Exam
Exam
Close
Devices and
Connections
In this lesson, we will discuss how the globe is connected and detail some common
network devices.
The NET
In the 1960s, the U.S. Defense Advanced Research Projects Agency (DARPA) created
ARPANET, the precursor to the modern internet. ARPANET was the first packet-
switched network. A packet-switched network breaks data into small blocks
(packets), transmits each individual packet from node to node toward its
destination, and then reassembles the individual packets in the correct order at
the destination.
Today billions of devices worldwide are connected to the Internet and use the
transport communications protocol/internet protocol (TCP/IP) to communicate with
each over packet-switched networks. Specialized devices and technologies such as
routers, routing protocols, SD-WAN, the domain name system (DNS) and the world wide
web (WWW) facilitate communications between connected devices.
Click the arrows for more information about the four common network devices and the
icons used in network diagrams are displayed in the image.
Routers
Routers are physical or virtual devices that send data packets to destination
networks along a network path using logical addresses. Routers use various routing
protocols to determine the best path to a destination, based on variables such as
bandwidth, cost, delay, and distance. A wireless router combines the functionality
of a router and a wireless access point (AP) to provide routing between a wired and
wireless network.
Default Gateway
A default gateway is the node in a computer network using the Internet protocol
(IP) suite that serves as the forwarding host (router) to other networks when no
other route specification matches the destination IP address of a packet. The
default gateway's role is a network node that serves as an access point to another
network, often involving not only a change of addressing, but also a different
networking technology.
Access Point
An access point (AP) is a network device that connects to a router or wired network
and transmits a Wi-Fi signal so that wireless devices can connect to a wireless (or
Wi-Fi) network. A wireless repeater rebroadcasts the wireless signal from a
wireless router or AP to extend the range of a Wi-Fi network.
Hub
A hub (or concentrator) is a network device that connects multiple devices such as
desktop computers, laptop docking stations, and printers on a LAN. Network traffic
that is sent to a hub is broadcast out of all ports on the hub, which can create
network congestion and introduces potential security risks. Any device connected to
a Hub can listen and receive unicast and broadcast traffic from all devices
connected to the same Hub. Unicast traffic is traffic sent from one device to
another device. Broadcast traffic is traffic sent from one device to all devices.
Switches
2
of
7
Introduction
Routing
Introduction
Devices and Connections
Routing
Networks and Topologies
Domain Name System
Internet of Things
Knowledge Check
Close
Routing
In this lesson, we will discuss routing, routing protocols, and detail some factors
used to determine which route is used.
Routing protocols are defined at the Network layer of the OSI model and specify how
routers communicate with one another on a network. Routing protocols can either be
static or dynamic.
Static Routing
A static routing protocol requires that routes be created and updated manually on a
router or other network device. If a static route is down, traffic can’t be
automatically rerouted unless an alternate route has been configured. Also, if the
route is congested, traffic can’t be automatically rerouted over the less congested
alternate route. Static routing is practical only in very small networks or for
very limited, special-case routing scenarios (for example, a destination that’s
used as a backup route or is reachable only via a single router). However, static
routing has low bandwidth requirements (routing information isn’t broadcast across
the network) and some built-in security (users can route only to destinations that
are specified in statically defined routes).
Dynamic Routing
A dynamic routing protocol can automatically learn new (or alternate) routes and
determine the best route to a destination. The routing table is updated
periodically with current routing information.
Convergence (the time required for all routers in a network to update their routing
tables with the most current information such as link status changes) can be a
significant problem for distance-vector protocols.
Distance Vector: Routing Information Protocol
Routing Information Protocol (RIP) is an example of a distance-vector routing
protocol that uses hop count as its routing metric. To prevent routing loops, in
which packets effectively get stuck bouncing between various router nodes, RIP
implements a hop limit of 15, which limits the size of networks that RIP can
support. After a data packet crosses 15 router nodes (hops) between a source and a
destination, the destination is considered unreachable. In addition to hop limits,
RIP employs four other mechanisms to prevent routing loops.
Split Horizon
Prevents a router from advertising a route back out through the same interface from
which the route was learned
Triggered Updates
When a change is detected, the update gets sent immediately instead of waiting 30
seconds to send a RIP update.
Route Poisoning
Sets the hop count on a bad route to 16, which effectively advertises the route as
unreachable
Link State
A link-state protocol requires every router to calculate and maintain a complete
map, or routing table, of the entire network. Routers that use a link-state
protocol periodically transmit updates that contain information about adjacent
connections, or link states, to all other routers in the network. Click the tabs
for more information about link-state protocols and a use case.
Compute-Intensive
Convergence
Use Case
Path Vector
A path-vector protocol is similar to a distance-vector protocol but without the
scalability issues associated with limited hop counts in distance-vector protocols.
Each routing table entry in a path-vector protocol contains path information that
gets dynamically updated.
BGP
BGP
Providers
Providers
3
of
7
Devices and Connections
Networks and Topologies
Introduction
Devices and Connections
Routing
Networks and Topologies
Domain Name System
Internet of Things
Knowledge Check
Close
Networks
and Topologies
In this lesson, we will discuss types of LAN, WAN, and the topologies of those area
networks.
A WAN is a computer network that connects multiple LANs or other WANs across a
relatively large geographic area such as a small city, a region or country, a
global enterprise network, or the entire planet (as is the case for the internet).
Click the icons in the following graphic for more information about LANs and WANs.
LANs
A LAN is a computer network that connects end-user devices such as laptop and
desktop computers, servers, printers, and other devices so that applications,
databases, files, file storage, and other networked resources can be shared among
authorized users on the LAN. A LAN can be wired, wireless, or a combination of
wired and wireless. Examples of networking equipment commonly used in LANs include
bridges, hubs, repeaters, switches, and wireless APs. Two basic network topologies
(with many variations) are commonly used in LANs are Star topology and Mesh
topology. Other once-popular network topologies such as ring and bus are rarely
found in modern networks.
Star
Each node on the network is directly connected to a switch, hub, or concentrator,
and all data communications must pass through the switch, hub, or concentrator. The
switch, hub, or concentrator can thus become a performance bottleneck or single
point of failure in the network. A star topology is ideal for practically any size
environment and is the most commonly used basic LAN topology.
Mesh
All nodes are interconnected to provide multiple paths to all other resources. A
mesh topology may be used throughout the network or only for the most critical
network components such as routers, switches, and servers to eliminate performance
bottlenecks and single points of failure.
WANs
A WAN is a computer network that connects multiple LANs or other WANs across a
relatively large geographic area such as a small city, a region or country, a
global enterprise network, or the entire planet (as is the case for the internet).
SD-WAN
A software-defined WAN (SD-WAN) separates the control and management processes from
the underlying networking hardware, making them available as software that can be
easily configured and deployed. A centralized control plane means network
administrators can write new rules and policies, and then configure and deploy them
across an entire network at once.
SD-WAN Benefits
SD-WAN makes management and direction of traffic across a network easier. SD-WAN
offers many benefits to geographically distributed organizations. Click the tabs
for more information about the benefits SD-WAN offers.
Simplicity
Improved Performance
Reduced Costs
Because each device is centrally managed, with routing based on application
policies, WAN managers can create and update security rules in real time as network
requirements change. The combination of SD-WAN with zero-touch provisioning, which
is a feature that helps automate the deployment and configuration processes, also
helps organizations further reduce the complexity, resources, and operating
expenses required to turn up new sites.
Campus Area Networks (CANs) and Wireless Campus Area Networks (WCANs)
CANs and WCANs connect multiple buildings in a high-speed network (for example,
across a corporate or university campus).
Metropolitan Area Networks (MANs) and Wireless Metropolitan Area Networks (WMANs)
MANs and WMANs extend networks across a relatively large area, such as a city.
Personal Area Networks (PANs) and Wireless Personal Area Networks (WPANs)
PANs and WPANs connect an individual’s electronic devices such as laptop computers,
smartphones, tablets, virtual personal assistants (for example, Amazon Alexa, Apple
Siri, Google Assistant, and Microsoft Cortana), and wearable technology to each
other or to a larger network.
4
of
7
Routing
Domain Name System
Introduction
Devices and Connections
Routing
Networks and Topologies
Domain Name System
Internet of Things
Knowledge Check
Close
Domain Name
System
In this lesson, we will discuss how the Domain Name System (DNS) enables internet
addresses, such as www.paloaltonetworks.com, to be translated into routable IP
addresses.
What Is DNS?
Domain Name System is a protocol that translates a user-friendly domain name to an
IP address so that users can access computers, websites, services, or other
resources on the internet or private networks.
DNS
To create a new domain name that will be accessible via the internet, you must
register your unique domain name with a domain name registrar, such as GoDaddy or
Network Solutions. This registration is similar to listing a new phone number in a
phone directory. DNS is critical to the operation of the internet.
Thirteen root name servers (actually, 13 networks comprising hundreds of root name
servers) are configured worldwide. They are named a.root-servers.net through
m.root-servers.net. DNS servers are typically configured with a root hints file
that contains the names and IP addresses of the root servers.
A or AAAA
CNAME
MX
PTR
SOA
NS
TXT
A (IPv4) or AAAA (IPv6) address maps a domain or subdomain to an IP address or
multiple IP addresses.
5
of
7
Networks and Topologies
Internet of Things
Introduction
Devices and Connections
Routing
Networks and Topologies
Domain Name System
Internet of Things
Knowledge Check
Close
Internet of
Things
In this lesson, we will discuss how Palo Alto Networks Internet of Things (IoT)
Security helps visibility, prevention, risk assessment, and enforcement of
policies.
3G: IoT devices with 3G modules use either Wideband Code Division Multiple Access
(W-CDMA) or Evolved High Speed Packet Access (HSPA+ and Advanced HSPA+) to achieve
data transfer rates of between 384Kbps and 168Mbps.
4G/Long-Term Evolution (LTE): 4G/LTE networks enable real-time IoT use cases, such
as autonomous vehicles, with 4G LTE Advanced Pro delivering speeds in excess of
3Gbps and less than 2 milliseconds of latency.
Click the tabs for more information about the issues that Palo Alto Networks IoT
security helps mitigate.
Industrial IoT
Course Summary
Now that you've completed this course, you should be able to:
Describe basic operations of enterprise networks, common networking devices, routed
and routing protocols, network types and topologies, and services such as DNS
6
of
7
Domain Name System
Knowledge Check
Introduction
IP Addressing
Subnetting
TCP/IP and OSI Model
Packet Lifecycle
Data Encapsulation
Knowledge Check
Close
IP
Addressing
This lesson describes the basic numbering system, IP addressing, and the structure
of IPV4 and IPV6.
Numbering Systems
You must understand how network systems are addressed before following the path
data takes across internetworks. Physical, logical, and virtual addressing in
computer networks require a basic understanding of decimal (base 10), hexadecimal
(base 16), and binary (base 2) numbering.
Binary (Base 2)
IP Addressing Basics
Data packets are routed over a TCP/IP network using IP addressing information.
IPv4, which is the most widely deployed version of IP, consists of a 32-bit logical
IP address.
Click the tabs for the address ranges of loopback addresses and private addresses.
Subnet Mask
A subnet mask is a number that hides the network portion of an IPv4 address,
leaving only the host portion of the IP address. The network portion of a subnet
mask is represented by contiguous “on” (1) bits beginning with the most significant
bit.
For example, in the subnet mask 255.255.255.0, the first three octets represent the
network portion and the last octet represents the host portion of an IP address.
The decimal number 255 is represented in binary notation as 11111111. As result,
the equivalent of decimal subnet mask 255.255.255.0 in binary notation would be
11111111.11111111.11111111.0.
The default (or standard) subnet masks for Class A, B, and C networks are as
follows:
Class A
Class A
Class B
Class B
Class C
Class C
IPv4 Structure
The 32-bit address space (four octets) of an IPv4 address limits the total number
of unique public IP addresses to about 4.3 billion. In 2018, the pool of available
IPv4 addresses that can be assigned to organizations was officially depleted. A
small pool of IPv4 addresses was reserved by each regional internet registry to
facilitate the transition to IPv6.
IPv6 Structure
IPv6 addresses, which use a 128-bit hexadecimal address space providing about 3.4 x
10^38 (340 hundred undecillion) unique IP addresses, was created to replace IPv4
when the IPv4 address space was exhausted.
Click the tabs to see which rules the Internet Engineering Task Force (IETF) has
defined to simplify an IPv6 address.
NAT
Network address translation (NAT) is a method of mapping an IP address space into
another by modifying network address information in the IP header of packets while
they are in transit across a traffic routing device. The simplest type of NAT
provides a one-to-one translation of IP addresses which is used to allow host
devices configured with a private IP address to send and receive traffic on the
internet.
Click the numbers for details about how the firewall performs a source NAT
function.
3
The table displays the IP addresses and zones before and after the NAT translation.
Introduction
IP Addressing
Subnetting
TCP/IP and OSI Model
Packet Lifecycle
Data Encapsulation
Knowledge Check
Close
Subnetting
Introduction to Subnetting
Subnetting is a technique used to divide a large network into smaller, multiple
subnetworks by segmenting an IP address into two parts: the network portion of the
address and the host portion of the address.
Network Classes
Subnetting can be used to limit network traffic or limit the number of devices that
are visible to, or can connect to, each other.
Routers examine IP addresses and subnet values (called masks) to determine the best
forward network path for packets. The subnet mask is a required element in IPv4.
Class C Subnets
For a Class C IPv4 address, there are 254 possible node (or host) addresses (28 or
256 potential addresses, but you lose two addresses for each network: one for the
base network address and the other for the broadcast address). A typical Class C
network uses a default 24-bit subnet mask (255.255.255.0). This subnet mask value
identifies the network portion of an IPv4 address, with the first three octets
being all ones (11111111 in binary notation, 255 in decimal notation). The mask
displays the last octet as zero (00000000 in binary notation). For a Class C IPv4
address with the default subnet mask, the last octet is where the node-specific
values of the IPv4 address are assigned.
For example, in a network with an IPv4 address of 192.168.1.0 and a mask value of
255.255.255.0, the network portion of the address is 192.168.1, and the node
portion of the address or the last 8 bits provide 254 available node addresses (2^8
- 2). Just as in the Class A and C examples, you need to reserve 2 addresses, one
for the network address and one for the broadcast address, so that is the reason
why you need to subtract 2 addresses from the total number of node addresses
available.
CIDR
Classless Inter-Domain Routing (CIDR) is a method for allocating IP addresses and
IP routing that replaces classful IP addressing (for example, Class A, B, and C
networks) with classless IP addressing.
Supernetting
3
of
7
IP Addressing
TCP/IP and OSI Model
Introduction
IP Addressing
Subnetting
TCP/IP and OSI Model
Packet Lifecycle
Data Encapsulation
Knowledge Check
Close
Network Security Fundamentals
TCP/IP and
OSI Model
This lesson describes the functions of physical, logical, and virtual addressing in
networking, IP addressing basics, subnetting fundamentals, OSI and the TCP/IP
models, and the packet lifecycle.
TCP/IP Overview
In cybersecurity, you must understand that applications sending data from one host
computer to another host computer will first segment the data into blocks and will
then forward these data blocks to the TCP/IP stack for transmission.
The IP stack adds source and destination IP addresses to the TCP segment and
notifies the server operating system that it has an outgoing message that is ready
to be sent across the network. When the server operating system is ready, the IP
packet is sent to the network adapter, which converts the IP packet to bits and
sends the message across the network.
Layered Approach
The OSI and TCP/IP models use a layered approach to provide more clarity and
efficiency in different areas.
Clarify Functions
IPv6 addresses consist of 32 hexadecimal numbers grouped into eight hextets of four
hexadecimal digits, separated by a colon.
Reduce Processes
Reduce complex networking processes to simpler sublayers and components.
Promote Interoperability
Promote interoperability through standard interfaces.
Enable Layer Changes
Enable vendors to change individual features at a single layer than rebuild the
entire protocol stack.
Facilitate Troubleshooting
Facilitate troubleshooting by isolating and identifying issues within specific
layers, allowing for targeted analysis and resolution.
The TCP/IP protocol was originally developed by the U.S. Department of Defense
(DoD) and actually preceded the OSI model. This model defines actual networking
requirements, for example, for frame construction.
OSI Layers
Click the tabs for more information about the OSI layers.
4
of
7
Subnetting
Packet Lifecycle
Introduction
IP Addressing
Subnetting
TCP/IP and OSI Model
Packet Lifecycle
Data Encapsulation
Knowledge Check
Close
Packet
Lifecycle
This lesson describes the lifecycle of a packet and also how data an application
sends data across a network.
Circuit Switching
In a circuit-switched network, a dedicated physical circuit path is established,
maintained, and terminated between the sender and receiver across a network for
each communications session. Before the development of the internet, most
communications networks, such as telephone company networks, were circuit-switched.
Packet Switching
An application that needs to send data across the network (for example, from a
server to a client computer) first creates a block of data and sends it to the TCP
stack on the server.
5
of
7
TCP/IP and OSI Model
Data Encapsulation
Introduction
IP Addressing
Subnetting
TCP/IP and OSI Model
Packet Lifecycle
Data Encapsulation
Knowledge Check
Close
Data
Encapsulation
This lesson describes how data is encapsulated and flows through the layers of the
OSI model.
In the OSI model and TCP/IP protocol, data is passed from the highest layer (Layer
7 in the OSI model, Layer 4 in the TCP/IP model) downward through each layer to the
lowest layer (Layer 1 in the OSI model and the TCP/IP model). It is then
transmitted across the network medium to the destination node, where it is passed
upward from the lowest layer to the highest layer. Each layer communicates only
with the adjacent layer immediately above and below it. This communication is
achieved through a process known as data encapsulation (or data hiding), which
wraps protocol information from the layer immediately above in the data section of
the layer immediately below.
When a client or server application sends data across a network, a header (and
trailer in the case of Layer 2 frames) is added to each data packet from the
adjacent layer below it as the data passes through the protocol stack. On the
receiving end, the headers (and trailers) are removed from each data packet as it
passes through the protocol stack to the receiving application.
