From 37db7ebd5b40a5ebbc485e09fafd195ee6a1fd24 Mon Sep 17 00:00:00 2001 From: Kamran Ahmed Date: Mon, 15 Jul 2024 17:09:50 +0100 Subject: [PATCH] Resolve merge conflicts --- .../learn-for-each/index.md | 1 - .../106-ip-terminology/index.md | 43 - .../107-network-topologies/index.md | 78 - .../109-virtualization-technologies/index.md | 38 - .../110-virutalization-basics/index.md | 37 - .../111-troubleshooting-tools/index.md | 41 - .../112-auth-methodologies/index.md | 29 - .../functions-of-each/100-dhcp.md | 21 - .../functions-of-each/101-dns.md | 23 - .../functions-of-each/index.md | 1 - .../understand-the-terminology/index.md | 1 - .../understand-these/index.md | 1 - .../100-cryptography/index.md | 37 - .../101-incident-response-process/index.md | 55 - .../102-threat-classification/index.md | 50 - .../103-hardening-concepts/index.md | 37 - .../106-false-true-negative-positive.md | 30 - .../108-authentication-vs-authorization.md | 27 - .../100-phishing-vishing-whaling-smishing.md | 53 - .../attack-types/101-spam-vs-spim.md | 43 - .../attack-types/102-shoulder-surfing.md | 22 - .../attack-types/103-dumpster-diving.md | 16 - .../attack-types/104-tailgating.md | 20 - .../attack-types/105-zero-day.md | 32 - .../attack-types/106-social-engineering.md | 33 - .../attack-types/107-reconnaissance.md | 24 - .../attack-types/108-impersonation.md | 28 - .../attack-types/109-watering-hole-attack.md | 22 - .../attack-types/110-drive-by-attack.md | 29 - .../attack-types/111-typo-squatting.md | 27 - .../112-brute-force-vs-password-spray.md | 33 - .../attack-types/index.md | 1 - .../100-parrot-os.md | 21 - .../101-kali-linux.md | 43 - .../common-distros-for-hacking/index.md | 1 - .../100-dos-vs-ddos.md | 31 - .../common-network-based-attacks/101-mitm.md | 26 - .../102-arp-poisoning.md | 26 - .../103-evil-twin.md | 23 - .../104-dns-poisoning.md | 34 - .../105-spoofing.md | 29 - .../106-deauth-attack.md | 33 - .../107-vlan-hopping.md | 25 - .../108-rogue-access-point.md | 29 - .../109-war-driving-dialing.md | 35 - .../common-network-based-attacks/index.md | 1 - .../common-standards/index.md | 1 - .../find-and-use-logs/100-event-logs.md | 43 - .../find-and-use-logs/101-syslogs.md | 28 - .../find-and-use-logs/102-netflow.md | 26 - .../find-and-use-logs/103-packet-captures.md | 42 - .../find-and-use-logs/104-firewall-logs.md | 43 - .../find-and-use-logs/index.md | 1 - .../108-arp.md | 36 - .../112-tail.md | 74 - .../index.md | 1 - .../other-attacks/100-buffer-overflow.md | 33 - .../other-attacks/101-memory-leak.md | 37 - .../other-attacks/102-xss.md | 27 - .../other-attacks/103-sql-injection.md | 41 - .../other-attacks/104-csrf.md | 32 - .../other-attacks/105-replay-attack.md | 31 - .../other-attacks/106-pass-the-hash.md | 24 - .../other-attacks/107-directory-traversal.md | 35 - .../other-attacks/index.md | 1 - .../100-ftp-vs-sftp.md | 37 - .../101-ssl-vs-tls.md | 32 - .../secure-vs-unsecure-protocols/102-ipsec.md | 30 - .../103-dnssec.md | 35 - .../secure-vs-unsecure-protocols/104-ldaps.md | 33 - .../secure-vs-unsecure-protocols/105-srtp.md | 21 - .../106-s-mime.md | 35 - .../secure-vs-unsecure-protocols/index.md | 1 - .../tools-for-unintended-purposes/index.md | 1 - .../uderstand-frameworks/100-attck.md | 29 - .../uderstand-frameworks/101-kill-chain.md | 21 - .../uderstand-frameworks/102-diamond-model.md | 14 - .../uderstand-frameworks/index.md | 1 - .../100-virus-total.md | 12 - .../101-joe-sandbox.md | 25 - .../understand-common-tools/102-any-run.md | 25 - .../understand-common-tools/103-urlvoid.md | 17 - .../understand-common-tools/104-urlscan.md | 23 - .../understand-common-tools/105-whois.md | 33 - .../understand-common-tools/index.md | 1 - .../100-antivirus.md | 21 - .../101-antimalware.md | 33 - .../understand-the-following-terms/102-edr.md | 17 - .../understand-the-following-terms/103-dlp.md | 35 - .../104-firewall-nextgen-firewall.md | 19 - .../105-hips.md | 17 - .../106-nids.md | 23 - .../107-nips.md | 17 - .../108-host-based-firewall.md | 17 - .../109-sandboxing.md | 14 - .../understand-the-following-terms/110-acl.md | 23 - .../111-eap-vs-peap.md | 36 - .../112-wpa-vs-wpa2-vs-wpa3-vs-wep.md | 26 - .../understand-the-following-terms/113-wps.md | 13 - .../understand-the-following-terms/index.md | 1 - .../understand/100-siem.md | 20 - .../understand/102-soar.md | 27 - .../understand/index.md | 1 - .../105-concept-of-cdn.md | 23 - .../106-cloud-services/index.md | 37 - .../107-cloud-models/index.md | 49 - .../108-common-cloud-environments/index.md | 53 - .../109-common-cloud-storage/index.md | 41 - .../content/acl@35oCRzhzpVfitQPL4K9KC.md | 0 ...-acls.md => acls@8JM95sonFUhZCdaynUA_M.md} | 0 .../antimalware@9QtY1hMJ7NKLFztYK-mHY.md | 0 .../antivirus@3140n5prZYySsuBHjqGOJ.md | 0 .../content/anyrun@GZHFR43UzN0WIIxGKZOdX.md | 0 ...02-apt.md => apt@l0BvDtwWoRSEjm6O0WDPy.md} | 0 ...02-arp.md => arp@M52V7hmG4ORf4TIVw3W3J.md} | 0 .../content/arp@fzdZF-nzIL69kaA7kwOCn.md | 19 + ...08-arp.md => arp@hkO3Ga6KctKODr4gos6qX.md} | 0 .../content/attck@auR7fNyd77W2UA-PjXeJS.md | 0 ...-vs-authorization@WG7DdsxESm31VcLFfkVTz.md | 12 + ...sy.md => autopsy@bIwpjIoxSUZloxDuQNpMu.md} | 2 +- ...00-aws.md => aws@0LztOTc3NG3OujCVwlcVU.md} | 0 ...zure.md => azure@GklBi7Qx1akN_cS9UMrha.md} | 0 ...