cybersecurity: adjust few topic links (#8520)

* adjust content in few topics.

* Update src/data/roadmaps/cyber-security/content/antimalware@9QtY1hMJ7NKLFztYK-mHY.md

* Update antimalware@9QtY1hMJ7NKLFztYK-mHY.md

---------

Co-authored-by: Arik Chakma <arikchangma@gmail.com>
pull/8562/head
Vedansh 3 days ago committed by GitHub
parent 3e059cc3e9
commit 107fa4842c
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 3
      src/data/roadmaps/cyber-security/content/antimalware@9QtY1hMJ7NKLFztYK-mHY.md
  2. 4
      src/data/roadmaps/cyber-security/content/antivirus@3140n5prZYySsuBHjqGOJ.md
  3. 2
      src/data/roadmaps/cyber-security/content/anyrun@GZHFR43UzN0WIIxGKZOdX.md
  4. 6
      src/data/roadmaps/cyber-security/content/arp@M52V7hmG4ORf4TIVw3W3J.md
  5. 3
      src/data/roadmaps/cyber-security/content/arp@fzdZF-nzIL69kaA7kwOCn.md
  6. 3
      src/data/roadmaps/cyber-security/content/arp@hkO3Ga6KctKODr4gos6qX.md
  7. 4
      src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md
  8. 2
      src/data/roadmaps/cyber-security/content/autopsy@bIwpjIoxSUZloxDuQNpMu.md
  9. 4
      src/data/roadmaps/cyber-security/content/aws@0LztOTc3NG3OujCVwlcVU.md
  10. 2
      src/data/roadmaps/cyber-security/content/azure@GklBi7Qx1akN_cS9UMrha.md
  11. 2
      src/data/roadmaps/cyber-security/cyber-security.md

@ -4,5 +4,6 @@ Anti-malware is a type of software designed to detect, prevent, and remove malic
Learn more from the following resources:
- [@article@Anti-malware Definition](https://www.computertechreviews.com/definition/anti-malware/)
- [@video@How Does Antivirus and Antimalware Software Work?](https://www.youtube.com/watch?v=bTU1jbVXlmM)
- [@article@What is antimalware?](https://riskxchange.co/1006974/cybersecurity-what-is-anti-malware/)
- [@article@What is Antimalware?](https://riskxchange.co/1006974/cybersecurity-what-is-anti-malware/)

@ -4,5 +4,5 @@ Antivirus software is a specialized program designed to detect, prevent, and rem
Learn more from the following resources:
- [@video@What is an antivirus and how does it keep us safe?](https://www.youtube.com/watch?v=jW626WMWNAE)
- [@article@What is antivirus software?](https://www.webroot.com/gb/en/resources/tips-articles/what-is-anti-virus-software)
- [@video@What is an Antivirus and how does it keep us safe?](https://www.youtube.com/watch?v=jW626WMWNAE)
- [@article@What is Antivirus Software?](https://www.webroot.com/gb/en/resources/tips-articles/what-is-anti-virus-software)

@ -4,5 +4,5 @@ ANY.RUN is an interactive online malware analysis platform that allows users to
Learn more from the following resources:
- [@official@ANY.RUN Website](https://any.run/)
- [@official@Any.run](https://any.run/)
- [@video@Malware analysis with ANY.RUN](https://www.youtube.com/watch?v=QH_u7DHKzzI)

@ -6,8 +6,8 @@ When one device on a LAN wants to communicate with another, it needs to know the
Once the requesting device receives the MAC address, it updates its ARP cache—a table that stores IP-to-MAC address mappings—allowing it to send data directly to the correct hardware address.
Learn more from the following resources:
Learn more from the following resources:
- [@article@ARP - Wikipedia](https://en.wikipedia.org/wiki/Address_Resolution_Protocol)
- [@video@ARP Explained](https://www.youtube.com/watch?v=cn8Zxh9bPio)
- [@article@What is Address Resolution Protocol?](https://www.fortinet.com/resources/cyberglossary/what-is-arp)
- [@article@What is Address Resolution Protocol?](https://www.fortinet.com/resources/cyberglossary/what-is-arp)

@ -2,7 +2,8 @@
ARP is a protocol used by the Internet Protocol (IP) to map an IP address to a physical address, also known as a Media Access Control (MAC) address. ARP is essential for routing data between devices in a Local Area Network (LAN) as it allows for the translation of IP addresses to specific hardware on the network. When a device wants to communicate with another device on the same LAN, it needs to determine the corresponding MAC address for the target IP address. ARP helps in this process by broadcasting an ARP request containing the target IP address. All devices within the broadcast domain receive this ARP request and compare the target IP address with their own IP address. If a match is found, the device with the matching IP address sends an ARP reply which contains its MAC address. The device that initiated the ARP request can now update its ARP cache (a table that stores IP-to-MAC mappings) with the new information, and then proceed to send data to the target's MAC address.
Learn more from the following resources:
Learn more from the following resources:
- [@article@ARP - Wikipedia](https://en.wikipedia.org/wiki/Address_Resolution_Protocol)
- [@video@ARP Explained](https://www.youtube.com/watch?v=cn8Zxh9bPio)
- [@article@What is Address Resolution Protocol?](https://www.fortinet.com/resources/cyberglossary/what-is-arp)