Course Summary
Now that you've completed this course, you should be able to:
Describe IP addressing
Describe subnetting
List the TCP/IP and OSI model layers
Detail the lifecycle of a packet
Detail how data is encapsulated
6
of
7
Packet Lifecycle
Knowledge Check
Introduction
Endpoint Security
Malware and Anti-Malware
Golden Image
Firewalls and HIPS
Mobile Device Management
Server Management
Structured Host and Network Troubleshooting
Knowledge Check
Close
Endpoint
Security
Endpoint Security
In 2022, there were more than 11.5 billion internet of things (IoT) devices
worldwide, including machine-to-machine (M2M), wide-area IoT, short-range IoT,
massive-and-critical IoT, and multi-access edge computing (MEC) devices.
Traditional endpoint security encompasses numerous security tools, such as anti-
malware software, personal firewalls, HIPSs, and MDM software.
Endpoint Protection
Advanced malware and script-based attacks can bypass traditional antivirus
solutions with ease and potentially wreak havoc on your business.
Click the tabs for more information about the importance of endpoint protection.
Endpoint Classification
Threat Landscape
Introduction
Endpoint Security
Malware and Anti-Malware
Golden Image
Firewalls and HIPS
Mobile Device Management
Server Management
Structured Host and Network Troubleshooting
Knowledge Check
Close
Golden
Image
In this lesson, we will explore the golden image for endpoints in your environment
and how to make them more secure.
Important Terminology
Ransomware
Ransomware is a type of malware that threatens to publish the victim's data or
perpetually block access to it unless a ransom is paid.
Golden Image
Endpoint security begins with a standard (“golden”) image that ensures consistent
configuration of devices across the organization, which includes disabling or
removing operating system features and services that are not needed (“hardening”),
installing current security updates, and installing core applications.
Heuristic-Based
Heuristic-Based
Behavior-Based
Behavior-Based
Growing Security Challenges
In practice, an organization will deploy numerous golden images, to, for example,
support different device types, workgroups or departments, and user types (such as
standard users and power users). Most organizations deploy several security
products to protect their endpoints, including personal firewalls, host-based
intrusion prevention systems (HIPSs), mobile device management (MDM), mobile
application management (MAM), data loss prevention (DLP), and antivirus software.
Nevertheless, cyber breaches continue to increase in frequency, variety, and
sophistication.
Additionally, the numbers and types of endpoints – including mobile and IoT devices
– have grown exponentially and increased the attack surface. New variants of the
Gafgyt, Mirai, and Muhstik botnets, among others, specifically target IoT devices.
Additionally, new search engines, such as Shodan (Shodan.io), can automate the
search for vulnerable internet-connected endpoints. Faced with the rapidly changing
threat landscape, traditional endpoint security solutions and antivirus can no
longer prevent security breaches on the endpoint.
Endpoint Security
Click the tabs for more information about why endpoint security is needed.
4
of
9
Malware and Anti-Malware
Firewalls and HIPS
Introduction
Endpoint Security
Malware and Anti-Malware
Golden Image
Firewalls and HIPS
Mobile Device Management
Server Management
Structured Host and Network Troubleshooting
Knowledge Check
Close
Firewalls
and HIPS
Firewalls Types
Network firewalls protect an enterprise network against threats from an external
network, such as the internet. HIPS is another approach to endpoint protection that
rely on an agent installed on the endpoint to detect malware.
The following describes the different types of firewalls and HIPS. Here is more
information about the different types of firewalls and HIPS.
Network Firewalls
Most traditional port-based network firewalls do little to protect endpoints inside
the enterprise network from threats that originate from within the network, such as
another device that has been compromised by malware and is propagating throughout
the network.
Host-Based Firewalls
Personal (or host-based) firewalls are commonly installed and configured on laptop
and desktop PCs. Personal firewalls typically operate as Layer 7 (Application layer
- OSI Model) firewalls that allow or block traffic based on an individual (or
group) security policy. Personal firewalls are particularly helpful on laptops used
by remote or traveling users who connect their laptop computers directly to the
internet (for example, over a public Wi-Fi connection).
Also, a personal firewall can control outbound traffic from the endpoint to help
prevent the spread of malware from that endpoint. However, note that disabling or
otherwise bypassing a personal firewall is a common and basic objective in most
advanced malware today.
Netfilter, or iptables, is the most popular open source, command line interface-
based Linux firewall. Many system administrators prefer to use it for their server
protection as it operates as the first line of defense for Linux server protection.
5
of
9
Golden Image
Mobile Device Management
Introduction
Endpoint Security
Malware and Anti-Malware
Golden Image
Firewalls and HIPS
Mobile Device Management
Server Management
Structured Host and Network Troubleshooting
Knowledge Check
Close
Mobile Device
Management
In this lesson, we will explore how mobile device management (MDM) centralizes
management and security of mobile devices.
Important Terminology
Click each tab to read the important terminology in this lesson.
Jailbreaking
Rooting
MDM software provides centralized management and security for mobile devices. Here
is more information about the device protection provided by MDM software.
Introduction
Endpoint Security
Malware and Anti-Malware
Golden Image
Firewalls and HIPS
Mobile Device Management
Server Management
Structured Host and Network Troubleshooting
Knowledge Check
Close
Server
Management
In this lesson, we will explore server and systems administration tasks that secure
your network environment.
Click the tabs for more information about each element of server management.
Directory Services
Configuration Management
7
of
9
Mobile Device Management
Structured Host and Network Troubleshooting
Introduction
Endpoint Security
Malware and Anti-Malware
Golden Image
Firewalls and HIPS
Mobile Device Management
Server Management
Structured Host and Network Troubleshooting
Knowledge Check
Close
Network Baseline
A baseline provides quantifiable metrics that are periodically measured with
various network performance monitoring tools, protocol analyzers, and packet
sniffers.
Click the tabs for more information about what comprises baseline metrics and their
importance.
Composition
Importance
Network Documentation
Network documentation should include logical and physical diagrams, application
data flows, change management logs, user and administration manuals, and warranty
and support information. Network baselines and documentation should be updated any
time a significant change to the network occurs and as part of the change
management process of an organization.
In other situations, you might make an educated guess about the source of the issue
and begin investigating at the corresponding layer of the OSI model. You could also
use the substitution method (replacing a bad component with a known good component)
to quickly identify and isolate the cause of the issue.
OSI Model
Click the arrows to see what kind of troubleshooting techniques you use at each
layer.
Physical Layer
When you use a bottom-up approach to diagnose connectivity problems, you begin at
the Physical layer of the OSI model by verifying network connections and device
availability.
For example, a wireless device may have power to the antenna or transceiver
temporarily turned off. A wireless access point may have lost power because a
circuit breaker was tripped offline or a fuse was blown. Similarly, a network cable
connection may be loose, or the cable may be damaged.
Thus, before you begin inspecting service architectures, you should start with the
basics: Confirm physical connectivity.
Moving up to the Data Link layer, you verify data link architectures, such as
compatibility with a particular standard or frame type.
Although Ethernet is a predominant LAN network standard, devices that roam (such as
wireless devices) sometimes automatically switch between Wi-Fi, Bluetooth, and
Ethernet networks. Wireless networks usually have specified encryption standards
and keys. Connectivity may be lost because a network device or service has been
restored to a previous setting and the device is not responding to endpoint
requests that are using different settings.
Firewalls and other security policies may also be interfering with connection
requests. You should never disable firewalls, but in a controlled network
environment with proper procedures established, you may find that temporarily
disabling or bypassing a security appliance resolves a connectivity issue. The
remedy then is to properly configure security services to allow the required
connections.
Network Layer
These two simple but powerful commands (and other ICMP commands and options) are
some of the most commonly used tools for troubleshooting network connectivity
issues. You can run ICMP commands in the command line interface on computers,
servers, routers, switches, and many other networked devices.
Transport Layer
At the Transport layer, communications are more complex. Latency and network
congestion can interfere with communications that depend on timely acknowledgments
and handshakes. Time-to-live (TTL) values sometimes have to be extended in the
network service architecture to allow for slower response times during peak network
traffic hours. Similar congestion problems can occur when new services are added to
an existing network or when a local device triggers a prioritized service, such as
a backup or an antivirus scan.
Session Layer
Session layer settings can also be responsible for dropped network connections. For
example, devices that automatically go into a power standby mode (“sleep”) may have
expired session tokens that fail when the device attempts to resume connectivity.
At the server, failover communications or handshake negotiations with one server
may not translate to other clustered servers. Sessions may have to be restarted.
Presentation Layer
Application Layer
Click the tabs to see common troubleshooting steps for issues that may arise.
Local Hosts
Individual Devices
Shared Services
Anomalies
Problems with local hosts are typically much easier to assess and remedy than
problems that affect a network segment or service.
Network Documentation
Network documentation should include logical and physical diagrams, application
data flows, change management logs, user and administration manuals, and warranty
and support information. Network baselines and documentation should be updated any
time a significant change to the network occurs and as part of the change
management process of an organization.
1. Discover
1. Discover the problem.
2. Evaluate
2. Evaluate the system configuration against the baseline.
3. Track
3. Track the possible solutions.
4. Execute
4. Execute a plan.
5. Check
5. Check the results.
6. Verify
6. Verify the solution (if unsuccessful, return to step 2; if successful, proceed
to step 7).
7. Deploy
7. Deploy the positive solution.
Course Summary
Now that you've completed this course, you should be able to:
Explain how to explore endpoint and mobile device security using technology such as
personal firewalls, host-based IPS, and management features
8
of
9
Server Management
Knowledge Check
Introduction
Legacy Firewalls
Intrusion Detection and Prevention
Web Content Filters
Virtual Private Networks
Data Loss Prevention
Unified Threat Management
Knowledge Check
Close
Legacy
Firewalls
In this lesson, we will discuss the basics of legacy firewalls and the functions
they perform.
Legacy Firewalls
Firewalls have been central to network security since the early days of the
internet. A firewall is a hardware platform or software platform or both that
controls the flow of traffic between a trusted network (such as a corporate LAN)
and an untrusted network (such as the internet).
Operation
Operation
Match
Match
Inspection
Inspection
Application Firewalls
Third-generation application firewalls are also known as application-layer
gateways, proxy-based firewalls, and reverse-proxy firewalls. Application firewalls
operate up to Layer 7 (the application layer) of the OSI model and control access
to specific applications and services on the network. These firewalls proxy network
traffic rather than permit direct communication between hosts. Requests are sent
from the originating host to a proxy server, which analyzes the contents of the
data packets and, if the request is permitted, sends a copy of the original data
packets to the destination host.
2
of
8
Introduction
Intrusion Detection and Prevention
Introduction
Legacy Firewalls
Intrusion Detection and Prevention
Web Content Filters
Virtual Private Networks
Data Loss Prevention
Unified Threat Management
Knowledge Check
Close
Web Content
Filters
In this lesson, we will discuss the basics of web content filters to allow or block
users access.
Elapsed time0:00/Total1:19
4
of
8
Intrusion Detection and Prevention
Virtual Private Networks
Introduction
Legacy Firewalls
Intrusion Detection and Prevention
Web Content Filters
Virtual Private Networks
Data Loss Prevention
Unified Threat Management
Knowledge Check
Close
Virtual Private
Networks
In this lesson, we will discuss the basics of virtual private networks (VPNs).
VPNs
A VPN creates a secure, encrypted connection (or tunnel) across the internet
between two endpoints. A client VPN establishes a secure connection between a user
and an organization's network. A site-to-site VPN establishes a secure connection
between two organizations' networks, usually geographically separated.
The VPN client connects to a VPN server, such as a firewall, router, or VPN
appliance (or concentrator). After a VPN tunnel is established, a remote user can
access network resources, such as file servers, printers, and Voice over IP (VoIP)
phones, as if they were physically in the office.
Composition
The following are the composition of VPNs:
Easy Setup
PPTP is easy to set up and fast. However, PPTP is perhaps the least secure VPN
protocol, so it is now seldom used.
Use Cases
PPTP is commonly used with Password Authentication Protocol (PAP), Challenge-
Handshake Authentication Protocol (CHAP), or Microsoft CHAP versions 1 and 2 (MS-
CHAP v1/v2), all of which have well-known security vulnerabilities, to authenticate
tunneled PPP traffic.
Secure
Extensible Authentication Protocol Transport Layer Security (EAP-TLS) is a more
secure authentication protocol for PPTP. However, EAP-TLS requires a public key
infrastructure (PKI) and is therefore more difficult to set up.
Click the tabs for more information about configuring and establishing secure
communication with IPsec VPNs.
Internet Traffic
Split Tunneling
Deployment
An SSL VPN can be deployed as an agent-based or agentless browser-based connection.
An agentless SSL VPN requires only that users launch a web browser, use HTTPS to
open a VPN portal or webpage, and log in to the network with their user
credentials.
An agent-based SSL VPN connection creates a secure tunnel between a SSL VPN client
installed on a host computer/laptop and a VPN concentrator device in an
organization's network. Agent-based SSL VPNs are often used to securely connect
remote users to an organization's network.
Use Case
SSL VPN technology is the standard method of connecting remote endpoint devices
back to the enterprise network. IPsec is most commonly used in site-to-site or
device-to-device VPN connections, such as connecting a branch office network to a
headquarters network or data center.
5
of
8
Web Content Filters
Data Loss Prevention
Introduction
Legacy Firewalls
Intrusion Detection and Prevention
Web Content Filters
Virtual Private Networks
Data Loss Prevention
Unified Threat Management
Knowledge Check
Close
Data Loss
Prevention
In this lesson, we will discuss the basics of Data Loss Prevention (DLP).
DLP
DLP solutions inspect data that is leaving, or egressing, a network, such as data
that is sent via email and/or file transfer. DLP prevents sensitive data (based on
defined policies) from leaving the network.
Sensitive Data
Data Patterns
Vulnerabilities
A DLP security solution prevents sensitive data from being transmitted outside the
network by a user, either inadvertently or maliciously.
Introduction
Legacy Firewalls
Intrusion Detection and Prevention
Web Content Filters
Virtual Private Networks
Data Loss Prevention
Unified Threat Management
Knowledge Check
Close
Unified Threat
Management
In this lesson, we will discuss the basics of unified threat management (UTM).
Security Functions
Many organizations have replaced UTM appliances with next-generation firewalls
(NGFWs) to reduce traffic inspection latency. The Palo Alto Networks next-
generation firewall uses a single pass parallel processing architecture to quickly
inspect all traffic crossing the firewall's dataplane.
Click the arrow for more information about combined security functions and some
typical disadvantages of UTM.
UTM devices combine numerous security functions into a single appliance, including
anti-malware, anti-spam, content filtering, DLP, firewall (stateful inspection),
IDS/IPS, and VPN.
Course Summary
Now that you've completed this course, you should be able to:
7
of
8
Data Loss Prevention
Knowledge Check
Introduction
Prevention-First Architecture
Next-Generation Firewalls
Identification
Next-Generation Firewall Deployment
IronSkillet
Expedition Migration Tool
Best Practice Assessment (BPA)
Zero Trust
Subscription Services
Panorama
Knowledge Check
Close
Prevention-First
Architecture
The networking infrastructure of an enterprise can be extraordinarily complex. The
Palo Alto Networks prevention-first security architecture secures enterprises'
perimeter networks, data centers, cloud-native applications, software as a service
(SaaS) applications, branch offices, and remote users with a fully integrated and
automated platform that simplifies security.
Next-Generation Firewall
The Palo Alto Networks Next-Generation Firewall is the foundation of our product
portfolio. The firewall is available in physical, virtual, and cloud-delivered
deployment options, and it provides consistent protection wherever your data and
apps reside.
Subscription Services
Subscription services add enhanced threat services and next-generation firewall
capabilities, including DNS Security, URL Filtering, Threat Prevention, and
WildFire malware prevention.
Panorama
Panorama provides centralized network security management. It simplifies
administration while delivering comprehensive controls and deep visibility into
network-wide traffic and security threats.
2
of
12
Introduction
Next-Generation Firewalls
Introduction
Prevention-First Architecture
Next-Generation Firewalls
Identification
Next-Generation Firewall Deployment
IronSkillet
Expedition Migration Tool
Best Practice Assessment (BPA)
Zero Trust
Subscription Services
Panorama
Knowledge Check
Close
The Architecture
The Palo Alto Networks Next-Generation Firewall is the core of our product
portfolio. The firewall inspects all traffic, including applications, threats, and
content, and associates it with the user, regardless of location or device type.
The application, content, and user become integral components of the enterprise
security policy.
Deployment
Click the tabs for more information about different elements of the next-generation
firewall architecture.
Single-Pass Architecture
3
of
12
Prevention-First Architecture
Identification
Introduction
Prevention-First Architecture
Next-Generation Firewalls
Identification
Next-Generation Firewall Deployment
IronSkillet
Expedition Migration Tool
Best Practice Assessment (BPA)
Zero Trust
Subscription Services
Panorama
Knowledge Check
Close
Identification
IAM Goals
Click the icons for more information about the goals of IAM.
Compliance
Authentication
How do you prevent an attack if an attacker has stolen user credentials? A common
prevention method is to configure multi-factor authentication. Multi-factor
authentication relies on two concepts: something the user knows (such as their
username and password) and something the user has (such as a security key,
smartphone, or multi-factor authentication application running on their laptop).
Multi-Factor Authentication
When multi-factor authentication is enabled, a user or an attacker must present two
or more forms of user credentials, called factors, to gain access to a network
resource. The first factor commonly is a username and password. The additional
factors often are some type of numerical code that is generated on a mobile phone
app or on a dedicated security key fob, or by software installed on the user’s
laptop or desktop system.
Authentication Policy
An Authentication policy enables an administrator to selectively issue multi-factor
authentication challenges based on the sensitivity of the information stored on the
network resource. A firewall administrator also can configure the number and
strength of the factors of authentication based on the sensitivity of the
information on each network resource. For example, you could require all corporate
users to authenticate using multi-factor authentication once a day but require IT
administrators to use multi-factor authentication each time they use Remote Desktop
Protocol (RDP) to access an Active Directory server.
When you create a custom role, use the “least privilege” approach to grant user
access. Restrict interfaces available per user and capabilities within each
interface of the web interface.
services to support areas that require more contextual awareness than simple user-
focused
Discretionary Access Control (DAC) The app owner has complete control over who can
access a particular service. An application can be a file, directory, or any other,
which can be
accessed via the network. Can grant permission to other users to access the app.
User Profile
User and group information must be directly integrated into the technology
platforms that secure modern organizations. Knowing who is using the applications
on your network, and who may have transmitted a threat or is transferring files,
strengthens security policies and reduces incident response times. User-ID, a
standard feature on Palo Alto Networks next-generation firewalls, enables you to
leverage user information stored in a wide range of repositories.