-bash.md => bash@tao0Bb_JR0Ubl62HO8plp.md} | 0 ...f-threat-hunting@_x3BgX93N-Pt1_JK7wk0p.md} | 0 ...puter-networking@T0aU8ZQGShmF9uXhWY4sD.md} | 0 ...s-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md} | 0 ...s-of-nas-and-san@umbMBQ0yYmB5PgWfY6zfO.md} | 0 ...erse-engineering@uoGA4T_-c-2ip_zfEUcJJ.md} | 0 ...cs-of-subnetting@E8Z7qFFW-I9ivr0HzoXCq.md} | 0 ...reat-intel-osint@wN5x5pY53B8d0yopa1z8F.md} | 0 ...ility-management@lcxAXtO6LoGd85nOFnLo8.md} | 0 ...ed--purple-teams@7tDxTcKJNAUxbHLPCnPFO.md} | 0 ....md => bluetooth@DbWf5LdqiByPiJa4xHtl_.md} | 0 ...02-box.md => box@4Man3Bd-ySLFlAdxbLOHw.md} | 0 ...vs-password-spray@Q0i-plPQkb_NIvOQBVaDd.md | 0 .../buffer-overflow@n8ZOZxNhlnw7DpzoXe_f_.md | 0 ...pology.md => bus@0DWh4WmLK_ENDuqQmQcu4.md} | 0 .../103-cpp.md => c@8jj9hpe9jQIgCc8Txyw3O.md} | 0 ...09-cat.md => cat@D2ptX6ja_HvFEafMIzWOy.md} | 2 +- ...-ccna.md => ccna@4RD22UZATfL8dc71YkJwQ.md} | 0 ...09-ceh.md => ceh@AAo7DXB7hyBzO6p05gx1i.md} | 2 +- ... => certificates@WXRaVCYwuGQsjJ5wyvbea.md} | 0 ...-cidr.md => cidr@PPIH1oHW4_ZDyD3U3shDg.md} | 0 ...03-cis.md => cis@sSihnptkoEqUsHjDpckhG.md} | 2 +- ...-cisa.md => cisa@lqFp4VLY_S-5tAbhNQTew.md} | 2 +- ...-cism.md => cism@s86x24SHPEbbOB9lYNU-w.md} | 10 +- ...issp.md => cissp@BqvijNoRzSGYLCMP-6hhr.md} | 2 +- ...ls-and-knowledge@vVaBQ5VtsE_ZeXbCOF8ux.md} | 0 ... common-commands@WDrSO7wBNn-2jB8mcyT7j.md} | 2 +- ...s-and-their-uses@0tx2QYDYXhm85iYrCWd9U.md} | 0 ...s-and-their-uses@ViF-mpR17MB3_KJ1rV8mS.md} | 0 .../compliance@05Gbgy6aawYlYIx38u8DE.md | 0 ....md => comptia-a@lbAgU5lR1O7L_5mCbNz_D.md} | 2 +- ...=> comptia-linux@p34Qwlj2sjwEPR2ay1WOK.md} | 0 ... comptia-network@4RGbNOfMPDbBcvUFWTTCV.md} | 2 +- ...comptia-security@AxeDcKK3cUtEojtHQPBw7.md} | 2 +- ...dware-components@Ih0YZt8u9vDwYo8y1t41n.md} | 0 ...d-their-function@F1QVCEmGkgvz-_H5lTxY2.md} | 0 ...d => containment@l7WnKuR2HTD4Vf9U2TxkK.md} | 0 ...ts-of-zero-trust@HavEL0u65ZxHt92TfbLzk.md} | 0 ...rest.md => crest@rA1skdztev3-8VmAtIlmr.md} | 2 +- ...04-csf.md => csf@HjfgaSEZjW9BOXy_Ixzkk.md} | 20 +- .../content/csrf@pK2iRArULlK-B3iSVo4-n.md | 0 ...-curl.md => curl@W7iQUCjODGYgE4PjC5TZI.md} | 2 +- ...cyber-kill-chain@H38Vb7xvuBJXVzgPBdRdT.md} | 0 .../110-dd.md => dd@9xbU_hrEOUtMm-Q09Fe6t.md} | 2 +- .../deauth-attack@LfWJJaT3fv0p6fUeS8b84.md | 0 ... default-gateway@5rKaFtjYx0n2iF8uTLs8X.md} | 0 ...-dhcp.md => dhcp@R5HEeh6jwpQDo27rz1KSH.md} | 2 +- .../content/dhcp@T4312p70FqRBkzVfWKMaR.md | 23 + .../diamond-model@AY-hoPGnAZSd1ExaYX8LR.md | 0 ...-and-differences@yXOGqlufAZ69uiBzKFfh6.md} | 2 +- ...07-dig.md => dig@D2YYv1iTRGken75sHO0Gt.md} | 0 ...03-dig.md => dig@XyaWZZ45axJMKXoWwsyFj.md} | 2 +- ...rectory-traversal@L0ROYh2DNlkybNDO2ezJY.md | 0 .../content/dlp@iolsTC-63d_1wzKGul-cT.md | 0 ...01-dmz.md => dmz@gfpvDQz61I3zTB7tGu7vp.md} | 0 .../dns-poisoning@urtsyYWViEzbqYLoNfQAh.md | 0 ...06-dns.md => dns@ORIdKG8H97VkBUYpiDtXf.md} | 2 +- .../content/dns@r1IKvhpwg2umazLGlQZL1.md | 27 + .../content/dnssec@LLGXONul7JfZGUahnK0AZ.md | 0 .../dos-vs-ddos@IF5H0ZJ72XnqXti3jRWYF.md | 0 .../drive-by-attack@cO70zHvHgBAH29khF-hBW.md | 0 ...ox.md => dropbox@9OastXVfiG1YRMm68ecnn.md} | 0 .../dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md | 0 .../eap-vs-peap@1jwtExZzR9ABKvD_S9zFG.md | 0 .../content/edr@QvHWrmMzO8IvNQ234E_wf.md | 0 ...ndpoint-security@LEgJtu1GZKOtoAXyOGWLE.md} | 0 ...d => eradication@N17xAIo7sgbB0nrIDMWju.md} | 0 ...-esxi.md => esxi@BisNooct1vJDKaBKsGR7_.md} | 0 .../event-logs@KbFwL--xF-eYjGy8PZdrM.md | 0 .../evil-twin@O1fY2n40yjZtJUEeoItKr.md | 0 .../advanced-certifications/index.md | 1 - .../beginner-certifications/index.md | 1 - .../content/extras/certifications/index.md | 1 - .../content/extras/ctfs/index.md | 1 - .../cyber-security/content/extras/index.md | 1 - ...e--false-positive@XwRCZf-yHJsXVjaRfb3R4.md | 7 + .../firewall-logs@np0PwKy-EvIa_f_LC6Eem.md | 0 ...-nextgen-firewall@tWDo5R3KU5KOjDdtv801x.md | 0 ...md => ftk-imager@_jJhL1RtaqHJmlcWrd-Ak.md} | 2 +- .../ftp-vs-sftp@9Z6HPHPj4escSVDWftFEx.md | 0 ...02-ftp.md => ftp@ftYYMxRpVer-jgSswHLNa.md} | 0 ...mental-it-skills@oimYzZYFXKjgvc7D4c-2u.md} | 0 ...01-gcp.md => gcp@tOLA5QPKi6LHl1ljsOMwX.md} | 0 ...-giac.md => giac@ZiUT-lyIBfHTzG-dwSy96.md} | 2 +- .../101-go.md => go@jehVvdz8BnruKjqHMKu5v.md} | 0 ... => google-drive@fTZ4PqH-AMhYA_65w4wFO.md} | 0 ... => google-suite@IOK_FluAv34j3Tj_NvwdO.md} | 0 ...-gpen.md => gpen@t4h9rEKWz5Us0qJKXhxlX.md} | 2 +- ...-grep.md => grep@Dfz-6aug0juUpMmOJLCJ9.md} | 2 +- ... => group-policy@FxuMJmDoDkIsPFp2iocFg.md} | 0 ...-gsec.md => gsec@nlmATCTgHoIoMcEOW8bUW.md} | 2 +- ...os.md => guestos@LocGETHz6ANYinNd5ZLsS.md} | 0 ...wapt.md => gwapt@rwniCTWfYpKP5gi02Pa9f.md} | 2 +- ...md => hackthebox@wkuE_cChPZT2MHyGjUuU4.md} | 2 +- ...ng.md => hashing@0UZmAECMnfioi-VeXcvg8.md} | 0 ...-head.md => head@VNmrb5Dm4UKUgL8JBfhnE.md} | 2 +- .../content/hips@l5EnhOCnkN-RKvgrS9ylH.md | 0 ....md => honeypots@bj5YX8zhlam0yoNckL8e4.md} | 0 ...ost-based-firwall@jWl1VWkZn3n1G2eHq6EnX.md | 0 ...-os.md => hostos@p7w3C94xjLwSMm5qA8XlL.md} | 0 ...ping.md => hping@Cclbt4bNfkHwFwZOvJuLK.md} | 2 +- .../content/hr@05tH6WhToC615JTFN-TPc.md | 0 ...d => http--https@3Awm221OJHxXNLiL9yxfd.md} | 0 ...rid.md => hybrid@ywRlTuTfh5-NHnv4ZyW1t.md} | 0 ...md => hypervisor@CIoLaRv5I3sCr9tBnZHEi.md} | 0 ...