Supported PAN-OS Versions
- Palo Alto End-of-Sale Announcements
- Changes to Default Behavior PAN-OS
- Preferred Release PAN-OS
- Determine the Upgrade Path to PAN-OS 10.2
- SD-WAN Basics
- Palo Alto Hub and Spoke SDWAN Setup using Panorama
- URL Filtering Categories Palo Alto
- Palo Alto Commands (Important)
- Palo Alto troubleshooting commands
- VIEWING THE CONFIGURATION IN SET AND XML FORMAT
- HOW TO CONFIGURE THE MANAGEMENT INTERFACE IP
- CLI Cheat Sheet: HA
- CLI Cheat Sheet: Device Management
- CLI Cheat Sheet: Networking
- How to perform PANOS upgrade from CLI?
- CLI Cheat Sheet: User-ID
- How to Import and Export Address and Address Objects (CLI) (Creating objects from a file of IPs)
- Tutorial: Configurable Deny Action (Video)
- Wildcard Guidelines for URL Category Exception Lists
- Understanding Palo Alto the Best Practice Assessment (BPA) Tool (Video)
- Palo Alto PAN-OS EoL Summary
- Palo Alto Security Advisories
- Palo Alto Hardware EoL
- Palo Alto BOM (Bill of Material) and SKU (Stock Keeping Unit)
- Palo Alto Support Plans
- Complete Guide to Upgrading Palo Alto Firewalls and Panorama
- Palo Alto Panorama HA upgrade
- Upgrade Firewalls Using Panorama
- How to Configure IPSec VPN
- How to check Status, Clear, Restore, and Monitor an IPSEC VPN Tunnel
- Palo Alto NAT Examples
- Simple configuration examples of source and destination NAT
- How To Packet Capture (tcpdump) On Management Interface
- How to Configure DNS Sinkhole
- Connect firewall to Cortex Data Lake (Video)
- Start Sending Logs to Cortex Data Lake (Panorama-Managed)
- TROUBLESHOOTING FIREWALL CONNECTIVITY ISSUES WITH LOGGING SERVICE or Logs Sending issues to Panorama
- PANOS CLI Commands to Debug Palo Alto Logging Service
- How To Troubleshoot High Management Plane Memory Usage
- HOW TO RETRIEVE AN EVALUATION LICENSE EXTENSION (Delete License File and Fetch it again)
- HOW TO TROUBLESHOOT CONNECTION FAILURE TO CORTEX DATA LAKE (CDL)
- VERIFYING CORTEX DATA LAKE CONNECTIVITY ON A PALO ALTO FIREWALL
- TCP Ports and FQDNs Required for Cortex Data Lake
- HIGH DISK SPACE USAGE ON / ROOT PARTITION AND HOW TO CLEAR
- HOW TO DETERMINE HOW MUCH DISK SPACE IS ALLOCATED TO LOGS
- HOW TO RUN CLEANUP SCRIPT IF ROOT DISK-SPACE EXCEED 90%
- DISK USAGE EXCEEDS LIMIT 95 PERCENT AFTER UPGRADE TO PAN-OS 10.2.0
- TROUBLESHOOTING SLOWNESS WITH TRAFFIC, MANAGEMENT
- UID-Agentless WINRM HTTPS on Paloalto
- How to configure WinRM over HTTPS with Basic Authentication
- How to Setup SDWAN in LAB using Palo Alto Network Virtual Firewalls.
- Palo Study Notes
- 0.0 Palo Alto CBT Nuggets
- 0.1 Palo Alto Training Videos
- 1. How to Import and Export Address and Address Objects (CLI) (Creating objects from a file of IPs)
- 2. How to Create an IPSec Tunnel to AWS (Amazon Web Services) From a Palo Alto Firewall with Static Routing
- 3. Revert Firewall Configuration Changes (Revert to the current running configuration)
- 4. Best Practices for PAN-OS Upgrade (Palo Alto Upgrade)
- 4.1 Upgrade Palo Firewalls (CLI)
- 5. How to Unblock Addresses after Block-IP Action is Triggered by Threat Protection
- 6.0 What is IPSec?