Port-based stateful packet inspection technology was created more than 25 years ago
to control applications using ports and IP addresses. Using port-based stateful
inspection to identify applications depends on an application strictly adhering to
its assigned port(s). This presents a problem because applications can easily be
configured to use any port. As a result, many of today’s applications cannot be
identified, much less controlled, by the port-based firewall, and no amount of
“after the fact” traffic classification by firewall “helpers” can solve the
problems associated with port-based application identification.
App-ID Architecture
Palo Alto Networks App-ID technology does not rely on a single element, such as a
port or protocol. Instead, App-ID uses multiple mechanisms to determine what the
application is. The application identity then becomes the basis for the firewall
policy that is applied to the session. App-ID is highly extensible, and application
detection mechanisms can be added or updated to keep pace with the ever-changing
application landscape.
App-ID Advantages
Click the tabs to see the advantages of using App-ID.
Granular Control
Visibility
Positive Enforcement
User-ID
The next-generation firewall accurately identifies users for policy control.
User-ID Architecture
In environments that support multiple types of end users across a variety of
locations and access technologies, it is unrealistic to guarantee physical
segmentation of each type of user. Visibility into the application activity at a
user level, not just at an IP address level, allows you to more effectively enable
the applications traversing the network. You can define both inbound and outbound
policies to safely enable applications based on users or groups of users.
User-ID Advantages
Creating and managing security policies based on the application and user identity
protects the network more effectively than relying solely on port and IP address
information. User-ID enables organizations to leverage user information stored in a
wide range of repositories.
Click the tabs for more information about the advantages of using User-ID.
Visibility
Policy Control
Logging and Reporting
Improved visibility into application usage based on user and group information can
help organizations maintain a more accurate picture of network activity.
Content-ID
Content identification controls traffic based on complete analysis of all allowed
traffic. It uses multiple threat prevention and data loss prevention techniques in
a single-pass architecture that fully integrates all security functions.
Enterprise networks are facing a rapidly evolving threat landscape full of modern
applications, exploits, malware, and attack strategies that can evade traditional
detection methods. To avoid detection, attackers use applications that dynamically
hop ports, use non-standard ports, tunnel within other applications, or hide within
proxies, SSL encryption, or other types of encryption.
Content-ID Techniques
Content-ID infuses next-generation firewalls with capabilities not possible in
legacy, port-based firewalls. App-ID eliminates threat vectors through the tight
control of all types of applications. This capability immediately reduces the
attack surface of the network, after which all allowed traffic is analyzed for
exploits, malware, dangerous URLs, and dangerous or restricted files or content.
Content-ID then goes beyond stopping known threats to proactively identify and
control unknown malware, which is often used as the leading edge of sophisticated
network attacks.
Click the arrows for more information about the different techniques Content-ID
uses.
Application Decoders
Rather than use a separate set of scanning engines and signatures for each type of
threat, Content-ID leverages a uniform threat engine and signature format to detect
and block a wide range of malware C2 activity and vulnerability exploits in a
single pass.
Vulnerability Attack Protection (IPS)
Cloud-Based Intelligence
For unknown content, WildFire provides rapid analysis and a verdict that the
firewall can leverage.
SSL Decryption
More and more web traffic connections are encrypted with SSL by default, which can
provide some protection to end users—but SSL also can provide attackers with an
encrypted channel to deliver exploits and malware. Palo Alto Networks ensures
visibility by giving security organizations the flexibility to, by policy,
granularly look inside SSL traffic based on application or URL category.
4
of
12
Next-Generation Firewalls
Next-Generation Firewall Deployment
Introduction
Prevention-First Architecture
Next-Generation Firewalls
Identification
Next-Generation Firewall Deployment
IronSkillet
Expedition Migration Tool
Best Practice Assessment (BPA)
Zero Trust
Subscription Services
Panorama
Knowledge Check
Close
Next-Generation
Firewall Deployment
The full range of Palo Alto Networks physical Next-Generation Firewalls is easy to
deploy into your organization’s network.
NGFW Deployment
Physical Appliances Firewalls (PA-Series)
The Palo Alto Networks family of next-generation firewalls includes physical
appliances, virtualized firewalls, and 5G-ready firewalls. The firewalls are
purposefully designed for simplicity, automation, and integration. PA-Series
firewalls support a variety of data center and remote branch deployment use cases.
Click the tabs for more information about each PA-Series firewall.
PA-7000 Series
The PA-7000 Series M-Powered NGFWs ensure top-notch security for high-speed data
centers and service providers. These ML-powered systems deliver dependable
performance, robust threat prevention, and high-throughput decryption capabilities.
PA-5450 Series
The cutting-edge PA-5450 Series next-generation firewall is crafted to fulfill the
demanding necessities of hyperscale data centers, internet edges, and campus
segmentation implementations. The PA-5450 boasts remarkable performance, providing
150Gbps of threat protection with security services activated.
PA-5400 Series
The advanced PA-5400 Series effectively halts both known and zero-day attacks
across all network traffic, including encrypted data. These potent ML-Powered NGFWs
are ideally suited for securing high-speed internet edge, data center, and
extensive campus segmentation scenarios.
PA-3400 Series
The state-of-the-art PA-3400 Series boasts impressive performance in a compact 1RU
design. As an energy-efficient ML-powered NGFW, it serves as the preferred firewall
for internet edge and campus settings.
PA-1400 Series
The cutting-edge PA-1400 Series is perfect for safeguarding expansive branch
locations and smaller enterprise campuses. It supports Power over Ethernet (PoE),
virtual systems (VSYS), high-speed 5G copper ports (mGig ports), and fiber ports,
making it an ideal choice for comprehensive protection.
PA-400 Series
The advanced PA-400 Series offers inline, real-time threat protection for
enterprise branches. With its compact design, this fourth-generation series
delivers enterprise-level security that is easy to implement. These ML-powered
NGFWs effectively prevent both known and unknown threats in real time while swiftly
decrypting branch traffic.
PA-220R
The 220R is a durable ML-Powered NGFW designed to provide strong security in
challenging conditions. Common applications include utility substations, power
plants, manufacturing facilities, oil and gas installations, and building
management systems.
Micro-Segmentation
VM-Series virtual firewalls reduce your environment’s attack surface by enabling
granular segmentation and micro-segmentation. Threat prevention capabilities ensure
that when threats do enter the environment, they are quickly identified and stopped
before they can exfiltrate data, deliver malware or ransomware payloads, or cause
other damage.
Click the graphics for more information about the CN-Series container firewall.
Due to the use of network address translation (NAT) in Kubernetes, all outbound
traffic carries the node source IP address. While Kubernetes creates challenges for
traditional security tools, it also presents opportunities to enhance security by
taking advantage of native constructs—most notably, namespaces. Kubernetes
namespaces help to simplify cluster management by making it easier to apply certain
policies to some parts of the cluster without affecting others. However, they are
also a valuable security tool. Security teams use namespaces to isolate workloads,
which reduces the risk of attacks spreading within a cluster and establish resource
quotas to mitigate the damage that can be caused by a successful cluster breach.
Palo Alto Networks CN-Series next-generation firewalls deploy as two sets of pods:
one for the management plane (CN-MGMT), and another for the firewall dataplane (CN-
NGFW). The management pod always runs as a Kubernetes service. The dataplane pods
can be deployed in two modes: distributed or clustered. Click the tabs for more
information about distributed and clustered mode.
Distributed Mode
Clustered Mode
K2-Series Firewalls
The K2-Series firewalls are 5G-ready next-generation firewalls designed to prevent
successful cyberattacks from targeting mobile network services. The K2-Series
firewalls are designed to handle growing throughput needs due to increased
application,user, and device-generated data.
K2-Series Advantages
To tap into 5G business opportunities with minimal risk of exploitation by bad
actors, you need complete visibility and automated security across all network
locations.
Click the tabs for more information about the advantages of K2-Series firewalls.
Scalable
Secure and Fast
You can deploy K2-Series firewalls on all 5G network interfaces to achieve
scalable, complete protection with consistent management and full application
visibility. The shift in 5G network architectures creates more intrusion points,
including attacks inside mobile tunnels and threats within apps traversing cellular
traffic. Mobile operators need consistent security enforcement across all network
locations and all signaling traffic. This larger attack surface increases the need
for application-aware Layer 7 security to detect known and unknown threats.
5
of
12
Identification
IronSkillet
Introduction
Prevention-First Architecture
Next-Generation Firewalls
Identification
Next-Generation Firewall Deployment
IronSkillet
Expedition Migration Tool
Best Practice Assessment (BPA)
Zero Trust
Subscription Services
Panorama
Knowledge Check
Close
IronSkillet
IronSkillet
IronSkillet provides extensive how-to documentation and templates that provide an
easy-to-implement configuration model that is use-case agnostic. The templates
emphasize key security elements, such as dynamic updates, security profiles, rules,
and logging that should be consistent across deployments.
IronSkillet Benefits
Palo Alto Networks best practice documentation shares our expertise in security
prevention with customers and partners, helping them improve their security posture
across various scenarios. IronSkillet templates play a complementary role by
compiling best practice recommendations into prebuilt, day-one configurations that
can be readily loaded into Panorama or a next-generation firewall. Benefits of
using IronSkillet templates include:
6
of
12
Next-Generation Firewall Deployment
Expedition Migration Tool
Introduction
Prevention-First Architecture
Next-Generation Firewalls
Identification
Next-Generation Firewall Deployment
IronSkillet
Expedition Migration Tool
Best Practice Assessment (BPA)
Zero Trust
Subscription Services
Panorama
Knowledge Check
Close
Expedition
Migration Tool
Palo Alto Networks Expedition migration tool enables organizations to analyze their
existing environment, convert existing Security policies to Palo Alto Networks
Next-Generation Firewalls, and assist with the transition from proof of concept to
production.
We use our tools, expertise, and best practices to help organizations analyze their
existing environment and migrate policies and firewall settings to the next-
generation firewall, and we assist in all phases of the transition.
Third-Party Migration
Third-party migration transfers the various firewall rules, addresses, and service
objects to a PAN-OS XML configuration file that can be imported into a Palo Alto
Networks next-generation firewall. Third-party migration from the following
firewall vendors is available:
Cisco ASA/PIX/FWSM
Check Point
Fortinet
McAfee Sidewinder
Juniper SRX/NetScreen
7
of
12
IronSkillet
Best Practice Assessment (BPA)
Introduction
Prevention-First Architecture
Next-Generation Firewalls
Identification
Next-Generation Firewall Deployment
IronSkillet
Expedition Migration Tool
Best Practice Assessment (BPA)
Zero Trust
Subscription Services
Panorama
Knowledge Check
Close
Best Practice
Assessment
The Palo Alto Networks Best Practice Assessment (BPA) is a free tool used to
quickly identify the most critical security controls for an organization to focus
on.
Parts of BPA
Most organizations don’t fully implement the capabilities of their next-generation
firewalls, leading to gaps in security.
8
of
12
Expedition Migration Tool
Zero Trust
Introduction
Prevention-First Architecture
Next-Generation Firewalls
Identification
Next-Generation Firewall Deployment
IronSkillet
Expedition Migration Tool
Best Practice Assessment (BPA)
Zero Trust
Subscription Services
Panorama
Knowledge Check
Close
Zero
Trust
The Zero Trust network is interconnected with your existing network to take
advantage of the technology you already have. Then, over time, you iteratively move
your additional datasets, applications, assets, or services from your legacy
network to your Zero Trust network.
Elapsed time0:00/Total0:00
9
of
12
Best Practice Assessment (BPA)
Subscription Services
Introduction
Prevention-First Architecture
Next-Generation Firewalls
Identification
Next-Generation Firewall Deployment
IronSkillet
Expedition Migration Tool
Best Practice Assessment (BPA)
Zero Trust
Subscription Services
Panorama
Knowledge Check
Close
Large organizations are saddled with too many point solutions and services, each
designed to secure against one specific threat vector. With our subscription
services, you can confidently secure all traffic that traverses any of their
networks or clouds and automatically share intelligence across the organization.
SD-WAN Service
SD-WAN provides intelligent and dynamic path selection on top of the industry-
leading security that PAN-OS software already delivers. Managed by Panorama, the
SD-WAN implementation includes:
The following describes how threats hidden in DNS traffic are identified and the
importance of cloud-based protections.
Threats hidden in DNS traffic are rapidly identified with shared threat
intelligence and machine learning.
Cloud-based protections
Cloud-based protections scale infinitely and are always up to date, giving your
organization a critical new control point to stop attacks that use DNS.
Click the tabs for more information about PAN-DB and user-credential detection.
PAN-DB
User-Credential Detection
WildFire Overview
The WildFire cloud-based malware analysis environment is a cyberthreat prevention
service that identifies unknown malware, zero-day exploits, and advanced persistent
threats (APTs) through static and dynamic analysis in a scalable, virtual
environment.
Updated Protections
Updated Protections
WildFire automatically disseminates updated protections in near real time to
immediately prevent threats from spreading–without manual intervention.
Subscription Service
Subscription Service
Basic WildFire support is included as part of the Threat Prevention license. The
WildFire subscription service provides enhanced services for organizations that
require immediate coverage for threats. The subscription service includes WildFire
analysis for advanced file types (APK, PDF, Microsoft Office, and Java Applet) and
provides the ability to upload these files for cloud sandbox analysis using the
WildFire API.
WildFire Verdicts
As part of the next-generation firewall’s inline threat prevention capability, the
firewall performs a hash calculation for each unknown file and then submits the
hash to WildFire.
If any WildFire subscriber has seen the file before, then the existing verdict for
that file is immediately returned. Links from inspected emails are also submitted
to WildFire for analysis.
WildFire Analysis
If WildFire has never seen the file, the next-generation firewall is instructed to
submit the file for analysis. If the file size is under the configured size limit,
the firewall securely transmits the file to WildFire. Firewalls with an active
WildFire license perform scheduled auto-updates to their WildFire signatures, with
update checks configured as often as every minute. Click the tabs for more
information about WildFire analyses.
Machine Learning-Based
Improved Security Posture and Protection
Cloud-Based
WildFire leverages inline machine learning malware and phishing prevention
techniques, such as real-time WildFire verdict and anti-malware dynamic
classification, to determine if the corresponding webpages for email links
submitted to the service contain any exploits, malware, or phishing capabilities.
WildFire considers the behaviors and properties of the website when making a
verdict on the link.
GlobalProtect Gateway
Provides mobility solutions and/or large-scale VPN capabilities. By default, you
can deploy GlobalProtect portals and gateways (without HIP checks) without a
license. If you want to use advanced GlobalProtect features (HIP checks and related
content updates, the GlobalProtect Mobile App, IPv6 connections, or a GlobalProtect
Clientless VPN) you will need a GlobalProtect Gateway license for each gateway.
Virtual Systems
This is a perpetual license and is required to enable support for multiple virtual
systems on PA-3200 Series firewalls. In addition, you must purchase a Virtual
Systems license if you want to increase the number of virtual systems beyond the
base number provided by default on PA-5200 Series, and PA-7000 Series firewalls
(the base number varies by platform). The PA-800 Series, PA-220, and VM-Series
firewalls do not support virtual systems.
10
of
12
Zero Trust
Panorama
Introduction
Prevention-First Architecture
Next-Generation Firewalls
Identification
Next-Generation Firewall Deployment
IronSkillet
Expedition Migration Tool
Best Practice Assessment (BPA)
Zero Trust
Subscription Services
Panorama
Knowledge Check
Close
Panorama
Panorama enables you to manage all key features of Palo Alto Networks Next-
Generation Firewalls by using a model that provides central oversight and local
control.
Panorama Management
Advantages of Panorama
The time it takes to deploy changes across firewalls can be costly, both in
employee time and possible project delays. In addition, errors can increase when
network and security engineers program changes firewall by firewall.
Click the tabs for more information about how Panorama reduces security management
complexity and simplifies network security management.
Deployment Modes
Three deployment mode options are available for Panorama: Panorama mode, management
only mode, and log collector mode. Separating management and log collection modes
enables Panorama to scale to meet organizational and geographical requirements.
Being able to choose both form factor and deployment mode gives you maximum
flexibility for managing Palo Alto Networks Next-Generation Firewalls in a
distributed network.
Panorama Mode
Panorama mode controls both policy and log management functions for all managed
devices.
In log collector mode, one or more log collectors collect and manage logs from
managed devices. This assumes that another deployment of Panorama is operating in
management only mode.
Click the tabs for more information about the tools Panorama provides through
templates and template stacks.
Template Stacks
Individual Devices
Templates
For example, device groups may be determined geographically, such as Europe and
North America. Also, each device group can have a functional subdevice group (for
example, perimeter or data center subdevice groups).
Click the tabs for more information about elements in a hierarchical device group.
Role-Based Administration
Evaluation Order
Course Summary
Now that you've completed this course, you should be able to:
11
of
12
Subscription Services
Knowledge Check
Introduction
Understanding the Modern Cybersecurity Landscape
Attacker Profiles and Cyberattack Lifecycle
Knowledge Check
Close
Cybersecurity Fundamentals
Microblogging
Microblogging web services allow a subscriber to broadcast short messages to other
subscribers. Examples include Tumblr and Twitter.
Social Curation
Social curation shares collaborative content about particular topics. Social
bookmarking is a type of social curation. Examples include Cogenz, Instagram,
Pinterest, and Reddit.
Social Networks
Social networks are used to share content with business or personal contacts.
Examples include Facebook, Instagram, and LinkedIn.
Web-Based Email
Web-based email is an internet email service that is typically accessed via a web
browser. Examples include Gmail, Outlook.com, and Yahoo! Mail.
Wikis
Wikis enable users to contribute, collaborate, and edit site content. Examples
include Socialtext and Wikipedia.
Web 3.0
The vision of Web 3.0 is to return the power of the internet to individual users,
in much the same way that the original Web 1.0 was envisioned. To some extent, Web
2.0 has become shaped and characterized, if not controlled, by governments and
large corporations dictating the content that is made available to individuals and
raising many concerns about individual security, privacy, and liberty.
Blockchain
Blockchain
Blockchain is essentially a data structure containing transactional records (stored
as blocks) that ensures security and transparency through a vast, decentralized
peer-to-peer network with no single controlling authority. Cryptocurrency, such as
Bitcoin, is an example of a blockchain application.
Data Mining
Data Mining
Data mining enables patterns to be discovered in large datasets by using machine
learning, statistical analysis, and database technologies.