-iaas.md => iaas@1nPifNUm-udLChIqLC_uK.md} | 0 ...oud.md => icloud@E7yfALgu9E2auOYDOTmex.md} | 0 ...oud.md => icloud@Wqy6ki13hP5c0VhGYEhHj.md} | 0 ...> identification@XsRoldaBXUSiGbvY1TjQd.md} | 0 .../impersonation@ZEgxmvjWPp5NofLFz_FTJ.md | 0 .../roadmaps/cyber-security/content/index.md | 1 - ...d.md => infrared@KsZ63c3KQLLn373c5CZnp.md} | 0 ...nd-configuration@02aaEP9E5tlefeGBxf_Rj.md} | 2 +- ...and-applications@Ot3LGpM-CT_nKsNqIKIye.md} | 2 +- .../105-ip.md => ip@FdoqB2---uDAyz6xZjk_u.md} | 2 +- ...-ipam.md => ipam@hN8p5YBcSaPm-byQUIz8L.md} | 2 +- ...g.md => ipconfig@IXNGFF4sOFbQ_aND-ELK0.md} | 2 +- ...g.md => ipconfig@u-6xuZUyOrogh1bU4cwER.md} | 0 .../content/ipsec@gNFVtBxSYP5Uw3o3tlJ0M.md | 0 ...s.md => iptables@jr8JlyqmN3p7Ol3_kD9AH.md} | 0 ...00-iso.md => iso@oRssaVG-K-JwlL6TAHhXw.md} | 2 +- ...md => javascript@2SThr6mHpX6rpW-gmsqxG.md} | 0 .../joe-sandbox@h__KxKa0Q74_egY7GOe-L.md | 0 ...d => jump-server@UF3BV1sEEOrqh5ilnfM1B.md} | 0 .../kali-linux@w6wXkoLrv0_d-Ah0txUHd.md | 0 ...s.md => kerberos@lG6afUOx3jSQFxbH92otL.md} | 0 ... => key-exchange@rmR6HJqEhHDgX55Xy5BAW.md} | 0 .../kill-chain@7Bmp4x6gbvWMuVDdGRUGj.md | 0 ...known-vs-unknown@HPlPGKs7NLqmBidHJkOZg.md} | 0 ...01-lan.md => lan@xWxusBtMEWnd-6n7oqjHz.md} | 2 +- ...-ldap.md => ldap@lV3swvD6QGLmD9iVfbKIF.md} | 0 .../content/ldaps@z_fDvTgKw51Uepo6eMQd9.md | 0 ...-works-and-types@v7CD_sHqLWbm9ibXXESIK.md} | 0 .../content/legal@C5bCIdPi0gGkY_r4qqoXZ.md | 0 ... lessons-learned@ErRol7AT02HTn3umsPD_0.md} | 0 ...inux.md => linux@4frVcjYI1VlVU9hQgpwcT.md} | 0 ...md => local-auth@vYvFuz7lAJXZ1vK_4999a.md} | 0 ....md => localhost@0TWwox-4pSwuXojI8ixFO.md} | 0 ...bas.md => lolbas@10qbxX8DCrfyH7tgYexxQ.md} | 0 ...k.md => loopback@W_oloLu2Euz5zRSy7v_T8.md} | 0 ....md => mac-based@OAukNfV5T0KTnIF9jKYRF.md} | 0 ...acos.md => macos@dztwr-DSckggQbcNIi4_2.md} | 0 ...00-man.md => man@LrwTMH_1fTd8iB9wJg-0t.md} | 4 +- .../management@s9tHpzYRj2HCImwQhnjFM.md | 0 ...mp.md => memdump@wspNQPmqWRjKoFm6x_bVw.md} | 2 +- .../memory-leak@nOND14t7ISgSH3zNpV3F8.md | 0 ...ology.md => mesh@PYeF15e7iVB9seFrrO7W6.md} | 0 ...a.md => mfa--2fa@pnfVrOjDeG1uYAeqHxhJP.md} | 0 .../content/mitm@ODlVT6MhV-RVUbRMG0mHi.md | 0 ... ms-office-suite@-5haJATqlmj0SFSFAqN6A.md} | 0 ....md => nac-based@6oAzYfwsHQYNVbi7c2Tly.md} | 0 ...04-nat.md => nat@Kkd3f_0OYNCdpDgrJ-_Ju.md} | 2 +- ...sing-gui-and-cli@MGitS_eJBoY99zOR-W3F4.md} | 2 +- .../content/netflow@xXz-SwvXA2cLfdCd-hLtW.md | 0 ...at.md => netstat@2M3PRbGzo14agbEPe32ww.md} | 0 ...orking-knowledge@gSLr-Lc119eX9Ig-kDzJ2.md} | 0 ...00-nfc.md => nfc@hwAUFLYpc_ftCfXq95dey.md} | 0 .../content/nids@LIPtxl_oKZRcbvXT4EdNf.md | 0 .../content/nips@7w9qj16OD4pUzq-ItdxeK.md | 0 ...-nist.md => nist@SOkJUTd1NUKSwYMIprv4m.md} | 2 +- ...-nmap.md => nmap@Hoou7kWyfB2wx_yFHug_H.md} | 2 +- ...-nmap.md => nmap@xqwIEyGfdZFxk6QqbPswe.md} | 0 ...p.md => nslookup@OUarb1oS1-PX_3OXNR0rV.md} | 2 +- ...p.md => nslookup@tk4iG5i1Ml9w9KRO1tGJU.md} | 0 ...02-ntp.md => ntp@tf0TymdPHbplDHvuVIIh4.md} | 2 +- ...d => obfuscation@kxlg6rpfqqoBfmMMg3EkJ.md} | 0 ...e.md => onedrive@MWqnhDKm9jXvDDjkeVNxm.md} | 0 ...system-hardening@_S25EOGS3P8647zLM5i-g.md} | 0 ...perating-systems@UY6xdt_V3YMkZxZ1hZLvW.md} | 0 ...-troubleshooting@pJUhQin--BGMuXHPwx3JJ.md} | 0 ...-oscp.md => oscp@SwVGVP2bbCFs2uNg9Qtxb.md} | 2 +- ...-paas.md => paas@PQ_np6O-4PK2V-r5lywQg.md} | 0 .../packet-captures@TIxEkfBrN6EXQ3IKP1B7u.md | 0 ... packet-sniffers@k6UX0BJho5arjGD2RWPgH.md} | 0 .../content/parrotos@zR6djXnfTSFVEfvJonQjf.md | 0 .../pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md | 0 ...g.md => patching@e-MDyUR3GEv-e4Qsx_5vV.md} | 0 ...es-of-engagement@NkAAQikwH-A6vrF8fWpuB.md} | 0 ...ng-crud-on-files@zRXyoJMap9irOYo3AdHE8.md} | 2 +- ...-vs-segmentation@PUgPgpKio4Npzs86qEXa7.md} | 0 .../content/phishing@7obusm5UtHwWMcMMEB3lt.md | 0 ...tf.md => picoctf@pou5xHwnz9Zsy5J6lNlKq.md} | 2 +- ...-ping.md => ping@GuuY-Q6FZzfspB3wrH64r.md} | 0 ...-ping.md => ping@yfTpp-ePuDB931FnvNB-Y.md} | 2 +- ...03-pki.md => pki@fxyJxrf3mnFTa3wXk1MCW.md} | 0 ...=> port-blocking@W7bcydXdwlubXF2PHKOuq.md} | 0 ...=> port-scanners@iJRQHzh5HXADuWpCouwxv.md} | 0 ...d => power-shell@paY9x2VJA98FNGBFGRXp2.md} | 0 ...d => preparation@w6V4JOtXKCMPAkKIQxvMg.md} | 0 ...e-vs-public-keys@7svh9qaaPp0Hz23yinIye.md} | 0 ...te.md => private@ecpMKP1cQXXsfKETDUrSf.md} | 0 ...ilege-escalation@cvI8-sxY5i8lpelW9iY_5.md} | 0 ...-but-recommended@_RnuQ7952N8GWZfPD60sJ.md} | 0 ...otocol-analyzers@K05mEAsjImyPge0hDtsU0.md} | 0 ...ox.md => proxmax@jqX1A5hFF3Qznqup4lfiF.md} | 0 ...ate-ip-addresses@2nQfhnvBjJg1uDZ28aE4v.md} | 0 ...lic.md => public@ZDj7KBuyZsKyEMZViMoXW.md} | 0 ...hon.md => python@XiHvGy--OkPFfJeKA6-LP.md} | 0 ...ius.md => radius@tH3RLnJseqOzRIbZMklHD.md} | 0 ...01-rdp.md => rdp@Ia6M1FKPNpqLDiWx7CwDh.md} | 0 .../reconnaissance@UU_inxa8Y2lLP2BRhdLDT.md | 0 ...y.md => recovery@vFjbZAJq8OfLb3_tsc7oT.md} | 0 .../replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md | 0 ...ology.md => ring@9vEUVJ8NTh0wKyIE6-diY.md} | 0 ...02-rmf.md => rmf@fjEdufrZAfW4Rl6yDU8Hk.md} | 2 +- ...ogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md | 0 ...nce-and-auditors@kqT0FRLt9Ak9P8PhHldO-.md} | 0 ...oute.md => route@xFuWk7M-Vctk_xb7bHbWs.md} | 0 ...ter.md => router@lwSFIbIX-xOZ0QK2sGFb1.md} | 2 +- .../100-s3.md => s3@2jsTgT7k8MeaDtx6RJhOP.md} | 0 ...