- 6.1 Palo Alto (8.0) Site to Site VPNs
- 6.2 IPSec VPN Setup (Site to Site VPN Config)
- 6.3 IPSec Site to Site tunnel: Palo Alto to Cisco
- 7.0 Example NAT Rules (Important)
- 7.1 Tutorial: How to Configure Source NAT on the PAN-OS GUI
- 7.2 Tutorial: Network Address Translation
- 7.3 Tutorial: Understanding the NAT/Security Policy Configuration
- 7.4 How to Configure U-Turn NAT
- 7.5 Configure Destination NAT Using Dynamic IP Addresses
- 8.0 Palo Alto Commands (Important)
- 8.1 Useful Troubleshooting Commands
- 9.0 SSL Outbound Decryption
- 9.1 How to Implement and Test SSL Decryption (Inbound and Outbound)
- 9.2 HOW TO TEMPORARILY DISABLE SSL DECRYPTION
- 10.0 GlobalProtect Logs from the Client
- 10.1 How to Configure GlobalProtect Portal Page to be Accessed on any Port
- 10.2 GLOBALPROTECT CLIENT STUCK AT CONNECTING WHEN WORKSTATION IS ON THE LOCAL NETWORK
- 10.3 BASIC GLOBALPROTECT CONFIGURATION WITH USER-LOGON
- 11.0 Brute Force Related Signatures
- 11.1 Best Practice for FTP Brute Force
- 12.0 End-of-Life Summary
- 13.0 How to Generate a CSR (Certificate Signing Request) & Import the Signed Certificate
- 14.0 TSHOOT USER-ID: Useful CLI Commands to Troubleshoot LDAP Connection
- 14.1 USER-ID TSHOOT: Agentless User-ID Connection to Active Directory Servers Intermittently Connect and Disconnect
- 14.2 AGENTLESS USER-ID ‘ACCESS DENIED’ ERROR IN SERVER MONITOR
- 14.3 Palo Alto NTSTATUS: NT_STATUS_ACCESS_DENIED – Access denied
- 14.4 HOW TO CONFIGURE AGENTLESS USER-ID
- 15.0 Viewing the configuration in set and XML format
- 16.0 How to View and Install PAN-OS Software through the CLI
- 17.0 Configuring IKEv2 IPsec VPN for Microsoft Azure Environment
- 17.1 Configuring IKEv2 IPsec VPN for Microsoft Azure Environment
- 18.0 What Happens When Licenses Expire on the Palo Alto Networks Firewall?
- 19.0 Deploy Palo Alto in Azure
- 20.0 NOT-APPLICABLE, INCOMPLETE, INSUFFICIENT DATA IN THE APPLICATION FIELD
- 21.0 WHAT IS A PORT SCAN?
- 22.0 AFTER CONFIGURING SSL DECRYPTION, WEB BROWSING SESSIONS DO NOT MATCH THE CONFIGURED POLICY
- 23.0 Multiple ISPs (Load Balancing and Load Sharing)
- 23.1 HOW TO CONFIGURE ISP REDUNDANCY AND LOAD BALANCING
- 23.2 HOW TO IMPLEMENT ECMP (LOAD BALANCING) ON THE FIREWALL
- 23.3 ECMP Load-Balancing Algorithms
- 24.0 Palo Alto Networks-Add HA Firewall Pair to Panorama
- 24.1 HOW TO ADD A LOCALLY MANAGED FIREWALL TO PANORAMA MANAGEMENT
- 24.2 HOW TO PERFORM A DEVICE CONFIG IMPORT INTO PANORAMA
- 24.3 Steps: Adding HA devices to Panorama
- 25.0 Comparing Palo Alto Next Gen Firewalls with Web Application Firewalls (WAF)
- 26.0 Reset/Recover Password Palo Alto
- 26.1 How to perform a Factory Reset on a Palo Alto Networks Device?