Mixed Reality
Mixed Reality
Mixed reality includes technologies, such as virtual reality (VR), augmented
reality (AR), and extended reality (XR), that deliver an immersive and interactive
physical and digital sensory experience in real time.
Natural Language Search
Natural Language Search
Natural language search is the ability to understand human spoken language and
context (rather than a Boolean search, for example) to find information.
Application Classification
Many applications are designed to circumvent traditional port-based firewalls, so
that they can be easily installed and accessed on any device, anywhere and anytime.
Click the arrow for more information about how applications are classified and how
difficult it has become to classify applications.
Tunneling
Another method is tunneling within commonly used services, such as running peer-to-
peer (P2P) file sharing or an IM client such as Meebo over HTTP.
Service Models
There are three cloud computing service models: Software as a Service (Saas),
Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).
Click the tabs for more information about the cloud computing models.
Google
FutureFuel
Microsoft
Squibler
Slack
Boast Captial
Zoom
Lumen5
Zendesk
Shopify
Dropbox
HubSpot
Mailchimp
Adobe
SaaS
SaaS cloud service is hosted by the CSP and available to consumers through a pay-
as-you-go model.
SaaS cloud service is hosted by the service provider, which is available to the
consumers based on the pay-as-you-go. SaaS cloud service is suitable for consumers
across different localities. The software license is open on either monthly or
yearly subscriptions, and it can be accessed via a browser and internet
connectivity. The primary function of SaaS product development is to provide cloud-
based apps to consumers.
Dropbox, which lets users share and download files over the network, and Google
Docs, which lets users create and share documents over the web, are perfect
examples of SaaS cloud services.
Below are examples of SaaS use cases. Click the image to enlarge it.
SaaS
SaaS
PaaS
PaaS is perfect for software developers.
The main function of PaaS is to give a useful framework for developers to manage
new product apps, build apps, and test apps. Developers find it easy to use PaaS
because it serves the database, application tools, and OS required for app
development at the same time, saving time and resources.
Many developers love PaaS because it gives them a platform to build apps that can
be provided as a SaaS solution. The best example of PaaS is the Google App Engine,
which facilitates easy app creation and hosting.
Below are examples of PaaS use cases. Click the image to enlarge it.
IaaS
The primary function of IaaS is to provide visual data centers to businesses.
In IaaS, the vendor works on networking resources, storage space management, and
the dedicated data center, while the business works on specified tools for
development, hosted app management, and OS deployment.
Amazon Web Services is an excellent example of IaaS. Netflix and Salesforce are
moving toward Amazon Web Services to support their ever-growing customer bases.
Below are examples of IaaS use cases. Click the image to enlarge it.
Click the tabs for more information about each risk associated with SaaS
applications.
Cloud-Based Threats
Introduction to SaaS
Data is located everywhere in today’s enterprise networks, including in many
locations that are not under the organization’s control. New data security
challenges emerge for organizations that permit SaaS use in their networks. With
SaaS applications, data is often stored where the application resides – in the
cloud. Thus, the data is no longer under the organization’s control, and visibility
is often lost. SaaS vendors do their best to protect the data in their
applications, but it is ultimately not their responsibility. Just as in any other
part of the network, the IT team is responsible for protecting and controlling the
data, regardless of its location.
Malicious Outsiders
The most common source of breaches for networks overall is also a critical concern
for SaaS security. The SaaS application becomes a new threat vector and
distribution point for malware used by external adversaries. Some malware will even
target the SaaS applications themselves, for example, by changing their shares to
“public” so that the data can be retrieved by anyone.
Malicious Insiders
The least common but real SaaS application risk is the internal user who
maliciously shares data for theft or revenge purposes. For example, an employee who
is leaving the company might set a folder’s share permissions to “public” or share
it with an external email address to later steal the data from a remote location.
Well-intentioned end users are often untrained and unaware of the risks their
actions pose in SaaS environments. Because SaaS applications are designed to
facilitate easy sharing, it’s understandable that data often becomes
unintentionally exposed. Accidental data exposure by end users is surprisingly
common and includes accidental share, promiscuous share, and ghost share.
Accidental Share
In a promiscuous share, a legitimate share is created for a user, but that user
then shares with other people who shouldn’t have access. Promiscuous shares often
result in the data being publicly shared. These types of shares can go well beyond
the control of the original owner.
In a ghost share, the share remains active for an employee or vendor that is no
longer working with the company or should no longer have access. Without visibility
and control of the shares, tracking and fixing of shares to ensure that they are
still valid is very difficult.
Compliance Challenges
Most companies and industries face constant data regulatory and compliance
challenges. Compliance and security are not the same thing. Let's review some of
the compliance challenges.
2
of
4
Introduction
Attacker Profiles and Cyberattack Lifecycle
Introduction
Understanding the Modern Cybersecurity Landscape
Attacker Profiles and Cyberattack Lifecycle
Knowledge Check
Close
Cybersecurity Fundamentals
Attacker Profiles
News outlets are usually quick to showcase high-profile attacks, but the sources of
these attacks is not always easy to identify. Each of the different attacker types
or profiles generally has a specific motivation for the attacks they generate.
Here are some traditional attacker profile types. Because these different attacker
profiles have different motivations, information security professionals must design
cybersecurity defenses that can identify the different attacker motivations and
apply appropriate deterrents. Click the arrows for more information about the
profile type of each attacker.
Cybercriminals
Cybercriminals are the most common attacker profile. The dramatic increase in the
number of ransomware attacks over the last five years generally is attributed to
cybercriminal groups, which are also invested in other crime-for-profit activities.
They are also known for the proliferation of bots and botnet attacks, where
endpoints are infected and then organized collectively by a command-and-control, or
C&C, attack server.
Cyberattack Lifecycle
Modern cyberattack strategy has evolved from a direct attack against a high-value
server or asset (“shock and awe”) to a patient, multistep process that blends
exploits, malware, stealth, and evasion in a coordinated network attack (“low and
slow”).
The cyberattack lifecycle illustrates the sequence of events that an attacker goes
through to infiltrate a network and exfiltrate (or steal) valuable data. Blocking
just one step breaks the chain and can effectively defend an organization’s network
and data against an attack.
Click the arrows for more information about the particular attack lifecycle.
Reconnaissance (Attack)
Reconnaissance (Defense)
Breaking the cyberattack lifecycle at this phase of an attack begins with proactive
and effective end-user security awareness training that focuses on topics such as
social engineering techniques (for example, phishing, piggybacking, and shoulder
surfing), social media (for example, safety and privacy issues), and organizational
security policies (for example, password requirements, remote access, and physical
security). Another important countermeasure is continuous monitoring and inspection
of network traffic flows to detect and prevent unauthorized port and vulnerability
scans, host sweeps, and other suspicious activity. Effective change and
configuration management processes help to ensure that newly deployed applications
and endpoints are properly configured (for example, disabling unneeded ports and
services) and maintained.
Weaponization (Attack)
Attackers determine which methods to use to compromise a target endpoint. They may
choose to embed intruder code within seemingly innocuous files such as a PDF or
Microsoft Word document or email message. Or, for highly targeted attacks,
attackers may customize deliverables to match the specific interests of an
individual within the target organization.
Weaponization (Defense)
Breaking the cyberattack lifecycle at this phase of an attack is challenging
because weaponization typically occurs within the attacker’s network. However,
analysis of artifacts (both malware and weaponizer) can provide important threat
intelligence to enable effective zero-day protection when delivery (the next step)
is attempted.
Delivery (Attack)
Attackers next attempt to deliver their weaponized payload to a target endpoint via
email, IM, drive-by download (an end user’s web browser is redirected to a webpage
that automatically downloads malware to the endpoint in the background), or
infected file share.
Delivery (Defense)
Exploitation (Attack)
Exploitation (Defense)
Breaking the cyberattack lifecycle at this phase of an attack begins with proactive
and effective end-user security awareness training that focuses on topics such as
malware prevention and email security. Other important security countermeasures
include vulnerability and patch management; malware detection and prevention;
threat intelligence (including known and unknown threats); blocking risky,
unauthorized, or unneeded applications and services; managing file or directory
permissions and root or administrator privileges; and logging and monitoring
network activity.
Installation (Attack)
Installation (Defense)
Attackers often have multiple, different attack objectives, including data theft;
destruction or modification of critical systems, networks, and data; and denial-of-
service (DoS). This last stage of the cyberattack lifecycle can also be used by an
attacker to advance the early stages of the lifecycle against another target.
Act on Objective (Defense)
Monitoring and awareness are the primary defense actions performed at this phase.
The 2018 Verizon Data Breach Investigations Report (DBIR) describes this strategy
as a secondary motive in which web applications are compromised to aid and abet in
the attack of another victim. For example, an attacker may compromise a company’s
extranet to breach a business partner who is the primary target.
According to the DBIR, in 2014 there were 23,244 incidents where web applications
were compromised with a secondary motive. The attacker pivots the attack against
the initial victim network to a different victim network, thus making the initial
victim an unwitting accomplice.
High-Profile Attacks
The goals of attackers have changed dramatically. Their goals are mostly associated
with financial gain.
Elapsed time0:00/Total1:20
High-Profile Cyberattacks
The following are the different types of high-profile cyberattacks:
SolarWinds
In December 2020, the cybersecurity firm FireEye and the U.S. Treasury Department
both reported attacks involving malware in a software update to their SolarWinds
Orion Network Management System perpetrated by the APT29 (Cozy Bear/Russian SVR)
threat group. This attack is one of the most damaging supply chain attacks in
history, potentially impacting more than 300,000 SolarWinds customers, including
the U.S. federal government and 425 of the Fortune 500 companies.
Colonial Pipeline
In May 2021, the Colonial Pipeline Company – which operates one of the largest fuel
pipelines in the U.S. – was hit by the DarkSide threat actor group with a
Ransomware-as-a-Service (RaaS) attack. Although the company acted quickly to shut
down its network systems and paid the $4.4 million ransom, operations were not
fully restored for six days, which caused major fuel shortages and other supply
chain issues along the U.S. eastern seaboard. Additionally, the personal
information –including the health insurance information, social security numbers,
driver’s licenses, and military identification numbers – of nearly 6,000
individuals were compromised.
JBS S.A.
In May 2021, Brazil-based JBS S.A. – the largest producer of beef, chicken, and
pork worldwide – was hit by a ransomware attack attributed to the REvil threat
actor group. Although the company paid the $11 million ransom, its U.S. and
Australia beef processing operations were shut down for a week.
Government of Ukraine
In January 2022, several Ukrainian government websites including the ministry of
foreign affairs and the education ministry were hacked by suspected Russian
attackers. Threatening messages were left on the websites during a period of
heightened tensions between the governments of Ukraine and Russia.
Sub-Techniques
Sub-techniques are a more specific description of the adversarial behavior used to
achieve a goal. They describe behavior at a lower level than a technique. For
example, an adversary may dump credentials by accessing the Local Security
Authority (LSA) secrets.
Supply-Chain Management
Following are the highlighted practices in cyber supply chain management.
Continuous improvement
Cyber Supply Chain Risk Management (C-SCRM) processes must rapidly adapt to changes
in the threat landscape. Palo Alto Networks’ cross-functional security council
rebalances the C-SCRM program’s security priorities every six months.
Public-private partnerships
Palo Alto Networks participates in multiple voluntary public-private partnerships,
including the Department of Homeland Security’s Information and Communications
Technology Supply Chain Risk Management Task Force and the U.S. Customs and Border
Protection's Customs-Trade Partnership Against Terrorism. These programs encourage
Palo Alto Networks’ suppliers and the broader security community to develop robust
supply chain and cybersecurity practices.
To evaluate the extent and severity of each CVE across your endpoints, you can
drill down into each CVE in Cortex XDR and view all the endpoints and applications
in your environment impacted by the CVE.
Cortex XDR retrieves the latest information from the NIST public database. From
Add-ons > Host Insights > Vulnerability Assessment, select CVEs on the upper-right
bar. For each vulnerability, Cortex XDR displays default and optional values.
You can click each individual CVE to view in-depth details about it on a panel that
appears on the right.
Course Summary
Please ensure all knowledge check questions have been answered in order for this
course to be marked complete.
Now that you have completed this course, you should be able to:
Identify the risks and security challenges associated with SaaS applications
3
of
4
Understanding the Modern Cybersecurity Landscape
Knowledge Check
Introduction
Malware Types and Advanced Malware
Ransomware, Vulnerabilities, and Exploits
Knowledge Check
Close
Cybersecurity Fundamentals
Attackers use a variety of techniques and attack types to achieve their objectives.
Malware and exploits are integral to the modern cyberattack strategy. This lesson
describes the different malware types and advanced malware properties.
Malware
Malware usually has one or more of the following objectives: to provide remote
control for an attacker to use an infected machine, to send spam from the infected
machine to unsuspecting targets, to investigate the infected user’s local network,
and to steal sensitive data.
Advanced/Modern Malware
Advanced or modern malware generally refers to new or unknown malware. These types
of malware are highly sophisticated and often have specialized targets. Advanced
malware typically can bypass traditional defenses.
Malware Types
Malware is varied in type and capabilities. Let's review several malware types.
Click the arrows for more information about the malware types.
Logic Bombs
Spyware and adware are types of malware that collect information, such as internet
surfing behavior, login credentials, and financial account information, on an
infected endpoint. Spyware often changes browser and other software settings and
slows computer and internet speeds on an infected endpoint. Adware is spyware that
displays annoying advertisements on an infected endpoint, often as pop-up banners.
Rootkits
Bootkits
Backdoors
Anti-AV
Ransomware
Trojan Horses
Virus
A virus is malware that is self-replicating but must first infect a host program
and be executed by a user or process.
Worms
Elapsed time0:00/Total0:37
Obfuscation
Obfuscation
Polymorphism
Polymorphism
Distributed
Distributed
Multi-functional
Multi-functional
2
of
4
Introduction
Ransomware, Vulnerabilities, and Exploits
Introduction
Malware Types and Advanced Malware
Ransomware, Vulnerabilities, and Exploits
Knowledge Check
Close
Cybersecurity Fundamentals
Ransomware, Vulnerabilities,
and Exploits
Ransomware Types
Although cryptographic ransomware is the most common and successful type of
ransomware, it is not the only one. It’s important to remember that ransomware is
not a single family of malware but is a criminal business model in which malware is
used to hold something of value for ransom.
If the attacker fails in any of these steps, the scheme will be unsuccessful.
Although the concept of ransomware has existed for decades, the technology and
techniques, such as reliable encrypting and decrypting, required to complete all
five of these steps on a wide scale were not available until just a few years ago.
Click the arrows for more information about the five steps.
Ransomware attacks typically begin by using social engineering to trick users into
opening an attachment or viewing a malicious link in their web browser. This allows
attackers to install malware onto a system and take control. However, another
increasingly common tactic is for attackers to gain access to the network, perform
reconnaissance on the network to identify potential targets and establish Command
and Control (C2), install other malware and create backdoor accounts for
persistence, and potentially exfiltrate data.
Attackers will either identify and encrypt certain file types or deny access to the
entire system.
Attackers must return access to the device(s). Failure to restore the compromised
systems destroys the effectiveness of the scheme as no one would be willing to pay
a ransom if they didn’t believe their valuables would be returned.
Vulnerability
Vulnerabilities are routinely discovered in software at an alarming rate.
Vulnerabilities may exist in software when the software is initially developed and
released, or vulnerabilities may be inadvertently created, or even reintroduced,
when subsequent version updates or security patches are installed.
Exploit
An exploit is a type of malware that takes advantage of a vulnerability in an
installed endpoint or server software such as a web browser, Adobe Flash, Java, or
Microsoft Office. An attacker crafts an exploit that targets a software
vulnerability, causing the software to perform functions or execute code on behalf
of the attacker.
Patching Vulnerabilities
Security patches are developed by software vendors as quickly as possible after a
vulnerability has been discovered in their software.
1. Discovery
An attacker may learn of a vulnerability and begin exploiting it before the
software vendor is aware of the vulnerability or has an opportunity to develop a
patch.
2. Development of Patch
The delay between the discovery of a vulnerability and development and release of a
patch is known as a zero-day threat (or exploit).
3. Test and Deploy Patch
It may be months or years before a vulnerability is announced publicly. After a
security patch becomes available, time inevitably is required for organizations to
properly test and deploy the patch on all affected systems. During this time, a
system running the vulnerable software is at risk of being exploited by an
attacker.
1. Creation
2. Action
3. Techniques
4. Heap Spray
Creation of an exploit data file is a two-step process. The first step is to embed
a small piece of malicious code within the data file. However, the attacker still
must trick the application into running the malicious code. Thus, the second part
of the exploit typically involves memory corruption techniques that allow the
attacker’s code to be inserted into the execution flow of the vulnerable software.
1. Software Deployed
2. Vulnerability Discovered
3. Exploits Begin
The process of discovery and patching will continue. According to research by Palo
Alto Networks, 78 percent of exploits take advantage of vulnerabilities that are
less than two years old, which implies that developing and applying patches is a
lengthy process.
5. Patch Released
This delay between the discovery of a vulnerability and development and release of
a patch is known as a zero-day threat (or exploit).
6. Patch Deployed
During this time, a system running the vulnerable software is at risk of being
exploited by an attacker.
Course Summary
Please ensure all knowledge check questions have been answered in order for this
course to be marked complete.
Now that you have completed this course, you should be able to:
3
of
4
Malware Types and Advanced Malware
Knowledge Check
Introduction
Cyberattack Techniques
Advanced Persistent Threats and Wi-Fi Vulnerabilities
Knowledge Check
Close
Cybersecurity Fundamentals
Cyberattack
Techniques
Attackers use a variety of techniques and attack types to achieve their objectives.
Spamming and phishing are commonly employed techniques to deliver malware and
exploits to an endpoint via an email executable or a web link to a malicious
website. Once an endpoint is compromised, an attacker typically installs back
doors, remote access Trojans (RATs), and other malware to ensure persistence. This
lesson describes spamming and phishing techniques, how bots and botnets function,
and the different types of botnets.
Business Email Compromise (BEC)
Business email compromise (BEC) is one of the most prevalent types of cyberattacks
that organizations face today. The FBI Internet Crime Complaint Center (IC3)
estimates that "in aggregate" BEC attacks cost organizations three times more than
any other cybercrime and BEC incidents represented nearly a third of the incidents
investigated by Palo Alto Networks Unit 42 Incident Response Team. According to the
Verizon Data Breach Investigations Report (DBIR), BEC is the second most common
form of social engineering today.
