Lessons
-
TraceFlow, CSR, and Certificates
-
Core Protocols of the Internet and Network Communication
-
Networking with Layer-7 Proxies
-
Networking with TLS Intercept
-
DNS (Client and Resolver Behaviors and Interactions)
-
Internet Routing Architecture
-
No default Route
-
Policy-Based Routing (PBR)
-
IPsec using IKE
-
GRE (Generic Routing Encapsulation)
-
PAC (Proxy Auto-Configuration)
-
Switches vs Routers vs Firewalls vs Proxies (Nice to Have)
-
IP Networking - Required Knowledge
-
IP Routing - Required Knowledge
-
Access Methods (Establishment, securing, optimizing, liveliness detection, and design resiliency)
-
SAML (Security Assertion Markup Language)
-
Remote Access Technologies (Nice to Have)
-
SCIM (System for Cross-domain Identity Management)
-
Interactions with LDAP (Lightweight Directory Access Protocol)
-
Interactions with Active Directory
-
Known Vendors: OKTA/PING/AAD/ADFS
-
HTTPS and TLS Interception by Proxy
-
PFS (Perfect Forward Secrecy)
-
SSL as an Attack Vector
-
Understanding Zero-Day, APT, and State-Sponsored Attacks
-
Proxy Types - Required Knowledge
-
Identity Management - Required Knowledge
-
SSL vs. TLS - Required Knowledge
-
Attack Techniques
-
Mitigations: Strategies and Technologies to Prevent Security Attacks
-
Defense in Depth: A Multi-Layered Approach to Security
-
Stages of an Attack
-
DNS-Based Security
-
Knowledge of Eco-Environment (Nice to Have)
-
SDWAN (Software Defined Wide Area Networks)
-
Secure Access Service Edge (SASE)
-
O.365 (E3/E5 + EMS - Enterprise Mobility + Security), GSuite
-
NGFW (Next-Generation Firewalls) & UTM Firewalls
-
Mobile Device Management (MDM) and EPS services
-
Cloud Service Models
-
ISP (Internet Service Provider)
-
Popular Technical Interview Questions
-
Networking and Cybersecurity Exam