ROAD MAP CYBER SECURITY

Understand Threat ClassificationLearn how to find and use these logsUsing tools for unintended purposesUnderstand Common StandardsUnderstand FrameworksTools for Incident Response and DiscoveryUnderstand the Incident Response ProcessUnderstand the following TermsUnderstand Secure vs Unsecure ProtocolsBasics of CryptographySaltingHashingKey ExchangePKIPvt Key vs Pub KeyObfuscationFTP vs SFTPSSL vs TLSIPSECDNSSECLDAPSSRTPS/MIMEAuthentication MethodologiesUnderstand basics of VirtualizationInfraredBluetoothNFCCompTIA Linux+Find the detailed version of this roadmapalong with resources and other roadmapshttps://roadmap.shHackTheBoxTryHackMeVulnHubpicoCTFSANS Holiday Hack ChallengeBeginner CertificationsCTFs (Capture the Flag)CertificationsCompTIA A+CompTIA Network+CompTIA Security+Advanced CertificationsCISSPCISACISMGSECGPENGWAPTOSCPGIACCRESTCEHCCNACyber SecurityComputer Hardware ComponentsOS-Independent TroubleshootingConnection Types and their functionFundamental IT SkillsWiFiUnderstand Basics of Popular SuitesiCloudGoogle SuiteMicrosoft Office SuiteBasics of Computer NetworkingOperating SystemsWindowsInstallation and ConfigurationDifferent Versions and DifferencesUnderstand PermissionsInstalling Software and ApplicationsPerforming CRUD on FilesNavigating using GUI and CLITroubleshootingCommon CommandsLinuxMacOSLearn following for EachNetworking KnowledgeUnderstand the OSI modelCommon Ports and their UsesCommon Protocols and their UsesUnderstand the TerminologyVLANDMZARPVMNATIPDNSDHCPRouterSwitchVPNSSL and TLS BasicsIP TerminologyPublic vs Private IP Addresseslocalhostloopbacksubnet maskdefault gatewayCIDRUnderstand theseMANLANWANWLANFunction of EachDHCPDNSNTPIPAMTroubleshooting ToolsPacket SniffersPort ScannersProtocol AnalyzerspingtracertdignslookupipconfigiptablesnetstattcpdumparpnmaprouteBasics of SubnettingNetwork TopologiesStarMeshRingBusBasics of NAS and SANHypervisorVMGuestOSHostOSCommon Virtualization TechnologiesVMWareVirtualBoxesxiproxmoxUnderstand Common ProtocolsSSHFTPRDPSFTPHTTP / HTTPSSSL / TLSKerberosLDAPSSOCertificatesLocal AuthRADIUSSecurity Skills and KnowledgeAttack Types and DifferencesPhishing vs Vishing vs Whaling vs SmishingSpam vs SpimShoulder SurfingDumpster DivingTailgatingSocial EngineeringReconnaissanceImpersonationWatering Hole AttackDrive by AttackTypo SquattingBrute Force vs Password SprayZero DayLearn how Malware Operates and TypesWeb Based Attacks and OWASP 10Privilege escalation / User based AttacksUnderstand CIA TriadUnderstand HandshakesBasics of Threat Intel, OSINTFalse Negative / False PositiveTrue Negative / True PositiveBlue Team vs Red Team vs Purple TeamCyber Kill ChainOperating System HardeningMFA and 2FAAuthentication vs AuthorizationUnderstand Backups and ResiliencyRoles of Compliance and AuditorsUnderstand the Definition of RiskCore Concepts of Zero TrustBasics of IDS and IPSHoneypotsUnderstand the Concept of IsolationPerimiter vs DMZ vs SegmentationPenetration Testing Rules of EngagementBasics of Reverse EngineeringBasics of Vulnerability ManagementBasics and Concepts of Threat HuntingUnderstand Basics of ForensicsUnderstand Concept of RunbooksUnderstand Concept of Defense in DepthUnderstand Common Exploit FrameworksCommon Network Based AttacksDoS vs DDoSEvil TwinMITMDNS PoisoningARP PoisoningSpoofingDeauth AttackVLAN HoppingRogue Access PointWar-driving/dialingBuffer OverflowMemory LeakSQL InjectionXSSCSRFPass the HashReplay AttackDirectory TraversalAntivirusAntimalwareEDRDLPFirewall and Nextgen FirewallHIPSNIDSNIPSHost Based FirewallSandboxingACLWPA vs WPA2 vs WPA3 vs WEPEAP vs PEAPWPSPreparationIdentificationContainmentEradicationRecoveryLessons LearnednmaptracertnslookupdigcurlipconfighpingpingarpcatddheadtailgrepwiresharkwinhexmemdumpFTK ImagerautopsyATT&CKKill chainDiamond ModelISONISTRMFCISCSFUnderstandSIEMSOARCommon Distros for HackingParrotOSKali LinuxLOLBASEvent LogssyslogsnetflowPacket CapturesFirewall LogsUnderstand Hardening ConceptsMAC-basedNAC-basedPort BlockingGroup PolicyACLsSinkholesPatchingJump ServerEndpoint SecurityZero DayKnown vs UnknownAPTUnderstand AudienceStakeholdersHRLegalComplianceManagementUnderstand Common ToolsVirusTotalJoe Sandboxany.runurlvoidurlscanWHOISUnderstand Common Hacking ToolsCloud Skills and KnowledgeUnderstand Cloud ServicesSaaSPaaSIaaSCloud ModelsPrivatePublicHybridCommon Cloud EnvironmentsAWSGCPAzureCommon Cloud StorageS3DropboxBoxOneDriveGoogle DriveiCloudUnderstand concepts of security in the cloudUnderstand the basics and general flow of deploying in the cloudUnderstand the differences between cloud and on-premisesUnderstand the concept of infrastructure as codeUnderstand the concept of ServerlessUnderstand the concept of CDNProgramming Skills and Knowledge (Optional But Recommended)PythonBashPower ShellGoJavaScriptC++Keep Learning

Posting Komentar

0 Komentar