Spam and phishing emails are the most common delivery methods for malware. The
volume of spam email as a percentage of total global email traffic fluctuates
widely from month to month – typically 45 to 75 percent. Although most end users
today are readily able to identify spam emails and are savvier about not clicking
links, opening attachments, or replying to spam emails, spam remains a popular and
effective infection vector for the spread of malware. Phishing attacks, in contrast
to spam, are becoming more sophisticated and difficult to identify.
Phishing Attacks
We often think of spamming and phishing as the same thing, but they are actually
separate processes, and they each require their own mitigations and defenses.
Phishing attacks, in contrast to spam, are becoming more sophisticated and
difficult to identify.
Spear Phishing
Spear phishing is a targeted phishing campaign that appears more credible to its
victims by gathering specific information about the target, giving it a higher
probability of success. A spear phishing email may spoof an organization (such as a
financial institution) or individual that the recipient actually knows and does
business with. It may also contain very specific information (such as the
recipient’s first name, rather than just an email address).
Spear phishing, and phishing attacks in general, are not always conducted via
email. A link is all that is required, such as a link on Facebook or a message
board or a shortened URL on Twitter. These methods are particularly effective in
spear phishing attacks because they allow the attacker to gather a great deal of
information about the targets and then lure them through dangerous links into a
place where the users feel comfortable.
Whaling
Whaling is a type of spear phishing attack that is specifically directed at senior
executives or other high-profile targets within an organization. A whaling email
typically purports to be a legal subpoena, customer complaint, or other serious
matter.
Watering Hole
Watering hole attacks compromise websites that are likely to be visited by a
targeted victim-for example, an insurance company website that may be frequently
visited by healthcare providers. The compromised website will typically infect
unsuspecting visitors with malware (known as a “drive-by download”).
Pharming
A pharming attack redirects a legitimate website’s traffic to a fake site,
typically by modifying an endpoint’s local hosts file or by compromising a DNS
server (DNS poisoning).
Click each tab for more information about bots and botnets.
Bots
Botnets
Disabling a Botnet
Botnets themselves are dubious sources of income for cybercriminals. Botnets are
created by cybercriminals to harvest computing resources (bots). Control of botnets
(through C2 servers) can then be sold or rented out to other cybercriminals.
Click the tabs for more information about the challenges that may occur while
disabling a botnet.
Resources
Servers
Redundancy
Quick Recovery
DDoS Attacks
Extensive resources are typically required to map the distributed C2 infrastructure
of a botnet. Mapping a botnet's infrastructure almost always requires an enormous
amount of investigation, expertise, and coordination between numerous industry,
security, and law enforcement organizations worldwide.
Spamming Botnets
The largest botnets are often dedicated to sending spam. The premise is
straightforward: The attacker attempts to infect as many endpoints as possible, and
the endpoints can then be used to send out spam email messages without the end
users’ knowledge.
Productivity
Productivity
Reputation
Reputation
Example: Rustock Botnet
The Rustock botnet is an example of a spamming botnet. Rustock could send up to
25,000 spam email messages per hour from an individual bot. At its peak, it sent an
average of 192 spam emails per minute per bot. Rustock is estimated to have
infected more than 2.4 million computers worldwide. In March 2011, the U.S. Federal
Bureau of Investigation (FBI), working with Microsoft and others, was able to take
down the Rustock botnet. By then, the botnet had operated for more than five years.
At the time, it was responsible for sending up to 60 percent of the world’s spam.
Click the arrow for more information about how DDoS attacks are used and their
impact on an organization.
Use of Bots
A DDoS botnet uses bots as part of a DDoS attack, overwhelming a target server or
network with traffic from a large number of bots. In such attacks, the bots
themselves are not the target of the attack. Instead, the bots are used to flood
some other remote target with traffic. The attacker leverages the massive scale of
the botnet to generate traffic that overwhelms the network and server resources of
the target.
Financial Botnets
Financial botnets, such as ZeuS and SpyEye, are responsible for the direct theft of
funds from all types of enterprises. These types of botnets are typically not as
large as spamming or DDoS botnets, which grow as large as possible for a single
attacker. Click the tabs for more information about where financial botnets are
sold and their impact.
Existence
Impact
Though the DDoS attack is a type of DoS attack, it is significantly more popular in
its use due to the features that differentiate and strengthen it from other types
of DoS attacks.
2
of
4
Introduction
Advanced Persistent Threats and Wi-Fi Vulnerabilities
Introduction
Cyberattack Techniques
Advanced Persistent Threats and Wi-Fi Vulnerabilities
Knowledge Check
Close
Cybersecurity Fundamentals
With the explosive growth in fixed and mobile devices over the past decade,
wireless (Wi-Fi) networks are growing exponentially—and so is the attack surface
for advanced persistent threats (ATP). This lesson describes Wi-Fi vulnerabilities
and attacks and APTs.
Advanced
Persistent
Threat
Example: Lazarus
Attacks against nation-states and corporations are common, and the group of
cybercriminals that may have done the most damage is Lazarus. The Lazarus group is
known as an APT. The Lazarus group has been known to operate under different names,
including Bluenoroff and Hidden Cobra. They were initially known for launching
numerous attacks against government and financial institutions in South Korea and
Asia. In more recent years, the Lazarus group has been targeting banks, casinos,
financial investment software developers, and crypto-currency businesses. The
malware attributed to this group recently has been found in 18 countries around the
world.
Wi-Fi Challenges
A security professional's first concern may be whether a Wi-Fi network is secure.
However, for the average user, the unfortunate reality is that Wi-Fi connectivity
is more about convenience than security.
Security professionals must secure Wi-Fi networks—but they must also protect the
mobile devices their organization’s employees use to perform work and access
potentially sensitive data, no matter where they are or whose network they’re on.
Public Airwaves
Wi-Fi is conducted over public airwaves. The 2.4GHz and 5GHz frequency ranges that
are set aside for Wi-Fi communications are also shared with other technologies,
such as Bluetooth. As a result, Wi-Fi is extremely vulnerable to congestion and
collisions.
Wi-Fi Network
Additional problems exist because Wi-Fi device settings and configurations are well
known, published openly, shared, and even broadcast. To begin securing a WLAN
network, you should disable the Service Set Identifier Broadcast configuration. If
the SSID is configured to broadcast, it is easier for an attacker to define simple
attack targets and postures because the network is already discoverable.
Wireless Security
Wi-Fi security begins—and ends—with authentication. An organization cannot protect
its digital assets if it cannot control who has access to its wireless network.
Security Protocols
The Wi-Fi Protected Access (WPA) security standard was published as an interim
standard in 2004, quickly followed by WPA2. WPA/WPA2 contain improvements to
protect against the inherent flaws in the Wired Equivalent Privacy (WEP), including
changes to the encryption.
WEP
The WEP encryption standard is no longer secure enough for Wi-Fi networks. WPA2 and
the emerging WPA3 standards provide strong encryption capabilities and manage
secure authentication via the 802.1x standard.
WPA2
WPA2-PSK supports 256-bit keys, which require 64 hexadecimal characters.
WPA3
WPA3 was published in 2018. Its security enhancements include more robust
bruteforce attack protection, improved hotspot and guest access security, simpler
integration with devices that have limited or no user interface (such as IoT
devices), and a 192-bit security suite. Newer Wi-Fi routers and client devices will
likely support both WPA2 and WPA3 to ensure backward compatibility in mixed
environments.
According to the Wi-Fi Alliance, WPA3 features include improved security for IoT
devices such as smart bulbs, wireless appliances, smart speakers, and other screen-
free gadgets that make everyday tasks easier.
Evil Twin
Perhaps the easiest way for an attacker to find a victim to exploit is to set up a
wireless access point that serves as a bridge to a real network. An attacker can
inevitably bait a few victims with “free Wi-Fi access.”
Baiting a victim with free Wi-Fi access requires a potential victim to stumble on
the access point and connect. The attacker can’t easily target a specific victim,
because the attack depends on the victim initiating the connection. Attackers now
try to use a specific name that mimics a real access point. Click the arrows for
more information about how the Evil Twin attack is executed.
A variation on this approach is to use a more specific name that mimics a real
access point normally found at a particular location–the Evil Twin. For example, if
a local airport provides Wi-Fi service and calls it “Airport Wi-Fi,” the attacker
might create an access point with the same name using an access point that has two
radios.
Average users cannot easily discern when they are connected to a real access point
or a fake one, so this approach would catch a greater number of users than a method
that tries to attract victims at random. Still, the user has to select the network,
so a bit of chance is involved in trying to reach a particular target.
The main limitation of the Evil Twin attack is that the attacker can’t choose the
victim. In a crowded location, the attacker will be able to get a large number of
people connecting to the wireless network to unknowingly expose their account names
and passwords. However, it’s not an effective approach if the goal is to target
employees in a specific organization.
Jasager
To understand a more targeted approach than the Evil Twin attack, think about what
happens when you bring your wireless device back to a location that you’ve
previously visited.
Watch the video for more information about a normal wireless device connectivity
scenario and a Jasager attack scenario.
Elapsed time0:00/Total2:27
SSLstrip
After a user connects to a Wi-Fi network that’s been compromised–or to an
attacker’s Wi-Fi network masquerading as a legitimate network–the attacker can
control the content that the victim sees. The attacker simply intercepts the
victim’s web traffic, redirects the victim’s browser to a web server that it
controls, and serves up whatever content the attacker desires.
Emotet
Emotet is a Trojan, first identified in 2014, that has long been used in spam
botnets and ransomware attacks. Recently, it was discovered that a new Emotet
variant is using a Wi-Fi spreader module to scan Wi-Fi networks looking for
vulnerable devices to infect. The Wi-Fi spreader module scans nearby Wi-Fi networks
on an infected device and then attempts to connect to vulnerable Wi-Fi networks via
a brute-force attack. After successfully connecting to a Wi-Fi network, Emotet then
scans for non-hidden shares and attempts another brute-force attack to guess
usernames and passwords on other devices connected to the network. It then installs
its malware payload and establishes C2 communications on newly infected devices.
SSLstrip Strategy
SSLstrip strips SSL encryption from a “secure” session. When a user connected to a
compromised Wi-Fi network attempts to initiate an SSL session, the modified access
point intercepts the SSL request.
With SSLstrip, the modified access point displays a fake padlock in the victim’s
web browser. Webpages can display a small icon called a favicon next to a website
address in the browser’s address bar. SSLstrip replaces the favicon with a padlock
that looks like SSL to an unsuspecting user.
Wi-Fi Attacks
There are different types of Wi-Fi attacks that hackers use to eavesdrop on
wireless network connections to obtain credentials and spread malware.
Doppelganger
Doppelganger is an insider attack that targets WPA3-Personal protected Wi-Fi
networks. The attacker spoofs the source MAC address of a device that is already
connected to the Wi-Fi network and attempts to associate with the same wireless
access point.
Cookie Guzzler
Muted Peer and Hasty Peer are variants of the cookie guzzler attack which exploit
the Anti-Clogging Mechanism (ACM) of the Simultaneous Authentication of Equals
(SAE) key exchange in WPA3-Personal.
Course Summary
Please ensure all knowledge check questions have been answered in order for this
course to be marked complete.
Now that you have completed this course, you should be able to:
Describe how bots and botnets work and explain the different types of botnets
Identify the latest cyberattack techniques
Describe how to defend against cyberattacks
Identify how spamming and phishing attacks are performed
Describe Wi-Fi vulnerabilities, attacks, and advanced persistent threats
3
of
4
Cyberattack Techniques
Knowledge Check
Introduction
Security Models and Perimeter-Based Security
Zero Trust Security Model and Implementation
Close
This lesson describes the core concepts of security models, the importance of
security models, and the functions of a perimeter-based security model.
Mainframe Computers
Processing Power
The primary value of the mainframe computer was its processing power. The
relatively limited data that was produced was typically stored on near-line media,
such as tape. Today, data is the target. Data is stored online in data centers and
in the cloud, and it is a high-value target for any attacker.
Data Center
Data centers today are remotely accessed by millions of remote endpoint devices
from anywhere and at any time. Unlike the RJEs of the mainframe era, modern
endpoints (including mobile devices) are far more powerful than many of the early
mainframe computers and are themselves targets.
Wireless Technologies
Wireless technologies, partner connections, and guest users introduce countless
additional pathways into network branch offices, which may be located in untrusted
countries or regions.
Insiders
Insiders, whether intentionally malicious or just careless, may present a very real
security threat.
Cyberthreats
Sophisticated cyberthreats could penetrate perimeter defenses and gain free access
to the internal network.
Stolen Credentials
Malicious users can gain access to the internal network and sensitive resources by
using the stolen credentials of trusted users.
Internal Networks
Internal networks are rarely homogeneous. They include pockets of users and
resources with different levels of trust or sensitivity, and these pockets should
ideally be separated (for example, research and development and financial systems
versus print or file servers).
Click the tabs for more information about the typical shortcomings and inabilities
of perimeter-centric approaches.
Application Control
Encrypted Traffic
Identify Users
Protect Against Attacks
Net Result
Cannot definitively distinguish good applications from bad ones (which leads to
overly permissive access control settings)
2
of
3
Introduction
Zero Trust Security Model and Implementation
Introduction
Security Models and Perimeter-Based Security
Zero Trust Security Model and Implementation
Close
This lesson describes the Zero Trust security model design principles, the
principle of least privilege, and steps to configure and implement a Zero Trust
segmentation platform.
With a Zero Trust model, essential security capabilities are deployed in a way that
provides policy enforcement and protection for all users, devices, applications,
and data resources, as well as the communications traffic between them, regardless
of location.
No Default Trust
With Zero Trust there is no default trust for any entity – including users,
devices, applications, and packets – regardless of what it is and its location on
or relative to the enterprise network.
Improved Effectiveness
Greater Efficiency
Improved Ability
Lower Total Cost of Ownership
Clearly improved effectiveness in mitigating data loss with visibility and safe
enablement of applications, plus detection and prevention of cyberthreats
Secure
Control
Monitor
Conceptual Architecture
With the protect surface identified, security teams can identify how traffic moves
across the organization in relation to the protect surface. Understanding who the
users are, which applications they are using, and how they are connecting is the
only way to determine and enforce policy that ensures secure access to data. Click
the arrows for more information about the main components of a Zero Trust
conceptual architecture.
Fundamental Assertions
Management Infrastructure
Centralized management capabilities are crucial to enabling efficient
administration and ongoing monitoring, particularly for implementations involving
multiple distributed Zero Trust segmentation platforms. A data acquisition network
also provides a convenient way to supplement the native monitoring and analysis
capabilities for a Zero Trust segmentation platform. Session logs that have been
forwarded to a data acquisition network can then be processed by out-of-band
analysis tools and technologies intended, for example, to enhance network
visibility, detect unknown threats, or support compliance reporting.
With the protect surface identified, you can identify how traffic moves across the
organization in relation to the protect surface. Understanding who the users are,
which applications they are using, and how they are connecting is the only way to
determine and enforce policy that ensures secure access to your data. With an
understanding of the interdependencies between the DAAS, infrastructure, services,
and users, you should put controls in place as close to the protect surface as
possible, creating a micro-perimeter around it. This micro-perimeter moves with the
protect surface, wherever it goes.
In the Zero Trust model, only known and permitted traffic is granted access to the
protect surface. A segmentation gateway, typically a next-generation firewall,
controls this access. The segmentation gateway provides visibility into the traffic
and users attempting to access the protect surface, enforces access control, and
provides additional layers of inspection. Zero Trust policies provide granular
control of the protect surface, making sure that users have access to the data and
applications they need to perform their tasks but nothing more. This is known as
least privilege access.
Have Visibility of and Control Over the Applications and their Functionality in the
Traffic
Dynamically Define the Resources that are Associated with the Sensitive Data or
Application
Trust Zones
Secure Access
Consistent secure IPsec and SSL VPN connectivity is provided for all employees,
partners, customers, and guests wherever they’re located (for example, at remote or
branch offices, on the local network, or over the internet). Policies to determine
which users and devices can access sensitive applications and data can be defined
based on application, user, content, device, device state, and other criteria.
Cyberthreat Protection
Introduction
Cybercrime and Security Threats
Implementing a Prevention Architecture
Knowledge Check
Close
Cybersecurity Fundamentals
Cybercrime and
Security Threats
This lesson describes the evolution of cybercrime and security threats, the impact
of security breaches on organizations, and the role of employees in exposing
critical data.
Prevention Architecture
The product portfolio's prevention architecture allows organizations to reduce
threat exposure by first enabling applications for all users or devices in any
location and then preventing threats within application flows, tying application
use to user identities across physical, cloud-based, and software-as-a-service
(SaaS) environments.
Introduction
Cybercrime and Security Threats
Implementing a Prevention Architecture
Knowledge Check
Close
Cybersecurity Fundamentals
Implementing a
Prevention Architecture
Prevention-First Architecture
Palo Alto Networks is helping to address the world’s greatest security challenges
with continuous innovation that seizes the latest breakthroughs in artificial
intelligence, analytics, automation, and orchestration. By delivering an integrated
platform and empowering a growing ecosystem of partners, Palo Alto Networks is at
the forefront of protecting tens of thousands of organizations across clouds,
networks, and mobile devices.
The Palo Alto Networks portfolio of security technologies and solutions addresses
three essential areas of cybersecurity strategy.
PAN-OS®
PAN-OS® software runs Palo Alto Networks® next-generation firewalls. PAN-OS
natively uses key technologies (App-ID, Content-ID, Device-ID, and User-ID) to
provide complete visibility and control of applications in use across all users,
devices, and locations all the time. Inline ML and application and threat
signatures automatically reprogram the firewall with the latest intelligence so
allowed traffic is free of known and unknown threats.
Panorama
Panorama network security management enables centralized control, log collection,
and policy workflow automation across all next-generation firewalls (scalable to
tens of thousands of firewalls) from a single pane of glass.
Prisma Cloud
Prisma Access
Prisma Access is a Secure Access Service Edge (SASE) platform that helps
organizations deliver consistent security to their remote networks and mobile
users. It’s a generational step forward in cloud security, using a cloud-delivered
architecture to connect all users to all applications. All of an organization's
users, whether at headquarters, in branch offices, or on the road, connect to
Prisma Access to safely use cloud and data center applications, as well as the
internet. Prisma Access consistently inspects all traffic across all ports and
provides bidirectional software-defined wide-area networking (SD-WAN) to enable
branch-to-branch and branch-to-headquarters traffic.