@ -2,7 +2,8 @@
ARP is a protocol used by the Internet Protocol (IP) to map an IP address to a physical address, also known as a Media Access Control (MAC) address. ARP is essential for routing data between devices in a Local Area Network (LAN) as it allows for the translation of IP addresses to specific hardware on the network. When a device wants to communicate with another device on the same LAN, it needs to determine the corresponding MAC address for the target IP address. ARP helps in this process by broadcasting an ARP request containing the target IP address. All devices within the broadcast domain receive this ARP request and compare the target IP address with their own IP address. If a match is found, the device with the matching IP address sends an ARP reply which contains its MAC address. The device that initiated the ARP request can now update its ARP cache (a table that stores IP-to-MAC mappings) with the new information, and then proceed to send data to the target's MAC address.
Learn more from the following resources:
Learn more from the following resources:
- [@article@ARP - Wikipedia](https://en.wikipedia.org/wiki/Address_Resolution_Protocol)
- [@video@ARP Explained](https://www.youtube.com/watch?v=cn8Zxh9bPio)
- [@article@What is Address Resolution Protocol?](https://www.fortinet.com/resources/cyberglossary/what-is-arp)

@ -1,9 +1,11 @@
## Authentication vs Authorization
# Authentication vs Authorization
**Authentication** is the process of validating the identity of a user, device, or system. It confirms that the entity attempting to access the resource is who or what they claim to be. The most common form of authentication is the use of usernames and passwords. Other methods include:
**Authorization** comes into play after the authentication process is complete. It involves granting or denying access to a resource, based on the authenticated user's privileges. Authorization determines what actions the authenticated user or entity is allowed to perform within a system or application.
Learn more from the following resources:
- [@article@Two-factor authentication (2FA)](https://authy.com/what-is-2fa/)
- [@article@Biometrics (fingerprint, facial recognition, etc.)](https://me-en.kaspersky.com/resource-center/definitions/biometrics)
- [@article@Security tokens or certificates](https://www.comodo.com/e-commerce/ssl-certificates/certificate.php)

@ -4,5 +4,5 @@ Autopsy is a versatile and powerful open-source digital forensics platform that
Learn more from the following resources:
- [@official@Autopsy Website](https://www.autopsy.com/)
- [@official@Autopsy](https://www.autopsy.com/)
- [@video@Disk analysis with Autopsy](https://www.youtube.com/watch?v=o6boK9dG-Lc&t=236s)

@ -4,8 +4,8 @@ Amazon Web Services (AWS) is a leading cloud computing platform provided by Amaz
Learn more from the following resources:
- [@roadmap@AWS Roadmap](https://roadmap.sh/aws)
- [@official@AWS Website](https://aws.amazon.com)
- [@roadmap@Visit Dedicated AWS Roadmap](https://roadmap.sh/aws)
- [@official@AWS](https://aws.amazon.com)
- [@article@How to create an AWS account](https://grapplingdev.com/tutorials/how-to-create-aws-account)
- [@video@AWS Overview](https://www.youtube.com/watch?v=a9__D53WsUs)
- [@course@AWS Complete Tutorial](https://www.youtube.com/watch?v=B8i49C8fC3E)

@ -4,6 +4,6 @@ Azure is Microsoft's comprehensive cloud computing platform that offers a wide r
Learn more from the following resources:
- [@official@Azure Website](https://azure.microsoft.com)
- [@official@Azure](https://azure.microsoft.com)
- [@video@Azure DevOps Tutorial for Beginners](https://www.youtube.com/watch?v=4BibQ69MD8c)
- [@feed@daily.dev Azure Feed](https://app.daily.dev/tags/azure)

@ -28,7 +28,6 @@ seo:
- 'cyber security skills'
- 'guide to cyber security'
- 'cyber security roadmap'
- 'cyber security skills'
- 'cyber security skills test'
- 'skills for cyber security'
- 'what is cyber security'
@ -38,7 +37,6 @@ seo:
- 'cyber security expert roadmap'
- 'become a cyber security expert'
- 'cyber security expert career path'
- 'cyber security expert'
- 'modern cyber security expert'
relatedRoadmaps:
- 'backend'

Loading…
Cancel
Save