-saas.md => saas@sVw5KVNxPEatBRKb2ZbS_.md} | 0 ...ng.md => salting@jqWhR6oTyX6yolUBv71VC.md} | 0 .../sandboxing@SLKwuLHHpC7D1FqrpPRAe.md | 0 ...y-hack-challenge@WCeJrvWl837m1BIjuA1Mu.md} | 2 +- ...ls-and-knowledge@_hYN0gEi9BL24nptEtXWU.md} | 0 ...-sftp.md => sftp@YEy6o-clTBKZp1yOkLwNb.md} | 0 .../shoulder-surfing@FD0bkmxNpPXiUB_NevEUf.md | 0 .../content/siem@c2kY3wZVFKZYxMARhLIwO.md | 0 ....md => sinkholes@oFgyQYL3Ws-l7B5AF-bTR.md} | 0 .../content/smime@9rmDvycXFcsGOq3v-_ziD.md | 0 .../content/smishing@d4U6Jq-CUB1nNN2OCFoum.md | 0 .../content/soar@i0ulrA-GJrNhIVmzdWDrn.md | 0 ...ocial-engineering@O1VceThdxRlgQ6DcGyY7Y.md | 0 .../spam-vs-spim@cbEMUyg_btIPjdx-XqIM5.md | 0 .../content/spoofing@LteSouUtAj3JWWOzcjQPl.md | 0 .../sql-injection@P-Am25WJV8cFd_KsX7cdj.md | 0 .../content/srtp@_9lQSG6fn69Yd9rs1pQdL.md | 0 ...00-ssh.md => ssh@8Mog890Lj-gVBpWa05EzT.md} | 0 ...s.md => ssl--tls@LKK1A5-xawA7yCIAWHS8P.md} | 0 ...l-and-tls-basics@dJ0NUsODFhk52W2zZxoPh.md} | 0 .../ssl-vs-tls@6ILPXeUDDmmYRiA_gNTSr.md | 0 ...02-sso.md => sso@xL32OqDKm6O043TYgVV1r.md} | 0 .../stakeholders@lv6fI3WeJawuCbwKtMRIh.md | 0 ...ology.md => star@P0ZhAXd_H-mTOMr13Ag31.md} | 0 ...d => subnet-mask@f-v8qtweWXFY_Ryo3oYUF.md} | 0 ...tch.md => switch@r9byGV8XuBPzoqj5ZPf2W.md} | 2 +- .../content/syslogs@7oFwRkmoZom8exMDtMslX.md | 0 .../content/tail@762Wf_Eh-3zq69CZZiIjR.md | 61 + .../tailgating@o-keJgF9hmifQ_hUD91iN.md | 0 ...mp.md => tcpdump@y8GaUNpaCT1Ai88wPOk6d.md} | 0 ...rt.md => tracert@cSz9Qx3PGwmhq3SSKYKfg.md} | 0 ...rt.md => tracert@jJtS0mgCYc0wbjuXssDRO.md} | 2 +- ... troubleshooting@xeRWOX1fWQDLNLWMAFTEe.md} | 2 +- ...ve--true-positive@M6uwyD4ibguxytf1od-og.md | 5 + ....md => tryhackme@kht-L7_v-DbglMYUHuchp.md} | 2 +- .../typo-squatting@0LeDwj_tMaXjQBBOUJ5CL.md | 0 ...s-and-resiliency@9asy3STW4oTYYHcUazaRj.md} | 0 ...ics-of-forensics@7KLGFfco-hw7a62kXtS3d.md} | 0 ...f-popular-suites@_7RjH4Goi0x6Noy6za0rP.md} | 0 ...rstand-cia-triad@uz6ELaLEu9U4fHVfnQiOa.md} | 0 ...ploit-frameworks@Lg7mz4zeCToEzZBFxYuaU.md} | 0 ...on-hacking-tools@rzY_QsvnC1shDTPQ-til0.md} | 0 ...defense-in-depth@Rae-f9DHDZuwIwW6eRtKF.md} | 0 ...ept-of-isolation@aDF7ZcOX9uR8l0W4aqhYn.md} | 0 ...cept-of-runbooks@Ec6EairjFJLCHc7b-1xxe.md} | 0 ...stand-handshakes@zQx_VUS1zRmF4zCGjJD5-.md} | 0 ...tand-permissions@bTfL7cPOmBBFl-eHxUJI6.md} | 0 ...ing-in-the-cloud@XL3FVeGFDhAl_gSol6Tjt.md} | 0 ...ructure-as-cloud@RJctUpvlUJGAdwBNtDSXw.md} | 0 ...ity-in-the-cloud@ThLsXkqLw--uddHz0spCH.md} | 0 ...pt-of-serverless@-83ltMEl3le3yD68OFnTM.md} | 0 ...finition-of-risk@ggAja18sBUUdCfVsT0vCv.md} | 0 ...-and-on-premises@KGjYM4Onr5GQf1Yv9IabI.md} | 0 ...nd-the-osi-model@OXUd1UPPsBhNoUGLKZJGV.md} | 0 .../content/urlscan@lMiW2q-b72KUl-2S7M6Vb.md | 0 .../content/urlvoid@lFt1k1Q-NlWWqyDA3gWD1.md | 0 ...md => virtualbox@vGVFhZXYOZOy4qFpLLbxp.md} | 0 .../virustotal@rxzcAzHjzIc9lkWSw0fef.md | 0 .../vlan-hopping@u4hySof6if5hiONSaW-Uf.md | 0 ...-vlan.md => vlan@d5Cv3EXf6OXW19yPJ4x6e.md} | 0 .../101-vm.md => vm@251sxqoHggQ4sZ676iX5w.md} | 0 .../103-vm.md => vm@ZTC5bLWEIQcdmowc7sk_E.md} | 2 +- ...are.md => vmware@AjywuCZdBi9atGUbetlUL.md} | 0 ...10-vpn.md => vpn@gTozEpxJeG1NTkVBHH-05.md} | 2 +- ...ub.md => vulnhub@W94wY_otBuvVW_-EFlKA6.md} | 2 +- ...02-wan.md => wan@vCkTJMkDXcQmwsmeNUAX5.md} | 0 ...ering-hole-attack@dcvuKHq0nHgHLcLwtl4IJ.md | 0 ...acks-and-owasp10@fyOYVqiBqyKC4aqc6-y0q.md} | 0 .../content/whaling@KSwl6sX2W47vUmytpm8LH.md | 0 .../content/whishing@M65fCl72qlF0VTbGNT6du.md | 0 .../content/whois@-RnlvUltJ9IDtH0HEnMbN.md | 0 ...-wifi.md => wifi@fUBNKHNPXbemRYrnzH3VT.md} | 0 ...ws.md => windows@BNUKEQ4YpZmIhSPQdkHgU.md} | 0 ...hex.md => winhex@gNan93Mg9Ym2AF3Q2gqoi.md} | 2 +- ....md => wireshark@Sm9bxKUElINHND8FdZ5f2.md} | 2 +- ...-wlan.md => wlan@QCVYF1rmPsMVtklBNDNaB.md} | 2 +- ...a2-vs-wpa3-vs-wep@MBnDE0VyVh2u2p-r90jVk.md | 0 .../content/wps@HSCGbM2-aTnJWUX6jGaDP.md | 0 .../content/xss@2jo1r9O_rCnDwRv1_4Wo-.md | 0 .../content/zero-day@v9njgIxZyabJZ5iND3JGc.md | 0 ...y.md => zero-day@zqRaMmqcLfx400kJ-h0LO.md} | 0 .../cyber-security/cyber-security.json | 28283 +++++++--------- .../roadmaps/cyber-security/cyber-security.md | 3 +- .../cyber-security/migration-mapping.json | 292 + 416 files changed, 12456 insertions(+), 19265 deletions(-) delete mode 100644 src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/100-dhcp.md delete mode 100644 src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/101-dns.md delete mode 100644 src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/106-false-true-negative-positive.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/108-authentication-vs-authorization.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/100-phishing-vishing-whaling-smishing.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/101-spam-vs-spim.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/102-shoulder-surfing.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/103-dumpster-diving.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/104-tailgating.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/105-zero-day.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/106-social-engineering.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/107-reconnaissance.