- 27.0 Log Retention and Quotas
- 27.1 TIPS & TRICKS: LOG DELETION BASED ON TIME
- 28.0 HOW TO IMPORT AND EXPORT ADDRESS AND ADDRESS OBJECTS
- 29.0 Migrating Checkpoint to Palo using Migration Tool 3.x
- 29.1 Migration Tool 3 Info and Guide
- 29.2 Checkpoint to Palo Alto Migration (Video)
- 30.0 Useful Palo Alto CLI Commands
- 31.0 SNMP configuration examples
- 31.1 Configuring Syslog, SNMP and NetFlow on a Palo Alto Networks Firewall
- 32.0 DNS Sinkhole
- 33.0 CONTROLLING WEBMAIL
- 34.0 Estimate logging rate based on log receiver statistics
- 35.0 Export Palo Policies in excel/xls format for version 7.x.x
- 36.0 User-ID Redistribution (Using Main firewall as User ID agent for other firewalls)
- 37.0 DUAL ISP REDUNDANCY USING STATIC ROUTES PATH MONITORING FEATURE, FOR TRAFFIC FAILOVER
- 38.0 HOW TO CHECK USERS IN LDAP GROUPS
- 39.0 CONFIGURING WINDOWS 2008 R2 RADIUS AUTHENTICATION (NPS RADIUS SERVER)
- 40.0 Connecting PAN-OS to MineMeld using External Dynamic Lists
- 40.1 Enable Access to Office 365 with MineMeld
- 40.2 MineMeld Overview
- 40.3 Quick Tour of MineMeld Default Config
- Best Practices:
- SD-WAN:
- How to Setup SDWAN in LAB using Palo Alto Network Virtual Firewalls (Video)
- A Palo Alto Networks Case Study: Secure Branch Networking with SD-WAN (Video)
- Secure SD-WAN by Palo Alto Networks (Video)
- Palo SD-WAN Admin Guide (Document)
- *************Cisco CCNA/CCNP Security*************
- Cisco Security Software Checker
- Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager
- Firepower Threat Defense – Common Practice Guide Walkthrough (Video)
- Backup and Restore Cisco ASA FIrewalls
- Firepower – Collect FTD Packet Captures with FMC
- Packet Capture in FMC (Tcpdump) (CLI)
- Packet Capture Utility CLI on FTD
- Packet capture with Sourcefire CLI
- ISE (Identity Services Engine) Basic Configuration and Commands
- *************Cisco CCNA/CCNP Data Center*************
- Cisco Software-Defined Access Compatibility Matrix
- Multimode Fiber Types: OM1 vs OM2 vs OM3 vs OM4 vs OM5
- Cisco 10GBASE SFP+ Modules Data Sheet
- Cisco Optics-to-Device Compatibility Matrix (TMG (Transceiver Module Group) Tool)
- Best Security Practices for Cisco Nexus OS (NX-OS) on Management Plane
- Cisco Nexus 9000 Software Upgrade NX-OS Tutorial
- Upgrade Process for a vPC Topology on the Primary Switch
- vPC(Virtual Port Channel) Basic Concept in Nexus Switches
- Virtual Port-Channel Config and Concepts
- Nexus vPC | How vPC works (Videos)
- The Complete Cisco Nexus VPC Guide
- Upgrade Path and Commands 3K (3000) Nexus Series
- Old Image Upgrade for 3K, 5K and 7K (kickstart and system)
- *************Fortigate NSE4/NSE5/NSE7*************
- Fortigate Security Advisories
- Fortigate Upgrade Path
- Fortinet FortiOS Images
- Fortiguard
- URL Categories Fortigate
- Configure the management interface for initial access
- How to configure the interface with CLI
- Initial Setup Of FortiVM With CLI
- FortiGate CLI Commands for Troubleshooting
- Fortigate Commands Cheat Sheet
- ForiOS – Hardening your FortiGate
- Password policy (Best Practise)
- Security best practices
- Using virtual IPs (VIP) to configure (Destination NAT) port forwarding
- Fortinet: How to Setup a Route-Based IPSec VPN Tunnel on a FortiGate Firewall
- Using Fortigate Zones To Save Your Sanity
- Fortinet: Upgrading and Downgrading FortiGate Firmware
- FortiGate Firmware Upgrade | How to Upgrade FortiGate Firmware using Upgrade Path? | FortiGate Tips
- FortiGate High Availability (Active / Passive)
- How to Force HA failover on Fortigate Clusters
- ***********ITIL(Information Technology Infrastructure Library)/ ITSM(IT Service Management)************
- ITIL Change Management Chat: How to Run a Successful CAB Meeting
- ITILv4
- **************University Courses/CMI(Chartered Management Institute)/Leadership and Management*************
- CMI Level 2 Qualifications – What is CMI Level 2 Team Leader?
