Skip to main Content

Exam Vouchers: Palo Alto Networks: Cyber Security Apprentice (PAN-F-CYAP-CVCH)

  • Price: Please call
  • Code: PAN-F-CYAP-CVCH

Please call

Description

Top

The Palo Alto Networks Certified Cybersecurity Apprentice exam is for individuals entering or transitioning to a career in cybersecurity. The exam is designed to provide those seeking an entry-level cybersecurity position or those with non-technical roles (e.g., marketing, sales, program management, general, administrative) the opportunity to demonstrate their networking and cybersecurity knowledge. It will validate a candidate’s foundational-level knowledge and understanding in the areas of cybersecurity concepts, network fundamentals, endpoint security, security operations, network security, and cloud security.

Further Information

Top

Target Audience

- Individuals who want to validate their foundational knowledge and understanding of cybersecurity concepts

- An emergent workforce that includes high school, college, and university students

- Individuals who want to transition into a cybersecurity career

- Technical and non-technical IT professionals

 

Duration: 90 minutes

Format: Multiple-choice questions

Objectives

Top

Basic knowledge of:

  • networking concepts, models, and protocols
  • endpoint security components, standards, and protection
  • cloud security concepts, models, and services
  • security operations concepts and functions
  • cybersecurity lifecycle, threats, identification methods, and prevention methods
  • current and emergent trends in information security (e.g., artificial intelligence, machine learning, and crowdsourced intelligence)

Content

Top

1. Cybersecurity 20%

  • 1.1 Differentiate between vulnerabilities and exploits
  • 1.2 Describe the stages of the cyber attack lifecycle
    • 1.2.1 Reconnaissance
    • 1.2.2 Weaponization and Delivery
    • 1.2.3 Exploitation
    • 1.2.4 Installation
    • 1.2.5 Command-and-control (C2)
    • 1.2.6 Actions on the Objective
  • 1.3 Describe common attack types
    • 1.3.1 Malware
    • 1.3.2 Spyware
    • 1.3.3 Trojan
    • 1.3.4 Ransomware
    • 1.3.5 Meddler-in-the-middle (MITM)
    • 1.3.6 DDoS
  • 1.4 Describe common threat detection systems
    • 1.4.1 Intrusion detection system (IDS)
    • 1.4.2 Host-based intrusion detection system (HIDS)
    • 1.4.3 Network-based intrusion detection system (NIDS)
  • 1.5 Describe threat prevention systems and practices
    • 1.5.1 End user awareness
    • 1.5.2 Security updates
    • 1.5.3 Antivirus
    • 1.5.4 Intrusion prevention system (IPS)
    • 1.5.5 Firewalls
  • 1.6 Identify the purpose of a demilitarized zone (DMZ)
  • 1.7 Identify the purpose of Zero Trust

2. Network Fundamentals 19%

  • 2.1 Differentiate between types of area networks
    • 2.1.1 WAN
    • 2.1.2 LAN
    • 2.1.3 SD-WAN
  • 2.2 Describe external (north-south) and internal (east-west) traffic flow patterns for environments
  • 2.3 Explain the function of a default gateway
  • 2.4 Explain the function of NAT
  • 2.5 Explain the function of DNS
  • 2.6 Explain the function of DHCP
  • 2.7 Differentiate between static routing protocols and dynamic routing protocols
  • 2.8 Differentiate between routed protocols and routing protocols
  • 2.9 Differentiate between TCP/IP models and OSI models
  • 2.10 Identify devices that operate in Layer 1 through Layer 4 of the OSI model

3. Network Security 17%

  • 3.1 Differentiate between network segmentation methods
    • 3.1.1 IP subnetting
    • 3.1.2 VLANs
    • 3.1.3 Zones
  • 3.2 Differentiate between stateful firewalls and next-generation firewalls (NGFWs)
  • 3.3 Explain the function of URL filtering
  • 3.4 Explain the function of a VPN
  • 3.5 Explain the function of a proxy
  • 3.6 Differentiate between tunneling protocols
    • 3.6.1 SSH
    • 3.6.2 TLS
    • 3.6.3 IKE
  • 3.7 Explain the function of data loss prevention (DLP)

4. Endpoint Security 15%

  • 4.1 Differentiate between internet of things (IoT) devices and endpoints
  • 4.2 Differentiate between endpoint security and network security
  • 4.3 Explain the objectives of endpoint security
  • 4.4 Identify endpoint security components
    • 4.4.1 Security updates
    • 4.4.2 Antivirus
    • 4.4.3 Host-based firewalls
  • 4.5 Differentiate between single-factor authentication and multi-factor authentication
  • 4.6 Describe identity and access management (IAM)

5. Cloud Security 14%

  • 5.1 Identify the four cloud-computing deployment models
  • 5.2 Describe common cloud service models
    • 5.2.1 Software as a service (SaaS)
    • 5.2.2 Platform as a service (PaaS)
    • 5.2.3 Infrastructure as a service (IaaS)
    • 5.2.4 Network as a service (NaaS)
  • 5.3 Describe the cloud shared responsibility model
  • 5.4 Identify the four Cs of cloud native security
    • 5.4.1 Cloud
    • 5.4.2 Clusters
    • 5.4.3 Containers
    • 5.4.4 Code
  • 5.5 Define common cloud terms
    • 5.5.1 Hosted
    • 5.5.2 Virtualization
    • 5.5.3 Virtual machine (VM)
    • 5.5.4 Container
    • 5.5.5 Orchestration
    • 5.5.6 API
  • 5.6 Describe the cloud native security platform (CNSP)
  • 5.7 Explain the function of continuous integration and continuous delivery / deployment (CI/CD)

6. Security Operations 15%

  • 6.1 Explain security operations functions
    • 6.1.1 Identify / Detect
    • 6.1.2 Investigate
    • 6.1.3 Mitigate
    • 6.1.4 Improve
  • 6.2 Describe the pillars of effective security operations
    • 6.2.1 Business
    • 6.2.2 People
    • 6.2.3 Interfaces
    • 6.2.4 Visibility
    • 6.2.5 Technology
    • 6.2.6 Processes
  • 6.3 Define common security operations terms
    • 6.3.1 Event
    • 6.3.2 Alert
    • 6.3.3 Security operations center (SOC)
    • 6.3.4 DevSecOps
    • 6.3.5 Incident response (IR) plan
    • 6.3.6 Disaster recovery plan
  • 6.4 Explain the concepts of false positive alerts and false negative alerts
  • 6.5 Explain the function of syslog
  • 6.6 Explain the following security operations technologies
    • 6.6.1 Security orchestration, automation, and response (SOAR)
    • 6.6.2 Security information and event management (SIEM)
  • 6.7 Describe AI as it relates to alert analysis

Pre-requisites

Top

None