Prisma SaaS
Prisma SaaS functions as a multimode cloud access security broker (CASB), offering
inline and API-based protection working together to minimize the range of cloud
risks that can lead to breaches. With a fully cloud-delivered approach to CASB,
organizations can secure their SaaS applications through the use of inline
protections to safeguard inline traffic with deep application visibility,
segmentation, secure access, and threat prevention, as well as API-based
protections to connect directly to SaaS applications for data classification, data
loss prevention, and threat detection.
Click the tabs for more information about the core components of Cortex.
Cortex XDR
Cortex XSOAR
Cortex Data Lake
AutoFocus
Cortex XDR breaks the silos of traditional detection and response by natively
integrating network, endpoint, and cloud data to stop sophisticated attacks. Taking
advantage of machine learning and AI models across all data sources, it identifies
unknown and highly evasive threats from managed and unmanaged devices.
Course Summary
Please ensure all knowledge check questions have been answered in order for this
course to be marked complete.
Now that you have completed this course, you should be able to:
3
of
4
Cybercrime and Security Threats
Knowledge Check
Introduction
Virtualization, Containers, and Micro-VMs
Serverless Technology
Knowledge Check
Close
Virtualization, Containers,
and Micro-VMs
This lesson describes how cloud native technologies are based on the concepts of
virtualization. It also describes containers and micro-VMs.
On one end are traditional VMs operated as stateful entities, as we’ve done for
over a decade now. On the other are completely stateless, serverless apps that are
effectively just bundles of app code without any packaged accompanying operating
system (OS) dependencies.
Hypervisor
Native
Hosted
Virtualization
Virtualization is the foundation of cloud computing. You can use virtualization to
create multiple virtual machines to run on one physical host computer.
You can think of virtual machines as separate computers running various operating
systems on a physical host computer. Virtual machines and their associated
operating systems often are referred to as “virtual guest operating systems.” These
virtual guest operating systems all share the physical compute resources:
processors, dynamic memory (RAM), and permanent storage media of a physical host
machine.
Hypervisor
Hypervisor software allows multiple, virtual guest operating systems to run
concurrently on a single physical host computer. The hypervisor functions between
the computer operating system and the hardware kernel.
Click the images for more information about the two types of hypervisors.
Security Considerations
Virtualization is an important technology used in data centers and cloud computing
to optimize resources. Click each tab for more information about important security
considerations associated with virtualization.
Dormant VMs
Hypervisor Vulnerabilities
Intra-VM Communications
VM Sprawl
In many data center and cloud environments, inactive VMs are routinely (often
automatically) shut down when they are not in use. VMs that are shut down for
extended periods of time (weeks or months) may be inadvertently missed when anti-
malware updates and security patches are applied.
Containers
A container is a package of software that allows applications to run independently
within a host operating system.
Elapsed time0:00/Total2:34
Container Orchestration
Kubernetes is an open-source orchestration platform that provides an application
programming interface (API) that enables developers to define container
infrastructure in a declarative fashion, that is, infrastructure as code (IaC).
Click the tabs for more information about application development using containers
and microservices.
Kubernetes
Microservices
Containers as a Service
As containers grew in popularity and use diversified, orchestrators such as
Kubernetes (and its derivatives such as OpenShift), Mesos, and Docker Swarm became
increasingly important to deploy and operate containers at scale. Containers-as-a-
service (CaaS) platforms manage the underlying compute, storage, and network
hardware by default and, although assembled from many more generic components, are
highly optimized for container workloads. Click the tabs for more information about
why orchestrators such as Kubernetes (and its derivatives such as OpenShift),
Mesos, and Docker Swarm are difficult to operate at scale.
Hypervisor
In the virtualized deployment, there is hardware, an operating system, a hypervisor
that abstracts each virtual machine from the base OS, and (guest) virtual machines
that have full operating systems installed in them with their respective libraries
and applications.
Docker Container
Containers allow Dev teams to package apps and services in a standard and simple
way. Containers can run anywhere and be moved easily. Docker containers are the
most common. Docker is a tool used by developers to package together dependencies
into a single container (or image). This means that in order to use your
integration, you are not required to "pip install" all of the required packages.
They are part of a container that "docks" to the server and contains all the
libraries you need. Pip and conda are the two most popular ways to install and
manage python packages on containers.
Micro-VMs
Micro-VMs are scaled-down, lightweight virtual machines that run on hypervisor
software. Micro-VMs contain only the Linux operating system kernel features
necessary to run a container.
Click the down arrows for more information about the importance of micro-VMs and
what they provide.
Why Micro-VMs?
2
of
4
Introduction
Serverless Technology
Introduction
Virtualization, Containers, and Micro-VMs
Serverless Technology
Knowledge Check
Close
Cloud Security Fundamentals
Serverless
Technology
This lesson describes serverless computing and why it is a growing segment of cloud
computing.
Important Terminology
Let's review some important terminology that will be used in this lesson.
Hypervisor
Native
Hosted
The image below shows each responsibility of the application owner and the FaaS
provider.
App Package
In serverless apps, the developer only uploads the app package itself, without a
full container image or any OS components. The platform dynamically packages it
into an image, runs the image in a container, and (if needed) instantiates the
underlying host OS and VM as well as the hardware required to run them. In a
serverless model, users make the most dramatic trade-offs of compatibility and
control for the simplest, most efficient deployment and management experience.
Serverless Environment
Examples of serverless environments include Amazon Lambda and Azure Functions.
Arguably, many platform-as-a-service (PaaS) offerings, such as Pivotal Cloud
Foundry, are also effectively serverless even if they have not historically been
marketed as such. While on the surface, serverless may appear to lack the
container-specific, cloud-native attribute, containers are extensively used in the
underlying implementations, even if those implementations are not exposed to end
users directly.
Serverless functions consume data from a wide range of event sources, such as
HyperText Transfer Protocol (HTTP) application program interfaces (APIs), message
queues, cloud storage, Internet of Things (IoT) device communications, and so
forth. This diversity increases the potential attack surface dramatically,
especially when messages use protocols and complex message structures. Many of
these messages cannot be inspected by standard application-layer protections, such
as web application firewalls (WAFs).
Since organizations that use serverless architectures do not have access to the
physical (or virtual) server or its operating system, they cannot deploy
traditional security layers, such as endpoint protection, host-based intrusion
prevention, WAFs, and so forth. Additionally, existing detection logic and rules
have yet to be “translated” to support serverless environments.
3
of
4
Virtualization, Containers, and Micro-VMs
Knowledge Check
Introduction
Cloud Computing Models
and Responsibilities
The Hybrid Cloud
Knowledge Check
Close
This lesson provides an overview of key cloud computing concepts including the
primary cloud models, traditional versus cloud solutions, the concept of shared
responsibility and the overall benefits of moving to cloud computing.
Different organizations (or customers or business units) can control (and monitor)
a separate firewall instance so that they have control over their own traffic
without interfering with the traffic or policies of another firewall instance on
the same physical firewall.
Scalability
Scalability
Reduced Expenses
Reduced Capital and Operational Expenses
Virtual systems eliminate the need to have multiple physical firewalls at one
location because virtual systems co-exist on one firewall. By not having to
purchase multiple firewalls, an organization can save on the hardware expense,
electric bills, and rack space, and can reduce maintenance and management expenses
By assigning a virtual system as a User-ID hub, you can share the IP-address-to-
username mappings across virtual systems to leverage the full User-ID capacity of
the firewall and reduce operational complexity.
Important Terminology
Let's review the important terminology that will be used in this lesson.
Technical Debt
Distributed Workforce
On-Premises
Virtual Machine
App Software
Runtime
Shift-Left
Click each card for more information about each cloud computing service model.
Public Cloud
Public cloud is a cloud infrastructure that is open to use by the general public.
It’s owned, managed, and operated by a third party (or parties), and it exists on
the cloud provider’s premises. Examples of public CSPs are Amazon Web Services
(AWS), Google Cloud, and Microsoft Azure.
Community Cloud
Private Cloud
Hybrid Cloud
Dynamic Environment
In a dynamic environment, pools of computing resources are available to support
application workloads that can be accessed anywhere, anytime, from any device.
Security remains a significant challenge when you embrace this new dynamic, cloud-
computing fabric environment. Many of the principles that make cloud computing
attractive may go against network security best practices.
Network Security
Click the icons for more information about network security functionality and best
practices.
Cloud Security
Click the icons for more information about cloud security functionality and best
practices.
Click the tabs for more information about the important requirements to secure the
cloud.
Consistent Security
Zero Trust Principles
Centralized Management
Shift-Left
Identity Management
The same levels of application control and threat prevention should be used to
protect both your cloud computing environment and your physical network. First, you
need to be able to confirm the identity of your applications, validating their
identity and forcing them to use only their standard ports. You also need to be
able to block the use of rogue applications while simultaneously looking for and
blocking misconfigured applications. Finally, application-specific threat
prevention policies should be applied to block both known and unknown malware from
moving into and across your network and cloud environment.
Click each tab to see how to maximize your cloud environment's security.
2
of
4
Introduction
The Hybrid Cloud
Introduction
Cloud Computing Models
and Responsibilities
The Hybrid Cloud
Knowledge Check
Close
The Hybrid
Cloud
This lesson describes the hybrid cloud and how organizations are using it to
transition to public clouds from traditional networks.
Click each image for more information about the traditional data center and the
hybrid cloud.
Important Terminology
Let's read the important terminology that will be used in this lesson.
Contiguous Ports
Form Factor
Active/Passive Mode
Optimizes Resources
Reduces Costs
Maximizes Efficiency
The compute cluster is the building block for hosting the application
infrastructure and provides the necessary resources in terms of compute, storage,
networking, and security.
Click the icons for more information about the types of traffic and compute
clusters.
Phased Approach
The following approach to security in the evolving data center – from traditional
three-tier architectures to virtual data centers and to the cloud – aligns with
practical realities, such as the need to leverage existing best practices and
technology investments, and the likelihood that most organizations will transform
their data centers incrementally. This approach consists of four phases. Click each
icon for more information about each phase.
Course Summary
Now that you have completed this lesson, you should be able to:
Describe cloud computing models
Describe the hybrid cloud and how it differs from traditional data centers
3
of
4
Cloud Computing Models
and Responsibilities
Knowledge Check
Introduction
Application Development Platforms and Processes
Security Operations Responsibilities
Knowledge Check
Close
Application Development
Platforms and Processes
This lesson describes how cloud security is integrated into organizations and their
processes.
Benefits
Benefits
CI/CD is a new approach that offers a multitude of benefits, such as shorter time
to market and more efficient software delivery.
Challenges
Challenges
Limited prevention controls, poor visibility, and tools that lack automation yield
incomplete security analytics. These factors increase the risk of compromise and
the likelihood of successful breaches in cloud environments. Meanwhile, the demand
for an entirely new approach to security emerges.
These services are loosely coupled, which means they are not hardwired to any
infrastructure components, thus allowing developers to make changes frequently
without affecting other pieces of the application or other team members’ projects
across technology boundaries such as public, private, and multicloud deployments.
DevOps, SecOps, and DevSecOps overlap in some areas but there are distinct
differences in the roles they play in the CI/CD process.
DevOps
DevOps
DevOps teams are a collaboration between the development teams and IT operations.
Traditionally, IT operations did not understand the specific technical and process
requirements of the software development process. DevOps teams have a closer
relationship with software development teams in order to facilitate the release of
applications.
SecOps
SecOps
DevSecOps
DevSecOps
DevSecOps teams have a more specific focus on ensuring security than DevOps and
SecOps teams. They focus on applying application and infrastructure security
automation and processes across the CI/CD pipeline.
CNSP Functionality
CNSPs share context about infrastructure, PaaS, users, development platforms, data,
and application workloads across platform components to enhance security.
Click the cards for more information about the functions of CNSPs.
Compute Options
Just as cloud-native approaches have fundamentally changed how the cloud is used,
CNSPs are fundamentally restructuring how the cloud is secured.
Click the tabs for more information about how organizations traditionally embrace
compute options and which kind of coverage CNSPs can provide organizations today.
The pipeline is sometimes represented as a loop because teams can use feedback from
the other stages to plan their next set of code changes. This practice helps
achieve the DevOps goal of continuous improvement.
Note the iterative process by which development teams on the left loop create and
package the software and operations teams on the right loop in order to release and
then monitor it.
Collaborative Teams
Two separate teams (development and operations) operate in a communicative and
collaborative way.
Culture
DevOps refers to a culture where developers, testers, and operations personnel
cooperate throughout the entire software delivery lifecycle.
Strategy
Although there are tools that work well with a DevOps model or help promote DevOps
culture, DevOps is ultimately a strategy, not a tool.
Public cloud service providers have done a great job with the build, maintenance,
and updating of computing hardware, virtual machines, data storage, and databases
along with the minimum baseline security protection mechanisms. However, the
customer is ultimately responsible for providing security for the data, hosts,
containers, and serverless instances in the cloud. Customers should follow three
DevOps models and processes to better secure their data in the cloud.
Continuous Delivery
Continuous Deployment
1. Code Is Pushed
Developers push code to a repository such as GitHub and the repository is used to
securely store the code created by the developers. The GitHub repository is used by
more than 7,000 companies including Airbnb, Netflix, and Shopify.
Automated tools such as open source Jenkins detect the changes, pull the code from
the repository, and run the pipeline. By running the pipeline, Jenkins can
automatically build, test, and deploy code changes to the production environment.
DevSecOps takes the concept behind DevOps – the idea that developers and IT teams
should work together closely, instead of separately, throughout software delivery –
and extends it to include security with integrated and automated checks into the
full CI/CD pipeline. This takes care of the perception that security is an outside
force and allows developers to maintain their speed without compromising data
security.
2
of
4
Introduction
Security Operations Responsibilities
Introduction
Application Development Platforms and Processes
Security Operations Responsibilities
Knowledge Check
Close
Security Operations
Responsibilities
Cloud security teams plan, implement, analyze, and remediate security risks. This
lesson describes some of the areas where security teams focus on improving
security.
Alerts
Alerts are an important part of continually monitoring all of your cloud
environments to detect misconfigurations (such as exposed cloud storage instances),
advanced network threats (such as cryptojacking and data exfiltration), potentially
compromised accounts (such as stolen access keys), and vulnerable hosts. Prisma
Cloud correlates configuration data with user behavior and network traffic to
provide context around misconfigurations and threats in the form of actionable
alerts.
Alert Lifecycle
The following graphic shows the various statuses in the alert lifecycle. Click the
image to enlarge it.
Alert Rules
Alert rules generate alerts based on a policy violation by the resources in the
account groups. Alerts will only be generated if you set up an alert rule. Prisma
Cloud does include an out-of-the-box alert rule, so you may see alerts generated
after you add your cloud accounts.
Notifications and Integrations
In addition, Prisma Cloud provides out-of-box ability to Configure External
Integrations on Prisma Cloud with third-party technologies, such as SIEM platforms,
ticketing systems, messaging systems, and automation frameworks so that you can
continue using your existing operational, escalation, and notification tools.
Course Summary
Now that you have completed this course, you should be able to:
3
of
4
Application Development Platforms and Processes
Knowledge Check
Introduction
Cloud-Native Application Protection
Knowledge Check
Close
Cloud-Native
Application Protection
This lesson describes how cloud-native applications are protected by using a CNAPP
platform and what protections a CNAPP platform comprises.
Important Terminology
Let's read the important terminology that will be used in this lesson.
Distributed Cloud
Benefits of CNAPP Protection
CNAPPs provide a unified cloud security solution to help security teams scan,
identify, and remediate security vulnerabilities. Legacy cloud security systems
offered disparate security coverage leaving gaps and blind spots. Additionally,
they had high operational requirements and technical expertise.
Here are some of the core cloud security protections that a complete CNAPP solution
provides.
Compliance Requirements
Click the tabs for more information about each compliance requirement.
Real-Time Discovery
Config Governance
Access Governance
Compliance Auditing
Seamless UX
Real-time discovery and classification of resources and data across dynamic SaaS as
well as PaaS and IaaS environments.
Enterprises rely on a mix of VMs, Containers, and Serverless functions which can
all be delivered in various service form factors with various amounts of control.
Unique security requirements for each make consistent workload protection a
challenge. Click each item to learn about each type of cloud native application.
VMs
Containers
Applications that run on top of VMs or on an enterprise container platform and are
managed by any orchestrator.
Containers-as-
a-Service
Containers
Containers and PaaS applications that run on offerings such as AWS Fargate, Google
Cloud Run, Microsoft ACI, and Pivotal Application Service (now renamed to VMware
Tanzu Application Service).
Serverless
Cloud Code Security addresses the challenge that security teams have when trying to
keep pace with DevOps and infrastructure automation by embedding security
throughout the development lifecycle. In this way, developers can play a part in
securing applications and infrastructure before deployment.
CIEM Protection
Cloud infrastructure entitlement management (CIEM) is the process of managing
identities and privileges in cloud environments. The purpose of CIEM is to
understand which access entitlements exist across cloud and multicloud
environments, and then identify and mitigate risks resulting from entitlements that
grant a higher level of access than they should. CIEM solutions help companies
reduce their cloud attack surface and mitigate access risks posed by excessive
permissions.
Cloud
The cloud (and data centers) provide the trusted computing base for a Kubernetes
cluster. If the cluster is built on a foundation that is inherently vulnerable or
configured with poor security controls, then the other layers cannot be properly
secured.
Clusters
Containers
Code
The application code itself must be secured. Security best practices for securing
code include requiring TLS for access, limiting communication port ranges, scanning
third-party libraries for known security vulnerabilities, and performing static and
dynamic code analysis.
Course Summary
Now that you have completed this lesson, you should be able to:
2
of
3
Introduction
Knowledge Check
Introduction
Prisma Cloud Security
Knowledge Check
Close
Prisma Cloud
Security Features
Prisma Cloud provides CNAPP support for the full cloud application lifecycle under
the Code/Build/Deploy/Run (CBDR) phases.
Threat Detection
Prisma Cloud provides policies for a myriad of use cases such as detecting account
hijacking attempts, backdoor activity, network data exfiltration, unusual protocol,
and DDoS activity. After a threat is detected, an alert will be generated notifying
administrators of the issue on hand so that they can quickly remediate it.
Some of the anomaly policies provided by Prisma Cloud threat detection in CSPM are:
Navigate to the Investigate page. For UEBA anomaly policies, you can also see a
Trending View of all anomalous activities performed by the entity or user. Click
the image to enlarge it.
Data Security
The Data Security capabilities on Prisma Cloud enable you to discover and classify
data stored in objects and protect against accidental exposure, misuse, or sharing
of sensitive data.
Click the arrows for more information about different features that are included
with Prisma Cloud Data Security.
Prisma Cloud provides complete visibility into all objects, including contents by
region, owner, and exposure level. You can fine-tune data identifiers—such as
driver’s license, Social Security number, credit card number, or other patterns—to
identify and monitor sensitive content.
Data Governance
Prisma Cloud includes specific data policies to quickly determine your risk profile
based on data classification and exposure/file types. Enable or disable data
compliance assessment profiles—for example, Payment Card Industry Data Security
Standards (PCI DSS), General Data Protection Regulation (GDPR), System and
Organization Controls Type 2 (SOC 2), and Health Insurance Portability and
Accountability Act (HIPAA)—based on needs and generate audit-ready reports with a
single click.
Malware Detection
Prisma Cloud helps users identify and protect against known and unknown file-based
threats that have infiltrated objects, leveraging the WildFire malware prevention
service to flag any objects that contain malware.
Prisma Cloud automatically generates alerts for each object based on data
classification, data exposure, and file types. Analysts can take action on alerts
to quickly remediate exposure, tag individual DevOps teams for violations, and
delete any objects that contain malware.
The new Data Dashboard tab provides complete visibility into your objects storage.
The dashboard widgets below give you insight into how many storage buckets and
objects you have, what kind of data is stored in those objects, across which
regions, who owns what, and what is the exposure of the objects. This tab is
available under the Dashboard menu. Click the image to enlarge it.
Course Summary
Now that you have completed this course, you should be able to:
Describe how Prisma Cloud provides security protection for Code/Build, Deploy, and
Run phases
2
of
3
Introduction
Knowledge Check
Introduction
Day in the Life of a SecOps Analyst
Business Pillar
People Pillar
Processes Pillar
Interfaces Pillar
Visibility Pillar
Technology Pillar
Close
Erik is a SecOps analyst on the Security Operations team and it is his job to
triage alerts to determine if there is a security threat. Before Erik starts his
job, he will need to understand the general concepts of SecOps and the business
goals. Erik will need training and support from the people he interacts with on a
daily basis. While mitigating threats, Erik will need to know the processes to
follow, the teams he will be interacting with, and the technology he will be using
to gain visibility into the network.
Let's go on this journey with Erik to see how he makes his decisions and his plan
of action.
Security Landscape
SecOps are a necessary function for protecting our digital way of life, for
businesses and customers. Most organizations are responding with a fundamental
shift to their cyber security approach - moving away from a collection of point
solutions, ad-hoc entities, and processes toward a more deliberate structure and
the creation of dedicated SecOps to manage and monitor a unified security
architecture.
Risks
Problems
Target Objective
Deliverables
The risk is a catastrophic breach that leads to data exfiltration, substantial
financial loss, a severely tarnished reputation, loss of current and future
clients, and possible legal and regulatory issues coupled with customer
compensation.
An Overview of SecOps
Click the video to hear from Rishi Bhargava, former Vice President of Product
Strategy and the leader in SecOps automation, about the importance of SecOps.
Elapsed time0:00/Total0:00
Security Operations
SecOps - Leads the Charge
The SecOps (also known as Computer Emergency Response Teams, Computer Security
Incident Response Teams, etc.) is a team of security professionals that are
dedicated to monitoring and analyzing activity on networks, servers, endpoints,
databases, applications, websites, and other systems that connect to your network
either locally or from a remote location. The SecOps team's goal is to detect,
analyze, and respond to cybersecurity incidents using a combination of technology
solutions and a set of processes to help mitigate the incidents.
Click the video to watch how the elements of SecOps is divided into six pillars.
Elapsed time0:00/Total0:00
Click the tabs to learn about how these actions can help protect against security
issues.
Identify
Investigate
Mitigate
Continuously Improve
Identify an alert as potentially malicious and open an incident.
Security Orchestration
Security orchestration is a method of connecting disparate security technologies
through standardized and automatable workflows that enable security teams to
effectively carry out incident response and operations.
Terminology
Security orchestration uses the following terms to help define its processes.
Security Automation
Playbooks
Integration
Ingestion
The process of executing security tasks using machine-driven responses to help
ensure consistency in security issues
Threat Intelligence
Collects and correlates data from both internal and external sources to provide
information to determine malicious intent
Endpoint Security
Provides real-time protection for devices such as mobile phones, laptops, and
desktop systems connected to the enterprise network. Endpoint Security can detect,
alert, respond, and mitigate.
Network Security
Hardware and software components that provide protection for the enterprise network
infrastructure. The collection of network security tools plays an extremely
critical part of security with alerting and blocking malicious intent.
Improve the security posture of the business, its products, and services by
introducing security as a shared responsibility
Submit
Show Feedback
When Erik first arrives to work, which component or technology would he use to view
aggregated data about his network?
Network Security
Threat Intelligence
Endpoint Security
Submit
Show Feedback
Erik has identified the alert and opened an incident in the ticketing system. What
Security Operations function would Erik perform next?
Adjust and improve operations to stay current with changing and emerging threats
Submit
Show Feedback
2
of
8
Introduction
Business Pillar
Introduction
Day in the Life of a SecOps Analyst
Business Pillar
People Pillar
Processes Pillar
Interfaces Pillar
Visibility Pillar
Technology Pillar
Close
Business
Pillar
The Business pillar defines the purpose of the Security Operations team to the
business and how it will be managed. The Business pillar helps to provide Erik and
the rest of the SecOps team with answers to questions such as "Who do we need to
help protect the business?"; "How will we protect the business?"; "Where are we
going to do this from?"; and "How do we know if what we have in place is working
effectively?"
Both Erik and the SecOps team are responsible for protecting the business. The
reason for Security Operations, for all of the equipment, for everything SecOps
does is ultimately to service one main goal, protect the business. Without the
Business pillar, there would be no need for Erik or the SecOps team.
To understand the purpose of the team and the impact to the business, there are
several questions that must be answered.
Mission
Governance
Planning
The “Mission” statement is the fundamental root from which the organization grows
and is the road map that guides the organization on its course. This should include
the objectives of the Security Operations organization and the goals the
organization is expected to achieve for the business. It defines what an
organization is, why it exists, and its reason for being. It is imperative to
socialize the mission statement and get buy-in from executives, this provides clear
expectations and scope of what the Security Operations. The mission statement
should define what actions will be taken, how those actions will be executed, and
what the results are to the business.
Staffing
Staffing of security skills remains one of the biggest challenges of the security
industry, with additional challenges existing for organizations located outside of
major tech hubs. Organizations with these issues should consider in-sourcing
resources (analyst-as-a-service) to alleviate the strain of staffing.
You want to staff the appropriate level of knowledge for each role in the SecOps.
There should be diversification of skills within the security operations
organization such as malware analysis, network architecture, and threat
intelligence. Basic knowledge and skills should overlap among team members in case
there are departures for vacation, illness, or attrition.
Budget
The Budget is developed to strike a balance of what is truly needed. A business-
savvy budgeting resource can help the Security Operations organization navigate
CapEx spending vs. OpEx spending and the expectations of the business. Be aware
that government SecOps have additional considerations around the timing of
elections and possible party-switching, which could result in dramatic budget
shifts.
Click the arrows for the steps to consider when setting the budget.
Step 1
Obtain agreement regarding the mission of the Security Operations and the SecOps.
Facility
The facilities needed for your Security Operations team will depend on how you will
be delivering the service.
A physical SecOps may need separation from other parts of the business, including
the Network Operations Center (NOC). Although these two groups need to tightly
interface with each other, they may need separate spaces to adhere to need-to-know
principles and avoid specific legal issues. Where fusion centers are established,
additional training for the Network Operations staff is required to ensure
adherence to privacy principles.
Metrics
If time is spent gathering metrics that cannot drive change, then they are a waste
of time and can drive the wrong behavior. When determining good metrics for your
business, always keep in mind the mission of the SecOps and the value it provides
to the business. The business wants confidence that they can prevent attacks and
also that if/when a breach does occur then they are able to handle it quickly to
limit the impact.
Poor Metrics
The following are metrics that can drive the wrong behavior:
Good Metrics
Good metrics should provide insight into whether the business should have
confidence or not. There are two types of confidence to focus on: configuration
confidence and operational confidence.
Configuration Confidence
Configuration confidence is knowing that your technology is configured to prevent
an attack that can be remediated or be analyzed. Click each tab for details about
the questions that need to be answered.
How many changes are occurring outside of the change control policy?
Operational Confidence
Operational confidence is knowing that the right people and processes are in place
to handle a breach if/when it occurs. Click each tab for details on the questions
that need to be answered.
Reporting
Reporting is meant to give an account of what has been observed, heard, done, or
investigated. It is to quantify activity and demonstrate the value the Security
Operations team is providing to the business or client organizations.
Click the arrow for more information about the daily, weekly, and monthly reports.
Daily Reports
Daily reports should include open incidents with details centered on daily
activity.
Collaboration
A set of tools is required to facilitate communication and collaboration within and
around the Security Operations organization.
These tools can include features around ticketing, war room collaboration, shift
turnover, process documentation, and may contain the entirety of the IR
documentation for every event. They can also include communication features such as
email distribution lists, shared inboxes, instant messaging, and video conferencing
tools.
Collaboration tools are often incorporated into other tools and are at high risk of
feature duplication. The Security Operations team should define what the main
tool(s) used will be, which will be the single source of truth, and what
information will be captured. Access to these tools typically extends beyond the
Security Operations organization, especially in the case of war rooms, so access
control must be addressed by the chosen tools.
What are the three configuration and operational questions they would need to
answer? (Choose three.)
Show Answer
Show Feedback
What details should Erik's weekly reports include?
Open incidents and other daily activity that have been accomplished
Overall effectiveness of the SecOps functions, how long events are sitting in queue
before being triaged, and if staffing in the SecOps is appropriate
Security trends to initiate threat-hunting activities, open and closed cases, and
conclusions of tickets (malicious, benign, false-positive)
Show Answer
Show Feedback
What is the first step Erik should consider when setting the budget?
Define the processes needed to change the allocated budget and for emergency budget
relief
Show Answer
Show Feedback
3
of
8
Day in the Life of a SecOps Analyst
People Pillar
Introduction
Day in the Life of a SecOps Analyst
Business Pillar
People Pillar
Processes Pillar
Interfaces Pillar
Visibility Pillar
Technology Pillar
Close
Security Operations Fundamentals
People
Pillar
The People pillar defines who will be accomplishing the goals of the Security
Operations team and how they will be managed.
As a part of the People pillar, Erik received training necessary for him to be able
to triage the alerts in addition to the other processes and functions within the
SecOps. This training provides Erik with the skills necessary to become efficient
at detecting and prioritizing alerts. As Erik’s knowledge increases, he will have
opportunities to grow on the SecOps team. He will also have the skills to advance
in his career to other areas.
Employee Utilization
Employee Utilization
Training
Training
Career Path Progression
Career Path Progression
Tabletop Exercises
Tabletop Exercises
Employee Utilization
Methods should be developed to maximize the efficiency of a Security Operations
team specific to the existing staff.
Security Operations staff are prone to burnout due to console burn out and extreme
workloads. To avoid this, team members should be assigned different tasks
throughout the day. These tasks should be structured and may include:
• Event triage
• Incident response
• Project work
• Training
• Reporting
Training
Proper training of staff will create consistency within an organization.
Consistency drives effectiveness and reduces risk.
Tabletop Exercises
Tabletop exercises are planned events where the stakeholders for the SecOps or the
entire security organization walk through a security event to test the processes
and reactions to the type of incident. They can include simulated network activity
or social engineering.
Which three methods can the SecOps team employ to mitigate employee burnout?
(Choose three.)
Create on-the-job training only, because it's more helpful than reading
documentation
Train at least two employees on the same tasks so there is no single point of
failure
Submit
Show Feedback
Which three types of training content can Erik teach to create consistency within
an organization? (Choose three.)
Show Answer
Show Feedback
Providing education opportunities to SecOps analysts can help Erik's staff grow
into different career paths. What advanced roles are available for the SecOps
analysts?
SecOps Manager
Threat Hunter
Submit
Show Feedback
4
of
8
Business Pillar
Processes Pillar
Introduction
Day in the Life of a SecOps Analyst
Business Pillar
People Pillar
Processes Pillar
Interfaces Pillar
Visibility Pillar
Technology Pillar
Close
Processes
Pillar
The Processes pillar defines the step-by-step instructions and functions that are
to be carried out by the SecOps team for the necessary security policies to be
followed. Processes are a series of actions or steps taken to achieve an end goal.
As part of the Processes pillar, Erik will need to determine the other teams that
should be involved, the scope of the work for each team, and what each team will be
responsible for.
While monitoring the ticketing queue, Erik notices a new set of alerts that has
been sent to the SecOps team by one of the network devices. Based on the alert
messages, Erik needs to determine whether the alert message is a security incident,
so he opens an incident ticket. Erik starts by doing his initial research in the
log files on the network device to determine if the threat is real. After reviewing
the log files, Erik determines that the alert is a real threat. Based on the
Severity Triangle, Erik has determined that the severity level for this alert is
currently High.
Elapsed time0:00/Total5:13
The four main core functions of Security Operations as they related to processes
are identification, investigation, mitigation, and continuous improvement. Click
the tabs to learn about the elements in each core function.
Identification
Investigation
Mitigation
Continuous Improvement
Identify an alert as potentially malicious and open an incident. Elements under the
Identification core are:
Alerting
Initial Research
Severity Triage
Escalation Process
Click the tabs to learn how each element is used to identify potentially malicious
alerts.
Alerting
Initial Research
Severity Triage
Escalation Process
Detailed Analysis
Detailed analysis is an investigation into an incident to determine whether it is
truly malicious, to identify the scope of the attack, and to document the observed
impact.
Click the arrows for more information about the benefits of detailed analyses.
Gather Relevant Information
The detailed analysis procedure closes any remaining gaps that were left after the
initial research. Also, affected IT assets are identified and business services are
conducted. The available containment measures should be evaluated to determine
whether they were effective at mitigating the threat and produced the intended or
desired results.
Click the tabs to learn how each element is tied into the mitigation process.
Breach Response
Mitigation
Mitigation Scenarios
Interface Agreements
Change Control
A true breach requires a plan separate from standard mitigation that defines how to
effectively respond during a critical severity incident. The first piece of this
plan is to identify the cross-functional stakeholders, including corporate
communications, legal teams, and third parties as appropriate. Then assign a
timeline of when each stakeholder should become involved and how they will be
initially notified. Define the details of the information to be collected and
shared by the Security Operations team and the SecOps commander responsible for
providing the information to the stakeholders. Training and policies should be
created to prevent leaks of the breach details beyond the breach response team.
Breach response plans should be periodically tested, typically a few times per
year, and at least once without the security team having prior knowledge of the
test.
Click the tabs to learn how each element is an important factor for you to ensure
that you keep up with new technologies, tactics, and threats.
Tuning
Process Improvement
Capability Improvement
Quality Review
What could Erik and the team do if they wanted to reclassify the severity level of
the attack?
The team can reclassify the severity to 3 - Medium because the team is already
working on mitigating the issue.
The team can reclassify the attack as a Severity 0 to indicate an ongoing breach
where the attacker is attempting to exfiltrate, encrypt, or corrupt data.
The team can reclassify the severity to 5 - Informational, because the attack has
already been identified.
Submit
Show Feedback
What are three relevant information that Erik and the SecOps team's detailed
analysis investigation can gather? (Choose three.)
How the alert should be triaged
Show Answer
Show Feedback
What parameter can Erik and the SecOps team use that allows for the immediate
containment or prevention of a security incident without further approvals?
Submit
Show Feedback
5
of
8
People Pillar
Interfaces Pillar
Introduction
Day in the Life of a SecOps Analyst
Business Pillar
People Pillar
Processes Pillar
Interfaces Pillar
Visibility Pillar
Technology Pillar
Close
Interfaces
Pillar
Security operations is not a silo and needs to work with many other functions or
teams. Each interaction with another team is described as an interface. The
Interfaces pillar defines which functions need to take place to help achieve the
stated goals, and how the SecOps will interface with other teams within the
organization by identifying the scope of each team’s responsibilities and the
separation of each team’s duties.
As Erik is investigating the alert generated by the network device, he partners
with the Threat Intelligence Team to identify the potential risks this threat may
pose to the organization. Erik also interfaces with the Help Desk, Network Security
Team, and Endpoint Security Teams to determine the extent the threat has
infiltrated the network.
Click the tabs to learn about the function's or team's goals and motivations.
Elements 1
Elements 2
Elements 3
Elements 4
Elements 5
Elements 6
Help Desk - Close tickets quickly
Enterprise Architecture
The enterprise architecture team is responsible for understanding, developing, and
maintaining both the physical and virtual network designs to meet the business
requirements. The team ensures that security is implemented in the design phase and
not added as an afterthought. It also creates and maintains the architecture
flowcharts and diagrams. The goal of the enterprise architecture team is to balance
and meet the needs of both security and the business.
Business Liaison
A growing trend is for security organizations to hire business liaisons. This role
is to tie in to the different aspects of the business and help identify and explain
the impact of security. This includes keeping up-to-date with new product launches
and development schedules, onboarding new branch offices, and handling mergers and
acquisitions where legacy networks and applications need to be brought in to the
main security program. This role can also be responsible for partner, vendor, and
team interface management.
Help Desk
Information Technology Operations
DevOps
Operational Technology Team
The help desk provides end-user support for corporate IT assets. The Security
Operations team frequently open tickets with this team to reimage machines, request
system patching, or reject assets joining the network without the proper OS and app
version levels. The help desk organization should interface often with the
vulnerability management team for tasks such as patches, outdated operating
systems, accepted new operating systems, and new supported platforms. Interaction
with the vulnerability management team can result in the development of automated
tasks. A closed-loop process between the teams should exist to ensure follow-
through on IT requests.