- Brighton School of Business and Management CMI Level 2 Team Leader
- Stanford University School of Engineer Certificate in Advanced Cybersecurity Program
- Qlik Sense to create visualizations, charts, interactive dashboards
- ************Automation/DNAC/SD-Access/SD-WAN/SASE (Secure Access Service Edge Architecture)************
- What is Cisco DNA (Digital Network Architecture) Center?
- What is SDWAN?
- SASE and SSE Architectures
- SD-WAN Basics
- Palo Alto Hub and Spoke SD-WAN Config using Panorama
- What is SASE?
- What is Prisma Access? (SASE Architecture/Cloud Security)
- Palo Alto Prisma Access (Palo’s SASE Architecture)
Security Advisories:
Palo Alto: https://securityadvisories.paloaltonetworks.com
Cisco: https://tools.cisco.com/security/center/publicationListing.x
Cisco Talos Advisories: https://www.talosintelligence.com/vulnerability_reports
Microsoft Advisories: https://www.talosintelligence.com/ms_advisory_archive/ms-2023
Meraki: https://meraki.cisco.com/blog/cisco-meraki-customer-advisories
Fortinet: https://www.fortiguard.com/psirt
Checkpoint: https://www.checkpoint.com/advisories/
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsecurityalerts=#severity=&type=Security+Alerts&product=&version=
Juniper: https://kb.juniper.net/InfoCenter/index?page=content&channel=SECURITY_ADVISORIES
CISA: https://www.cisa.gov/news-events/cybersecurity-advisories
US-CERT: https://www.us-cert.gov/ncas/current-activity
EoL links:
Cisco: https://www.cisco.com/c/en/us/products/security/asa-5500-series-next-generation-firewalls/eos-eol-notice-listing.html
https://www.curvature.com/resources/cisco-end-of-life-guide
Palo Alto: https://www.paloaltonetworks.com/services/support/end-of-life-announcements/end-of-life-summary
https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates
Meraki: https://documentation.meraki.com/zGeneral_Administration/Other_Topics/Product_End-of-Life_(EOL)_Policies
Checkpoint: https://www.checkpoint.com/support-services/support-life-cycle-policy/
CVE (Common Vulnerabilities and Exposures) and CVSS (Common Vulnerability Scoring System):
https://www.cvedetails.com/cvss-score-distribution.php
https://nvd.nist.gov/vuln-metrics/cvss
https://cve.mitre.org/
Important Organizations:
- CIS (Center for Internet Security)
- United States Computer Emergency Readiness Team (US-CERT)
- National Cybersecurity and Communications Integration Center (NCCIC)
- Cybersecurity and Infrastructure Security Agency (CISA)
- National Institute of Standards and Technology (NIST)
- National Cyber Security Centre (NCSC)
- National Security Agency (NSA)
- Government Communications Headquarters (GCHQ)
- Cybersecurity and Infrastructure Security Agency (CISA)
- The Council for Registered Ethical Security Testers (CREST)
Gartner Magic Quadrant: NGFWs, SD-WAN and SSE:



