From 0dd89305a068280b85102a20a13d979417dc0d1e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Andr=C3=A9=20Oliveira?= <53203742+andreluis-oliveira@users.noreply.github.com> Date: Fri, 9 Aug 2024 20:22:18 -0300 Subject: [PATCH] Add content to cybersecurity roadmap (#6417) * Update dns.md - Fix the YouTube video link error and update the video title. * Update understand-cia-triad.md * Update comptia-security.md - Fix all broken links. - Update Exam Details. - Add new links. - Remove outdated links. * Update comptia-network.md - Update Exam Details. - Preparation Resources. - New links. * Update dnssec.md - summarized content. - relevant links. * Update apt.md - New section - Added a new link * Update comptia-a.md - Updated Professor Messer's link - New links added * Apply suggestions from code review * Update attck.md - new content. - relevant links. * Update src/data/roadmaps/cyber-security/content/attck@auR7fNyd77W2UA-PjXeJS.md * Update linux.md, comptia-linux.md and understand-the-osi-model.md Update linux.md - New Links - Remove Google Analytics parameters from link Update comptia-linux.md - Links updated Update understand-the-osi-model.md - New link * Update cissp.md - new resources links * Update src/data/roadmaps/cyber-security/content/cissp@BqvijNoRzSGYLCMP-6hhr.md * update basics-of-ids-and-ips.md - new links * update endpoint-security.md - new links * update edr.md - new text and links. update ssl-and-tls-basics.md - new links update ssl--tls.md - new links update dropbox.md - official link --------- Co-authored-by: dsh Co-authored-by: Kamran Ahmed --- .../content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md | 5 +++++ .../content/dropbox@9OastXVfiG1YRMm68ecnn.md | 2 ++ .../cyber-security/content/edr@QvHWrmMzO8IvNQ234E_wf.md | 7 +++++++ .../content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md | 6 ++++++ .../content/ssl--tls@LKK1A5-xawA7yCIAWHS8P.md | 4 ++++ .../content/ssl-and-tls-basics@dJ0NUsODFhk52W2zZxoPh.md | 4 ++++ 6 files changed, 28 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md b/src/data/roadmaps/cyber-security/content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md index 7763d01eb..a07f21b0a 100644 --- a/src/data/roadmaps/cyber-security/content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md +++ b/src/data/roadmaps/cyber-security/content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md @@ -30,3 +30,8 @@ There are two types of IPS: - Regularly updating and configuring IDS/IPS is necessary to continually defend against evolving threats. By understanding the basics of IDS and IPS, you can better evaluate your security needs and take the right steps to protect your network and hosts from potential intruders. + +Learn more from the following resources: + +- [@video@Intrusion Prevention System (IPS)](https://www.youtube.com/watch?v=7QuYupuic3Q) +- [@article@What is an Intrusion Prevention System?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips) diff --git a/src/data/roadmaps/cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md b/src/data/roadmaps/cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md index c3c26d20c..0555fa478 100644 --- a/src/data/roadmaps/cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md +++ b/src/data/roadmaps/cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md @@ -38,3 +38,5 @@ There are a few downsides to using Dropbox as your cloud storage solution: ## Conclusion Dropbox is a simple and user-friendly cloud storage service that offers seamless integration with various platforms and efficient file sharing options. While its free plan may be limited compared to other alternatives, the ease of use and robust feature set make it a popular choice for both personal and professional use. + +- [@official@Dropbox](https://www.dropbox.com/) diff --git a/src/data/roadmaps/cyber-security/content/edr@QvHWrmMzO8IvNQ234E_wf.md b/src/data/roadmaps/cyber-security/content/edr@QvHWrmMzO8IvNQ234E_wf.md index e69de29bb..6a12cdef3 100644 --- a/src/data/roadmaps/cyber-security/content/edr@QvHWrmMzO8IvNQ234E_wf.md +++ b/src/data/roadmaps/cyber-security/content/edr@QvHWrmMzO8IvNQ234E_wf.md @@ -0,0 +1,7 @@ +# EDR + +Endpoint Detection and Response (EDR) is a cybersecurity technology that provides continuous monitoring and response to threats at the endpoint level. It is designed to detect, investigate, and mitigate suspicious activities on endpoints such as laptops, desktops, and mobile devices. EDR solutions log and analyze behaviors on these devices to identify potential threats, such as malware or ransomware, that have bypassed traditional security measures like antivirus software. This technology equips security teams with the tools to quickly respond to and contain threats, minimizing the risk of a security breach spreading across the network. EDR systems are an essential component of modern cybersecurity strategies, offering advanced protection by utilizing real-time analytics, AI-driven automation, and comprehensive data recording. + +Learn more from the following resources: + +- [@video@What is Endpoint Detection and Response (EDR)? - IBM](https://www.youtube.com/watch?v=55GaIolVVqI) diff --git a/src/data/roadmaps/cyber-security/content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md b/src/data/roadmaps/cyber-security/content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md index aa1e30c74..9cfeeb21d 100644 --- a/src/data/roadmaps/cyber-security/content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md +++ b/src/data/roadmaps/cyber-security/content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md @@ -25,3 +25,9 @@ To effectively secure your endpoints, consider implementing the following measur - **User Training**: Educate users about the importance of endpoint security and the best practices for maintaining it. This includes topics like creating strong passwords, avoiding phishing scams, and following safe browsing practices. By taking a comprehensive approach to endpoint security, you can protect your organization's network and sensitive data from the growing threat of cyberattacks. + +Learn more from the following resources: + +- [@video@Endpoint Security](https://youtu.be/5d7PCDm_MXs?si=RX3sAdNPLG0tJOaR&t=11) +- [@course@Manage endpoint security - Microsoft Learn](https://learn.microsoft.com/en-us/training/paths/manage-endpoint-security/) + diff --git a/src/data/roadmaps/cyber-security/content/ssl--tls@LKK1A5-xawA7yCIAWHS8P.md b/src/data/roadmaps/cyber-security/content/ssl--tls@LKK1A5-xawA7yCIAWHS8P.md index 320d33b0e..b160f8f22 100644 --- a/src/data/roadmaps/cyber-security/content/ssl--tls@LKK1A5-xawA7yCIAWHS8P.md +++ b/src/data/roadmaps/cyber-security/content/ssl--tls@LKK1A5-xawA7yCIAWHS8P.md @@ -31,3 +31,7 @@ Here are the key steps in setting up an SSL/TLS connection: - **Authentication:** SSL/TLS uses digital certificates to authenticate the server and sometimes the client. This helps to ensure that the parties involved in the communication are who they claim to be. - **Data integrity:** SSL/TLS includes mechanisms to confirm that the data received has not been tampered with during transmission, maintaining the integrity of the information being sent. + +Learn more from the following resources: + +- [@video@SSL, TLS, HTTPS Explained](https://www.youtube.com/watch?v=j9QmMEWmcfo) diff --git a/src/data/roadmaps/cyber-security/content/ssl-and-tls-basics@dJ0NUsODFhk52W2zZxoPh.md b/src/data/roadmaps/cyber-security/content/ssl-and-tls-basics@dJ0NUsODFhk52W2zZxoPh.md index a794e1f86..045b37c20 100644 --- a/src/data/roadmaps/cyber-security/content/ssl-and-tls-basics@dJ0NUsODFhk52W2zZxoPh.md +++ b/src/data/roadmaps/cyber-security/content/ssl-and-tls-basics@dJ0NUsODFhk52W2zZxoPh.md @@ -27,3 +27,7 @@ SSL and TLS follow a series of steps, known as the "handshake process," to creat - **Secured connection**: Once the keys are exchanged, the client and server can now communicate securely using the established encryption and keys. Secure communication is critical for any organization handling sensitive data. SSL and TLS serve as the backbone for protecting data in transit and play a significant role in ensuring the confidentiality, integrity, and authenticity of online communications. + +Learn more from the following resources: + +- [@video@SSH vs TLS vs SSL](https://www.youtube.com/watch?v=k3rFFLmQCuY)