SecOps Engineering
The SecOps engineering team is responsible for the implementation and ongoing
maintenance of the Security Operation team’s tools, including the SIEM and analysis
tools.
The responsibilities of the team must be clearly defined. SLAs with the team should
be defined to reduce potential friction between teams and to establish a clear
communication plan. See the two questions you should ask.
The endpoint security team must interface with the business to define which
endpoint technologies and operating systems will be allowed and to address security
concerns about them. The practice of interfacing directly with the SecOps is also
fast becoming standard because the endpoint telemetry collected from EDR is a
beneficial source of information for security alert triage and incident
investigation.
Threat Hunting
Hunting allows you to dig into the data to find situations that the machines and
automation may have missed. Threat hunting can be structured or unstructured.
Structured hunts begin with a single piece of intelligence. Then a hypothesis is
formed, and then the hunt to find the threat in the network begins. Formalized
structured hunts tend to be more useful to an organization than unstructured
efforts.
Content Engineering
The content engineer and the Security Operations team need to be tightly interfaced
and feedback needs to continuously flow. An interface agreement between the teams
needs to be created to identify how often content updates will be made, how they
will be vetted, and the feedback process. It should identify how the Security
Operations team and threat hunting team make requests for new alerts or
modifications to existing alerts. Properly configured alerts will allow the
Security Operations team to focus on important alerts that require further
investigation.
Security Automation
Automation helps ensure consistency through machine-driven responses to security
issues. A security automation function will own and maintain these automation
tools.
Telemetry
Forensics
The following are the details about the types of data that are collected.
Alert
Alert
Event
Event
Log
Log
Telemetry
Telemetry
Forensic (Raw)
Forensic (Raw)
Threat Intelligence Team; Red & Purple Teams
Threat intelligence function identifies potential risks to the organization that
was not observed in the network. Red and purple teams provide penetration testing
to simulate threats to the organization and provide feedback for improvements to
the Security Operations organization.
The threat intelligence team uses real-time information feeds from human and
automated sources about the background, details, specifics, and consequences of
present and future cyber risks, threats, vulnerabilities, and attacks. They are
responsible for validating threats and then working with the Security Operations
team to provide IoCs for the analysts and to update controls. The Threat
Intelligence Team delivers threat landscape reports at agreed-upon intervals to
security teams that are responsible for updating the security stack based on their
findings.
The red team simulates advanced persistent threats (APTs) and will attempt to hide
and slow-play their attacks to avoid detection by SecOps analysts. Purple teams
work with both the red and SecOps teams to help improve operations. They provide
information to the red team about gaps in an analyst’s focus areas and guide the
SecOps team toward approaches to identify red team efforts. Red and purple team
exercises should have an allotted time limit, and the results should be given as
feedback to the SecOps to improve capabilities, add processes and procedures, and
add controls before an actual APT gains hold of the network.
The SecOps and vulnerability management teams need an interface to define the
visibility and access required by the Security Operations team and to update each
other about new observations such as possible malware or newly announced
vulnerabilities. After a new vulnerability is announced, the vulnerability
management team will work with the Security Operations team to implement controls
to prevent attacks while the patching process is executed. The Security Operations
team needs to stay updated about these new controls so that it can properly address
any alerts that reach the SecOps.
Which team can Erik turn to for assistance for operational changes to cloud
technology?
DevOps Team
Show Answer
Show Feedback
Activity gathered by Erik and the SecOps team electronically and in real-time from
a given source is called?
Telemetry
Log
Forensic (raw)
Alert
Submit
Show Feedback
Erik's SecOps team is divided into groups with different functions. Which three
teams are responsible for the development, implementation, and maintenance of
security policies?
Endpoint Security, Network Security, and Cloud Security
Submit
Show Feedback
6
of
8
Processes Pillar
Visibility Pillar
Introduction
Day in the Life of a SecOps Analyst
Business Pillar
People Pillar
Processes Pillar
Interfaces Pillar
Visibility Pillar
Technology Pillar
Close
Visibility
Pillar
The Visibility pillar enables the SecOps team to use tools and technology to
capture network traffic, limit access to certain URL’s determine which applications
are being used by end users, and to detect and prevent the accidental or malicious
release of proprietary or sensitive information.
Before Erik can provide a detailed analysis of the threat, he will need to gather
all of the necessary information to make a well-informed decision. Network
visibility is needed for Erik to gather information about the network’s status, the
traffic passing through the network, and the conditions on which traffic is allowed
to pass through. Without network visibility, Erik may miss important data that
could lead to a real threat being treated as a false positive or missed altogether.
The better visibility Erik has into every aspect of the company’s network, the
better he and the SecOps team can make an informed decision.
Click each tab to learn about the two elements that capture data.
Cloud Computing
Cloud computing delivers services or applications, on-demand, to achieve increased
scalability, transparency, security, monitoring, and management. In cloud
computing, services are delivered using either a private, public, or hybrid cloud.
Log collection will be most heavily used by the SecOps. Log collection provides
both in-depth forensic data and correlated event data to the SecOps to ensure that
security analysts can analyze incidents without becoming overwhelmed with noise.
The visibility required from these logs should be defined based on what the SecOps
team requires for proper investigation and on the access level that analysts will
have. The SecOps also needs to understand which types of alerts will be generated
by the cloud security capabilities. Those alerts should be worked into the incident
response plan.
Application Monitoring
By monitoring applications, the SecOps team can gain additional context about
specific applications that were used when an event was triggered. It goes beyond
port identification and recognizes the application used, which can lead credence to
proving an IoC was enacted or that the event triggered was a false positive.
The controls for DLP are often defined by GRC and managed by the network, endpoint,
and cloud security teams. A DLP system helps prevent data exfiltration and makes
the notification of attempts to send proprietary or sensitive information to the
SecOps. The SecOps then uses these notifications to look for a potential incident
or APT in the network.
Asset Management
Knowledge Management
Case Management
Application Monitoring
SSL Decryption
URL Filtering
Submit
Show Feedback
What tool or technology can Erik and the SecOps team use to detect and prevent
accidental or malicious release of proprietary or sensitive information?
Vulnerability management
URL Filtering
SSL Decryption
Submit
Show Feedback
What management method did the SecOps team utilize to collect information on
security incidents and their statuses?
Case management
Knowledge management
Asset management
Threat management
Submit
Show Feedback
7
of
8
Interfaces Pillar
Technology Pillar
Introduction
Day in the Life of a SecOps Analyst
Business Pillar
People Pillar
Processes Pillar
Interfaces Pillar
Visibility Pillar
Technology Pillar
Close
Technology
Pillar
The Technology pillar includes tools and technology to increase our capabilities to
prevent or greatly minimize attempts to infiltrate your network. In the context of
IT Security Operations, technology increases our capabilities to securely handle,
transport, present, and process information beyond what we can do manually. By
using technology, you amplify and extend your abilities to work with Information in
a secure manner.
The threat that Erik detected at the beginning of our scenario has been mitigated.
Erik now needs to work with SecOps team members and other teams to determine if the
current network technology can be used to automate a process or response to
automatically remediate this issue, or similar issues that may arise.
Technologies in SecOps
Click the video to hear Rishi explain how technology is shaping SecOps.
Elapsed time0:00/Total5:32
Technology also helps Security Operations to complete its core mission to identify,
investigate, and mitigate any attack made on a network. The mission to continuously
improve a network always drives the creation of better technologies.
Malware Sandbox
Endpoint Security
Endpoint security can include antivirus, EDR, analytics, and device control. The
Security Operations organization should define which data should be captured and
forwarded to the SIEM, or a central security log management function. The Security
Operations organization should understand how to identify data or system exposure
and should understand the mitigation options that are available. An interface
agreement should be created to determine how mitigation strategies will be
executed, how to request changes, and how the changes will be validated.
Behavioral Analytics
Behavioral analytics starts by inspecting endpoint, network, or user data to
automatically classify user and device types and then develops a baseline of
expected behavior. Behavioral analytics compares your current behavior to past
behavior and peer behavior to identify anomalous activity. Machine learning models
can improve accuracy by tailoring detection thresholds to each organization’s
environment.
Email Security
Web Application Firewall
Email security functionality supports properties for confidentiality, digital
signatures, sender authentication, and integrity control using cryptographic
controls. Information from email security systems should be provided to the SecOps
so it can investigate credential loss issues. A new feature of email security is
Domain Message Authentication Reporting and Conformance (DMARC), which is an email
authentication, policy, and reporting protocol that allow email senders and
receivers to work together to better secure emails and users.
Provide a Lure
A honey pot provides a lure, false lead, and shadow network to draw an attacker
into a controlled environment so that its actions can be studied.
Understand Techniques
Honey pots and deception can be used to help the SecOps understand the techniques
being used to exploit their defenses and thus can lead to new uses cases for alert
generation and updated controls.
A honey pot can also be used to decipher the threat landscape and the types of
campaigns that are targeting the organization and vulnerabilities in IT operations.
Before a SIEM can operate properly, connectors, and interfaces are required to
ensure translated flow from the system of interest to the SIEM data lake. The
Security Operations organization should define how ownership of an event will be
established and identify where an analyst will go to receive alerts. Sometimes an
analyst will use the SIEM, but in other cases an analyst will use a Security
Orchestration, Automation, and Response (SOAR) platform or ticketing system.
The selected SIEM approach should address any governance, risk, and compliance
requirements for the separation of data, privacy, and retention times. You can
limit data redundancy between the SIEM and feeder systems to help control costs and
use offline storage for long-term compliance needs.
SOAR systems allow for accelerated incident response through the execution of
standardized and automated playbooks that work upon inputs from security technology
and other data flows.
SOAR tools ingest aggregated alerts from detection sources such as SIEMs, network
security tools, and mailboxes before executing automated, process-driven playbooks
to respond to these alerts. The playbooks coordinate across technologies, security
teams, and external users for centralized data visibility and action.
Erik is concerned that some of these alerts may be critical and the team will need
help mitigating all of them. What should Erik do?
Deploy more SIEMs to collect and process the data before having a SecOps analyst
interpret the data and take appropriate action
Deploy additional endpoint security to protect servers, PCs, laptops, and tablets
so that alerts that are missed can be caught before exfiltrating data from the end
user
Deploy more firewalls to protect the network while SecOps analysts are interpreting
data and taking appropriate action
Submit
Show Feedback
What tool or technology can provide Erik and his SecOps team control for the
provisioning, maintenance, and operation of user identities?
Submit
Show Feedback
What security technology can Erik and the SecOps team use to identify anomalous
behavior indicative of attacks?
Behavioral analytics
Malware analytics
Submit
Show Feedback
Course Summary
Now that you've completed this course, you should be able to:
8
of
8
Visibility Pillar
Introduction
SOAR Technology
Knowledge Check
Close
SOAR
Technology
This lesson describes SOAR as a technology and how it is the automation of the
orchestration of all the elements of security operations.
SOAR Components
SOAR, or Security Orchestration, Automation, and Response, comprises of three
components: orchestration, automation, and response.
Orchestration
Orchestration
Automation
Automation
Response
Response
The Importance of SOAR
SOAR is intended for automated orchestration of the interaction amongst all the
elements and to provide coordination of these interactions. SOAR is critical to the
future of security operations.
Elapsed time0:00/Total0:00
SOAR Systems
SOAR systems allow for accelerated incident response through the execution of
standardized and automated playbooks that work upon inputs from security technology
and other data flows. Almost every organization that’s serious about security has a
Security Information and Event Management (SIEM) tool deployed in its environment.
SOAR
SOAR tools ingest aggregated alerts from detection sources (such as SIEMs, network
security tools, and mailboxes) before executing automatable, process-driven
playbooks to enrich and respond to these alerts. The playbooks coordinate across
technologies, security teams, and external users for centralized data visibility
and action. They help accelerate incident response times and increase analyst
productivity. Because playbooks standardize processes that create better
consistency, confidence in the operation of security operations capabilities
improves.
SIEM
SIEM’s collect disparate pieces of data and aggregate them into alerts. SIEM tools
and security orchestration tools have some feature similarities on the surface such
as automation of actions, product integrations, and correlation of data. SIEM tools
monitor various sources for machine data, correlate and aggregate them for context,
and provide real-time detection and monitoring of alerts generated by applications
and network hardware.
Security Technologies
SOAR tools integrate with the other security and non-security tools that an
organization uses to provide teams with a central console for coordinating and
activating all these tools. These integrations enable inter-product conversations,
data transfer, and remote execution of commands.
Workflows/Playbooks
Playbooks (runbooks) are task-based graphical workflows that help visualize
processes across security products. These playbooks can be automated, manual, or
both.
Click the tabs to learn about the building blocks that compose playbooks.
Playbook Trigger
Automated Playbook Task
Manual Playbook Tasks
Conditional Tasks
A playbook that is meant to automatically execute within a security orchestration
tool needs a trigger point. This trigger point can be any condition that, when met,
results in the start of the playbook. For example, whenever a phishing email is
ingested from a mailbox into the security orchestration tool, a ‘phishing response’
playbook can be triggered and begin its execution.
Manual Tasks
Task Approval
Even if some actions are prime candidates for automation, they might be too
sensitive to carry out without having a human verify their need and relevance. In
such cases, automated actions can have built-in task approvals. These actions will
wait for the relevant SecOps analyst’s approval before beginning execution.
End-User Engagement
A SOAR tool that has rich integrations with email tools can be used to engage
SecOps analysts and end users within the organization and thus improve overall
process flow.
2
of
3
Introduction
Knowledge Check
Introduction
Endpoint Detection and Response
Knowledge Check
Close
Endpoint Detection
and Response
This lesson describes how Cortex XDR protects endpoints and prevents attack
lifecycle with endpoint detection and response (EDR) in a single agent.
This evolution has forced organizations to deploy multiple products from different
vendors to protect against, detect, and respond to these threats. Cortex XDR brings
powerful endpoint protection together with endpoint detection and response (EDR) in
a single agent. You can replace all your traditional antivirus agents with one
lightweight agent that shields your endpoints from the most advanced adversaries by
understanding and blocking all elements of attacks.
The primary attack methods continue to exploit known and unknown application
vulnerabilities as well as deploying malicious files, including ransomware. These
attack methods can be used individually or in various combinations, but they are
fundamentally different in nature:
Exploits
Exploits
Malware
Malware
Ransomware
Ransomware
The Cortex XDR agent combines multiple methods of prevention at critical phases
within the attack lifecycle to halt the execution of malicious programs and stop
the exploitation of legitimate applications, regardless of an operating system, the
endpoint’s online or offline status, or whether the endpoint is connected to an
organization’s network or roaming.
Course Summary
Now that you've completed this course, you should be able to:
2
of
3
Introduction
Knowledge Check
Introduction
SOAR Technology
Knowledge Check
Close
SOAR
Technology
This lesson describes SOAR as a technology and how it is the automation of the
orchestration of all the elements of security operations.
SOAR Components
SOAR, or Security Orchestration, Automation, and Response, comprises of three
components: orchestration, automation, and response.
Orchestration
Orchestration
The first component of SOAR is Orchestration, which involves controlling and
activating the security product stack from a central location. SOAR products do
this through playbooks, which are task-based workflows that coordinate across
people, process, and technology.
Automation
Automation
The second component of SOAR is Automation, which is a logical subset of
orchestration. Within SOAR, automation involves finding repeatable tasks and
executing them at machine speed. SOAR products have automation scripts and
extensible product integrations to accomplish this.
Response
Response
The final component, Response, involves maintaining incident oversight as it goes
through the lifecycle. Within SOAR products, this includes case management,
collaboration during investigation, and analysis and reporting after incident
closure.
Elapsed time0:00/Total3:52
SOAR Systems
SOAR systems allow for accelerated incident response through the execution of
standardized and automated playbooks that work upon inputs from security technology
and other data flows. Almost every organization that’s serious about security has a
Security Information and Event Management (SIEM) tool deployed in its environment.
SOAR
SOAR tools ingest aggregated alerts from detection sources (such as SIEMs, network
security tools, and mailboxes) before executing automatable, process-driven
playbooks to enrich and respond to these alerts. The playbooks coordinate across
technologies, security teams, and external users for centralized data visibility
and action. They help accelerate incident response times and increase analyst
productivity. Because playbooks standardize processes that create better
consistency, confidence in the operation of security operations capabilities
improves.
SIEM
SIEM’s collect disparate pieces of data and aggregate them into alerts. SIEM tools
and security orchestration tools have some feature similarities on the surface such
as automation of actions, product integrations, and correlation of data. SIEM tools
monitor various sources for machine data, correlate and aggregate them for context,
and provide real-time detection and monitoring of alerts generated by applications
and network hardware.
Security Technologies
SOAR tools integrate with the other security and non-security tools that an
organization uses to provide teams with a central console for coordinating and
activating all these tools. These integrations enable inter-product conversations,
data transfer, and remote execution of commands.
Workflows/Playbooks
Playbooks (runbooks) are task-based graphical workflows that help visualize
processes across security products. These playbooks can be automated, manual, or
both.
Click the tabs to learn about the building blocks that compose playbooks.
Playbook Trigger
Automated Playbook Task
Manual Playbook Tasks
Conditional Tasks
A playbook that is meant to automatically execute within a security orchestration
tool needs a trigger point. This trigger point can be any condition that, when met,
results in the start of the playbook. For example, whenever a phishing email is
ingested from a mailbox into the security orchestration tool, a ‘phishing response’
playbook can be triggered and begin its execution.
Threat Hunting
Threat Hunting
SOAR threat hunting playbooks can be scheduled to run at pre-determined intervals.
They rapidly scan for threats in the environment after ingesting external threat
feeds or following up on existing incidents.
IoC Enrichment
IoC Enrichment
SOAR playbooks can automate enrichment of indicators by querying different threat
intelligence tools for context and presenting the results to analysts, thus saving
time that can be used toward proactive investigation.
Security Teams
SOAR playbooks enable security teams to effectively carry out incident response and
security operations.
Manual Tasks
Task Approval
Even if some actions are prime candidates for automation, they might be too
sensitive to carry out without having a human verify their need and relevance. In
such cases, automated actions can have built-in task approvals. These actions will
wait for the relevant SecOps analyst’s approval before beginning execution.
End-User Engagement
A SOAR tool that has rich integrations with email tools can be used to engage
SecOps analysts and end users within the organization and thus improve overall
process flow.
Course Summary
Now that you've completed this course, you should be able to:
2
of
3
Introduction
Knowledge Check