Add cyber-security roadmap

pull/3529/head
Kamran Ahmed 2 years ago
parent 48c04055d5
commit 238245431b
  1. 12260
      public/jsons/roadmaps/cyber-security.json
  2. BIN
      public/pdfs/roadmaps/cyber-security.pdf
  3. BIN
      public/roadmaps/cyber-security.png
  4. 2
      src/components/FrameRenderer/renderer.js
  5. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/100-computer-hardware-components.md
  6. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md
  7. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/101-wifi.md
  8. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/102-bluetooth.md
  9. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/103-infrared.md
  10. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/index.md
  11. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/102-os-independent-troubleshooting.md
  12. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/100-icloud.md
  13. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/101-google-suite.md
  14. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/102-ms-office-suite.md
  15. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/index.md
  16. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/104-basics-of-computer-networking.md
  17. 1
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/index.md
  18. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/100-windows.md
  19. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/101-linux.md
  20. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/102-macos.md
  21. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/index.md
  22. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/103-install-and-configure.md
  23. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/104-versions-and-differences.md
  24. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/105-navigating-using-gui-and-cli.md
  25. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/106-understand-permissions.md
  26. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/107-installing-apps.md
  27. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/108-performing-crud-on-files.md
  28. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/109-troubleshooting.md
  29. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/110-common-commands.md
  30. 1
      src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/index.md
  31. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/100-osi-model.md
  32. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/102-common-ports.md
  33. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/103-ssl-and-tls-basics.md
  34. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/104-basics-of-nas-and-san.md
  35. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/105-basics-of-subnetting.md
  36. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/100-public-vs-private-ip-addresses.md
  37. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/101-localhost.md
  38. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/102-loopback.md
  39. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/102-wan.md
  40. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/103-cidr.md
  41. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/104-subnet-mask.md
  42. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/105-default-gateway.md
  43. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/index.md
  44. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/100-star-topology.md
  45. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/101-ring-topology.md
  46. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/102-mesh-topology.md
  47. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/103-bus-topology.md
  48. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/index.md
  49. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/100-ssh.md
  50. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/101-rdp.md
  51. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/102-ftp.md
  52. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/103-sftp.md
  53. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/104-http-https.md
  54. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/105-ssl-tls.md
  55. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/index.md
  56. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/100-vmware.md
  57. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/101-virtualbox.md
  58. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/102-esxi.md
  59. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/104-proxmox.md
  60. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/index.md
  61. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/100-hypervisor.md
  62. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/101-vm.md
  63. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/102-guest-os.md
  64. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/103-host-os.md
  65. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/index.md
  66. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/100-nslookup.md
  67. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/101-iptables.md
  68. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/102-packet-sniffers.md
  69. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/103-ipconfig.md
  70. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/104-netstat.md
  71. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/105-port-scanners.md
  72. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/106-ping.md
  73. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/107-dig.md
  74. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/108-arp.md
  75. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/109-protocol-analyzers.md
  76. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/110-nmap.md
  77. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/111-route.md
  78. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/112-tcpdump.md
  79. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/113-tracert.md
  80. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/index.md
  81. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/100-kerberos.md
  82. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/101-ldap.md
  83. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/102-sso.md
  84. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/103-certificates.md
  85. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/104-local-auth.md
  86. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/105-radius.md
  87. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/index.md
  88. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/100-dhcp.md
  89. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/101-dns.md
  90. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/102-ntp.md
  91. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/103-ipam.md
  92. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/index.md
  93. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/index.md
  94. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/100-vlan.md
  95. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/101-dmz.md
  96. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/102-arp.md
  97. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/103-vm.md
  98. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/104-nat.md
  99. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/105-ip.md
  100. 1
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/106-dns.md
  101. Some files were not shown because too many files have changed in this diff Show More

File diff suppressed because it is too large Load Diff

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.3 MiB

@ -97,7 +97,7 @@ export class Renderer {
switchRoadmap(newJsonUrl) { switchRoadmap(newJsonUrl) {
const newJsonFileSlug = newJsonUrl.split('/').pop().replace('.json', ''); const newJsonFileSlug = newJsonUrl.split('/').pop().replace('.json', '');
// Only update the URL // Update the URL and attach the new roadmap type
if (window?.history?.pushState) { if (window?.history?.pushState) {
const url = new URL(window.location); const url = new URL(window.location);
const type = this.resourceType[0]; // r for roadmap, b for best-practices const type = this.resourceType[0]; // r for roadmap, b for best-practices

Some files were not shown because too many files have changed in this diff Show More

Loading…
Cancel
Save