- Explain TLS handshake
- How does IPSec works?
- How would you secure containers?
- How would you secure kernel extensions/programs?
- What is CSRF and how would you prevent it?
- What was log4j vulnerability?
- Explain heartbleed
- What is SELinux and why would you use it?
- Explain Linux boot process? How would you secure the bootloader?
- What is SUID?
- What is TPM? What is Secure Enclave?
- What is a Zero Trust Network?
- What is Hashing? MACs vs HMACs
- Cookies vs Sessions? How would you secure a cookie.
- SAML vs OpenID
- U2F vs FIDO vs TOTP/HOTP
- What is Metasploit?
- Pick and explain a Threat Model(STRIDE)
- What are Honeypots? How would you create one?
- How would you harden a linux server?
- How would you harden a web/app server?
- How would you secure a network?
- How would you go about securing your wifi network?
- What is BGP and why is it important?
- OWASP top 10 https://owasp.org/www-project-top-ten/
Refer to https://github.com/gracenolan/Notes for more questions/topics