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/108-impersonation.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/109-watering-hole-attack.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/110-drive-by-attack.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/111-typo-squatting.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/112-brute-force-vs-password-spray.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/100-parrot-os.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/100-dos-vs-ddos.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/101-mitm.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/102-arp-poisoning.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/103-evil-twin.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/104-dns-poisoning.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/105-spoofing.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/106-deauth-attack.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/107-vlan-hopping.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/108-rogue-access-point.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/109-war-driving-dialing.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/100-event-logs.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/101-syslogs.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/102-netflow.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/103-packet-captures.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/104-firewall-logs.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/108-arp.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/112-tail.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/101-memory-leak.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/102-xss.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/103-sql-injection.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/104-csrf.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/105-replay-attack.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/106-pass-the-hash.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/107-directory-traversal.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/100-ftp-vs-sftp.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/101-ssl-vs-tls.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/102-ipsec.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/103-dnssec.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/104-ldaps.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/105-srtp.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/106-s-mime.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/tools-for-unintended-purposes/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/100-attck.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/101-kill-chain.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/102-diamond-model.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/100-virus-total.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/101-joe-sandbox.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/102-any-run.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/103-urlvoid.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/104-urlscan.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/105-whois.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/100-antivirus.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/101-antimalware.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/102-edr.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/103-dlp.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/104-firewall-nextgen-firewall.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/105-hips.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/106-nids.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/107-nips.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/108-host-based-firewall.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/109-sandboxing.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/110-acl.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/111-eap-vs-peap.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/112-wpa-vs-wpa2-vs-wpa3-vs-wep.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/113-wps.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/100-siem.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/102-soar.md delete mode 100644 src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/105-concept-of-cdn.md delete mode 100644 src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/106-cloud-services/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/107-cloud-models/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/108-common-cloud-environments/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/index.md create mode 100644 src/data/roadmaps/cyber-security/content/acl@35oCRzhzpVfitQPL4K9KC.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/103-hardening-concepts/104-acls.md => acls@8JM95sonFUhZCdaynUA_M.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/antimalware@9QtY1hMJ7NKLFztYK-mHY.md create mode 100644 src/data/roadmaps/cyber-security/content/antivirus@3140n5prZYySsuBHjqGOJ.md create mode 100644 src/data/roadmaps/cyber-security/content/anyrun@GZHFR43UzN0WIIxGKZOdX.