Add directories for content

pull/3529/head
Kamran Ahmed 2 years ago
parent 238245431b
commit 1a3265295c
  1. 6912
      public/jsons/roadmaps/cyber-security.json
  2. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-malware-and-types.md
  3. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-owasp-top-10.md
  4. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-privilege-escalation-attacks.md
  5. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-cia-triad.md
  6. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/104-handshakes.md
  7. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/105-threat-intel-osint.md
  8. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/106-false-true-negative-positive.md
  9. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/107-blue-team-read-team-purple-team.md
  10. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/108-authentication-vs-authorization.md
  11. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/109-basics-of-ids-ips.md
  12. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/110-honeypots.md
  13. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/111-concept-of-isolation.md
  14. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/112-os-hardening.md
  15. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/113-cyber-kill-chain.md
  16. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/114-mfa-2fa.md
  17. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/115-backups-and-resiliency.md
  18. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/116-definition-of-risk.md
  19. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/117-compliance-and-auditors.md
  20. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/118-zero-trust.md
  21. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/119-perimiter-dmz-segmentation.md
  22. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/120-penetration-rules-of-engagement.md
  23. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/121-basics-of-reverse-engineering.md
  24. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/122-vulnerability-management.md
  25. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/123-threat-hunting.md
  26. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/124-forensics.md
  27. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/125-runbooks.md
  28. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/126-defense-in-depth.md
  29. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/127-common-exploit-frameworks.md
  30. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/128-common-hacking-tools.md
  31. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/100-phishing-vishing-whaling-smishing.md
  32. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/101-spam-vs-spim.md
  33. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/102-shoulder-surfing.md
  34. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/103-dumpster-diving.md
  35. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/104-tailgating.md
  36. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/105-zero-day.md
  37. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/106-social-engineering.md
  38. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/107-reconnaissance.md
  39. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/108-impersonation.md
  40. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/109-watering-hole-attack.md
  41. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/110-drive-by-attack.md
  42. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/111-typo-squatting.md
  43. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/112-brute-force-vs-password-spray.md
  44. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/index.md
  45. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/100-dos-vs-ddos.md
  46. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/101-mitm.md
  47. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/102-arp-poisoning.md
  48. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/103-evil-twin.md
  49. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/104-dns-poisoning.md
  50. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/105-spoofing.md
  51. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/106-deauth-attack.md
  52. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/107-vlan-hopping.md
  53. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/108-rogue-access-point.md
  54. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/109-war-driving-dialing.md
  55. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/index.md
  56. 0
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/index.md
  57. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md
  58. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/101-memory-leak.md
  59. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/102-xss.md
  60. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/103-sql-injection.md
  61. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/104-csrf.md
  62. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/105-replay-attack.md
  63. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/106-pass-the-hash.md
  64. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/107-directory-traversal.md
  65. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/index.md

File diff suppressed because it is too large Load Diff
Loading…
Cancel
Save