Home
BELAJAR
_KATEGORI
__JARINGAN
__KEAMANAN
__PROGRAMING
_E-BOOK
_VIDEO TUTORIAL
_TOOL
Aktivitas
_Web
_VIDEO
BERI DUKUNGAN
Beranda
ROAD MAP CYBER SECURITY
ROAD MAP CYBER SECURITY
HAKTIVIST INDONESIA
Kamis, Desember 21, 2023
Understand Threat Classification
Learn how to find and use these logs
Using tools for unintended purposes
Understand Common Standards
Understand Frameworks
Tools for Incident Response and Discovery
Understand the Incident Response Process
Understand the following Terms
Understand Secure vs Unsecure Protocols
Basics of Cryptography
Salting
Hashing
Key Exchange
PKI
Pvt Key vs Pub Key
Obfuscation
FTP vs SFTP
SSL vs TLS
IPSEC
DNSSEC
LDAPS
SRTP
S/MIME
Authentication Methodologies
Understand basics of Virtualization
Infrared
Bluetooth
NFC
CompTIA Linux+
Find the detailed version of this roadmap
along with resources and other roadmaps
https://roadmap.sh
HackTheBox
TryHackMe
VulnHub
picoCTF
SANS Holiday Hack Challenge
Beginner Certifications
CTFs (Capture the Flag)
Certifications
CompTIA A+
CompTIA Network+
CompTIA Security+
Advanced Certifications
CISSP
CISA
CISM
GSEC
GPEN
GWAPT
OSCP
GIAC
CREST
CEH
CCNA
Cyber Security
Computer Hardware Components
OS-Independent Troubleshooting
Connection Types and their function
Fundamental IT Skills
WiFi
Understand Basics of Popular Suites
iCloud
Google Suite
Microsoft Office Suite
Basics of Computer Networking
Operating Systems
Windows
Installation and Configuration
Different Versions and Differences
Understand Permissions
Installing Software and Applications
Performing CRUD on Files
Navigating using GUI and CLI
Troubleshooting
Common Commands
Linux
MacOS
Learn following for Each
Networking Knowledge
Understand the OSI model
Common Ports and their Uses
Common Protocols and their Uses
Understand the Terminology
VLAN
DMZ
ARP
VM
NAT
IP
DNS
DHCP
Router
Switch
VPN
SSL and TLS Basics
IP Terminology
Public vs Private IP Addresses
localhost
loopback
subnet mask
default gateway
CIDR
Understand these
MAN
LAN
WAN
WLAN
Function of Each
DHCP
DNS
NTP
IPAM
Troubleshooting Tools
Packet Sniffers
Port Scanners
Protocol Analyzers
ping
tracert
dig
nslookup
ipconfig
iptables
netstat
tcpdump
arp
nmap
route
Basics of Subnetting
Network Topologies
Star
Mesh
Ring
Bus
Basics of NAS and SAN
Hypervisor
VM
GuestOS
HostOS
Common Virtualization Technologies
VMWare
VirtualBox
esxi
proxmox
Understand Common Protocols
SSH
FTP
RDP
SFTP
HTTP / HTTPS
SSL / TLS
Kerberos
LDAP
SSO
Certificates
Local Auth
RADIUS
Security Skills and Knowledge
Attack Types and Differences
Phishing vs Vishing vs Whaling vs Smishing
Spam vs Spim
Shoulder Surfing
Dumpster Diving
Tailgating
Social Engineering
Reconnaissance
Impersonation
Watering Hole Attack
Drive by Attack
Typo Squatting
Brute Force vs Password Spray
Zero Day
Learn how Malware Operates and Types
Web Based Attacks and OWASP 10
Privilege escalation / User based Attacks
Understand CIA Triad
Understand Handshakes
Basics of Threat Intel, OSINT
False Negative / False Positive
True Negative / True Positive
Blue Team vs Red Team vs Purple Team
Cyber Kill Chain
Operating System Hardening
MFA and 2FA
Authentication vs Authorization
Understand Backups and Resiliency
Roles of Compliance and Auditors
Understand the Definition of Risk
Core Concepts of Zero Trust
Basics of IDS and IPS
Honeypots
Understand the Concept of Isolation
Perimiter vs DMZ vs Segmentation
Penetration Testing Rules of Engagement
Basics of Reverse Engineering
Basics of Vulnerability Management
Basics and Concepts of Threat Hunting
Understand Basics of Forensics
Understand Concept of Runbooks
Understand Concept of Defense in Depth
Understand Common Exploit Frameworks
Common Network Based Attacks
DoS vs DDoS
Evil Twin
MITM
DNS Poisoning
ARP Poisoning
Spoofing
Deauth Attack
VLAN Hopping
Rogue Access Point
War-driving/dialing
Buffer Overflow
Memory Leak
SQL Injection
XSS
CSRF
Pass the Hash
Replay Attack
Directory Traversal
Antivirus
Antimalware
EDR
DLP
Firewall and Nextgen Firewall
HIPS
NIDS
NIPS
Host Based Firewall
Sandboxing
ACL
WPA vs WPA2 vs WPA3 vs WEP
EAP vs PEAP
WPS
Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned
nmap
tracert
nslookup
dig
curl
ipconfig
hping
ping
arp
cat
dd
head
tail
grep
wireshark
winhex
memdump
FTK Imager
autopsy
ATT&CK
Kill chain
Diamond Model
ISO
NIST
RMF
CIS
CSF
Understand
SIEM
SOAR
Common Distros for Hacking
ParrotOS
Kali Linux
LOLBAS
Event Logs
syslogs
netflow
Packet Captures
Firewall Logs
Understand Hardening Concepts
MAC-based
NAC-based
Port Blocking
Group Policy
ACLs
Sinkholes
Patching
Jump Server
Endpoint Security
Zero Day
Known vs Unknown
APT
Understand Audience
Stakeholders
HR
Legal
Compliance
Management
Understand Common Tools
VirusTotal
Joe Sandbox
any.run
urlvoid
urlscan
WHOIS
Understand Common Hacking Tools
Cloud Skills and Knowledge
Understand Cloud Services
SaaS
PaaS
IaaS
Cloud Models
Private
Public
Hybrid
Common Cloud Environments
AWS
GCP
Azure
Common Cloud Storage
S3
Dropbox
Box
OneDrive
Google Drive
iCloud
Understand concepts of security in the cloud
Understand the basics and general flow of deploying in the cloud
Understand the differences between cloud and on-premises
Understand the concept of infrastructure as code
Understand the concept of Serverless
Understand the concept of CDN
Programming Skills and Knowledge (Optional But Recommended)
Python
Bash
Power Shell
Go
JavaScript
C++
Keep Learning
Posting Komentar
0 Komentar
Sponsor
Social Plugin
Facebook
Popular Posts
tips Menghindari Produk Pro-Israel dan Mendukung Palestina
Senin, Desember 18, 2023
Subscribe Us
Categories
0 Komentar