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/102-threat-classification/102-apt.md => apt@l0BvDtwWoRSEjm6O0WDPy.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-the-terminology/102-arp.md => arp@M52V7hmG4ORf4TIVw3W3J.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/arp@fzdZF-nzIL69kaA7kwOCn.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/108-arp.md => arp@hkO3Ga6KctKODr4gos6qX.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/attck@auR7fNyd77W2UA-PjXeJS.md create mode 100644 src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/118-autopsy.md => autopsy@bIwpjIoxSUZloxDuQNpMu.md} (98%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/108-common-cloud-environments/100-aws.md => aws@0LztOTc3NG3OujCVwlcVU.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/108-common-cloud-environments/102-azure.md => azure@GklBi7Qx1akN_cS9UMrha.md} (100%) rename src/data/roadmaps/cyber-security/content/{105-programming-knowledge/104-bash.md => bash@tao0Bb_JR0Ubl62HO8plp.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/123-threat-hunting.md => basics-and-concepts-of-threat-hunting@_x3BgX93N-Pt1_JK7wk0p.md} (100%) rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/104-basics-of-computer-networking.md => basics-of-computer-networking@T0aU8ZQGShmF9uXhWY4sD.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/109-basics-of-ids-ips.md => basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/104-basics-of-nas-and-san.md => basics-of-nas-and-san@umbMBQ0yYmB5PgWfY6zfO.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/121-basics-of-reverse-engineering.md => basics-of-reverse-engineering@uoGA4T_-c-2ip_zfEUcJJ.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/105-basics-of-subnetting.md => basics-of-subnetting@E8Z7qFFW-I9ivr0HzoXCq.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/105-threat-intel-osint.md => basics-of-threat-intel-osint@wN5x5pY53B8d0yopa1z8F.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/122-vulnerability-management.md => basics-of-vulnerability-management@lcxAXtO6LoGd85nOFnLo8.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/107-blue-team-read-team-purple-team.md => blue--red--purple-teams@7tDxTcKJNAUxbHLPCnPFO.md} (100%) rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/101-connection-types/102-bluetooth.md => bluetooth@DbWf5LdqiByPiJa4xHtl_.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/109-common-cloud-storage/102-box.md => box@4Man3Bd-ySLFlAdxbLOHw.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/brute-force-vs-password-spray@Q0i-plPQkb_NIvOQBVaDd.md create mode 100644 src/data/roadmaps/cyber-security/content/buffer-overflow@n8ZOZxNhlnw7DpzoXe_f_.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/107-network-topologies/103-bus-topology.md => bus@0DWh4WmLK_ENDuqQmQcu4.md} (100%) rename src/data/roadmaps/cyber-security/content/{105-programming-knowledge/103-cpp.md => c@8jj9hpe9jQIgCc8Txyw3O.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/109-cat.md => cat@D2ptX6ja_HvFEafMIzWOy.md} (97%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/beginner-certifications/203-ccna.md => ccna@4RD22UZATfL8dc71YkJwQ.md} (100%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/advanced-certifications/209-ceh.md => ceh@AAo7DXB7hyBzO6p05gx1i.md} (98%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/112-auth-methodologies/103-certificates.md => certificates@WXRaVCYwuGQsjJ5wyvbea.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/106-ip-terminology/103-cidr.md => cidr@PPIH1oHW4_ZDyD3U3shDg.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/common-standards/103-cis.md => cis@sSihnptkoEqUsHjDpckhG.md} (99%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/advanced-certifications/201-cisa.md => cisa@lqFp4VLY_S-5tAbhNQTew.md} (97%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/advanced-certifications/202-cism.md => cism@s86x24SHPEbbOB9lYNU-w.md} (90%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/advanced-certifications/200-cissp.md => cissp@BqvijNoRzSGYLCMP-6hhr.md} (99%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/index.md => cloud-skills-and-knowledge@vVaBQ5VtsE_ZeXbCOF8ux.md} (100%) rename src/data/roadmaps/cyber-security/content/{101-operating-systems/learn-for-each/110-common-commands.md => common-commands@WDrSO7wBNn-2jB8mcyT7j.md} (98%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/102-common-ports.md => common-ports-and-their-uses@0tx2QYDYXhm85iYrCWd9U.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/108-common-protocols/index.md => common-protocols-and-their-uses@ViF-mpR17MB3_KJ1rV8mS.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/compliance@05Gbgy6aawYlYIx38u8DE.md rename src/data/roadmaps/cyber-security/content/{extras/certifications/beginner-certifications/200-comptia-aplus.md => comptia-a@lbAgU5lR1O7L_5mCbNz_D.md} (99%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/beginner-certifications/201-comptia-linuxplus.md => comptia-linux@p34Qwlj2sjwEPR2ay1WOK.md} (100%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/beginner-certifications/202-comptia-networkplus.md => comptia-network@4RGbNOfMPDbBcvUFWTTCV.md} (98%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/beginner-certifications/204-comptia-securityplus.md => comptia-security@AxeDcKK3cUtEojtHQPBw7.md} (99%) rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/100-computer-hardware-components.md => computer-hardware-components@Ih0YZt8u9vDwYo8y1t41n.md} (100%) rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/101-connection-types/index.md => connection-types-and-their-function@F1QVCEmGkgvz-_H5lTxY2.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/101-incident-response-process/102-containment.md => containment@l7WnKuR2HTD4Vf9U2TxkK.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/118-zero-trust.md => core-concepts-of-zero-trust@HavEL0u65ZxHt92TfbLzk.md} (100%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/advanced-certifications/208-crest.md => crest@rA1skdztev3-8VmAtIlmr.md} (99%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/common-standards/104-csf.md => csf@HjfgaSEZjW9BOXy_Ixzkk.md} (67%) create mode 100644 src/data/roadmaps/cyber-security/content/csrf@pK2iRArULlK-B3iSVo4-n.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/104-curl.md => curl@W7iQUCjODGYgE4PjC5TZI.md} (97%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/113-cyber-kill-chain.md => cyber-kill-chain@H38Vb7xvuBJXVzgPBdRdT.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/110-dd.md => dd@9xbU_hrEOUtMm-Q09Fe6t.md} (97%) create mode 100644 src/data/roadmaps/cyber-security/content/deauth-attack@LfWJJaT3fv0p6fUeS8b84.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/106-ip-terminology/105-default-gateway.md => default-gateway@5rKaFtjYx0n2iF8uTLs8X.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-the-terminology/107-dhcp.md => dhcp@R5HEeh6jwpQDo27rz1KSH.md} (98%) create mode 100644 src/data/roadmaps/cyber-security/content/dhcp@T4312p70FqRBkzVfWKMaR.md create mode 100644 src/data/roadmaps/cyber-security/content/diamond-model@AY-hoPGnAZSd1ExaYX8LR.md rename src/data/roadmaps/cyber-security/content/{101-operating-systems/learn-for-each/104-versions-and-differences.md => different-versions-and-differences@yXOGqlufAZ69uiBzKFfh6.md} (98%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/107-dig.md => dig@D2YYv1iTRGken75sHO0Gt.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/103-dig.md => dig@XyaWZZ45axJMKXoWwsyFj.md} (99%) create mode 100644 src/data/roadmaps/cyber-security/content/directory-traversal@L0ROYh2DNlkybNDO2ezJY.md create mode 100644 src/data/roadmaps/cyber-security/content/dlp@iolsTC-63d_1wzKGul-cT.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-the-terminology/101-dmz.md => dmz@gfpvDQz61I3zTB7tGu7vp.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-the-terminology/106-dns.md => dns@ORIdKG8H97VkBUYpiDtXf.md} (99%) create mode 100644 src/data/roadmaps/cyber-security/content/dns@r1IKvhpwg2umazLGlQZL1.md create mode 100644 src/data/roadmaps/cyber-security/content/dnssec@LLGXONul7JfZGUahnK0AZ.md create mode 100644 src/data/roadmaps/cyber-security/content/dos-vs-ddos@IF5H0ZJ72XnqXti3jRWYF.md create mode 100644 src/data/roadmaps/cyber-security/content/drive-by-attack@cO70zHvHgBAH29khF-hBW.md rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/109-common-cloud-storage/101-dropbox.md => dropbox@9OastXVfiG1YRMm68ecnn.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md create mode 100644 src/data/roadmaps/cyber-security/content/eap-vs-peap@1jwtExZzR9ABKvD_S9zFG.md create mode 100644 src/data/roadmaps/cyber-security/content/edr@QvHWrmMzO8IvNQ234E_wf.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/103-hardening-concepts/108-endpoint-security.md => endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/101-incident-response-process/103-eradication.md => eradication@N17xAIo7sgbB0nrIDMWju.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/109-virtualization-technologies/102-esxi.md => esxi@BisNooct1vJDKaBKsGR7_.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/event-logs@KbFwL--xF-eYjGy8PZdrM.md create mode 100644 src/data/roadmaps/cyber-security/content/evil-twin@O1fY2n40yjZtJUEeoItKr.md delete mode 100644 src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/extras/certifications/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/extras/ctfs/index.md delete mode 100644 src/data/roadmaps/cyber-security/content/extras/index.md create mode 100644 src/data/roadmaps/cyber-security/content/false-negative--false-positive@XwRCZf-yHJsXVjaRfb3R4.md create mode 100644 src/data/roadmaps/cyber-security/content/firewall-logs@np0PwKy-EvIa_f_LC6Eem.md create mode 100644 src/data/roadmaps/cyber-security/content/firwall--nextgen-firewall@tWDo5R3KU5KOjDdtv801x.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/117-ftk-imager.md => ftk-imager@_jJhL1RtaqHJmlcWrd-Ak.md} (98%) create mode 100644 src/data/roadmaps/cyber-security/content/ftp-vs-sftp@9Z6HPHPj4escSVDWftFEx.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/108-common-protocols/102-ftp.md => ftp@ftYYMxRpVer-jgSswHLNa.md} (100%) rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/index.md => fundamental-it-skills@oimYzZYFXKjgvc7D4c-2u.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/108-common-cloud-environments/101-gcp.md => gcp@tOLA5QPKi6LHl1ljsOMwX.md} (100%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/advanced-certifications/206-giac.md => giac@ZiUT-lyIBfHTzG-dwSy96.md} (99%) rename src/data/roadmaps/cyber-security/content/{105-programming-knowledge/101-go.md => go@jehVvdz8BnruKjqHMKu5v.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/109-common-cloud-storage/104-google-drive.md => google-drive@fTZ4PqH-AMhYA_65w4wFO.md} (100%) rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/103-popular-suites/101-google-suite.md => google-suite@IOK_FluAv34j3Tj_NvwdO.md} (100%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/advanced-certifications/204-gpen.md => gpen@t4h9rEKWz5Us0qJKXhxlX.md} (99%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/113-grep.md => grep@Dfz-6aug0juUpMmOJLCJ9.md} (97%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/103-hardening-concepts/103-group-policy.md => group-policy@FxuMJmDoDkIsPFp2iocFg.md} (100%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/advanced-certifications/203-gsec.md => gsec@nlmATCTgHoIoMcEOW8bUW.md} (99%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/110-virutalization-basics/102-guest-os.md => guestos@LocGETHz6ANYinNd5ZLsS.md} (100%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/advanced-certifications/205-gwapt.md => gwapt@rwniCTWfYpKP5gi02Pa9f.md} (98%) rename src/data/roadmaps/cyber-security/content/{extras/ctfs/200-hack-the-box.md => hackthebox@wkuE_cChPZT2MHyGjUuU4.md} (99%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/100-cryptography/101-hashing.md => hashing@0UZmAECMnfioi-VeXcvg8.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/111-head.md => head@VNmrb5Dm4UKUgL8JBfhnE.md} (98%) create mode 100644 src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/110-honeypots.md => honeypots@bj5YX8zhlam0yoNckL8e4.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/host-based-firwall@jWl1VWkZn3n1G2eHq6EnX.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/110-virutalization-basics/103-host-os.md => hostos@p7w3C94xjLwSMm5qA8XlL.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/106-hping.md => hping@Cclbt4bNfkHwFwZOvJuLK.md} (99%) create mode 100644 src/data/roadmaps/cyber-security/content/hr@05tH6WhToC615JTFN-TPc.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/108-common-protocols/104-http-https.md => http--https@3Awm221OJHxXNLiL9yxfd.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/107-cloud-models/102-hybrid.md => hybrid@ywRlTuTfh5-NHnv4ZyW1t.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/110-virutalization-basics/100-hypervisor.md => hypervisor@CIoLaRv5I3sCr9tBnZHEi.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/106-cloud-services/102-iaas.md => iaas@1nPifNUm-udLChIqLC_uK.md} (100%) rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/103-popular-suites/100-icloud.md => icloud@E7yfALgu9E2auOYDOTmex.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/109-common-cloud-storage/105-icloud.md => icloud@Wqy6ki13hP5c0VhGYEhHj.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/101-incident-response-process/101-identification.md => identification@XsRoldaBXUSiGbvY1TjQd.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md delete mode 100644 src/data/roadmaps/cyber-security/content/index.md rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/101-connection-types/103-infrared.md => infrared@KsZ63c3KQLLn373c5CZnp.md} (100%) rename src/data/roadmaps/cyber-security/content/{101-operating-systems/learn-for-each/103-install-and-configure.md => installation-and-configuration@02aaEP9E5tlefeGBxf_Rj.md} (99%) rename src/data/roadmaps/cyber-security/content/{101-operating-systems/learn-for-each/107-installing-apps.md => installing-software-and-applications@Ot3LGpM-CT_nKsNqIKIye.md} (99%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-the-terminology/105-ip.md => ip@FdoqB2---uDAyz6xZjk_u.md} (98%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/functions-of-each/103-ipam.md => ipam@hN8p5YBcSaPm-byQUIz8L.md} (97%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/105-ipconfig.md => ipconfig@IXNGFF4sOFbQ_aND-ELK0.md} (99%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/103-ipconfig.md => ipconfig@u-6xuZUyOrogh1bU4cwER.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/ipsec@gNFVtBxSYP5Uw3o3tlJ0M.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/101-iptables.md => iptables@jr8JlyqmN3p7Ol3_kD9AH.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/common-standards/100-iso.md => iso@oRssaVG-K-JwlL6TAHhXw.md} (99%) rename src/data/roadmaps/cyber-security/content/{105-programming-knowledge/102-javascript.md => javascript@2SThr6mHpX6rpW-gmsqxG.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/joe-sandbox@h__KxKa0Q74_egY7GOe-L.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/103-hardening-concepts/107-jump-server.md => jump-server@UF3BV1sEEOrqh5ilnfM1B.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/kali-linux@w6wXkoLrv0_d-Ah0txUHd.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/112-auth-methodologies/100-kerberos.md => kerberos@lG6afUOx3jSQFxbH92otL.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/100-cryptography/102-key-exchange.md => key-exchange@rmR6HJqEhHDgX55Xy5BAW.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/kill-chain@7Bmp4x6gbvWMuVDdGRUGj.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/102-threat-classification/101-known-vs-unknown.md => known-vs-unknown@HPlPGKs7NLqmBidHJkOZg.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-these/101-lan.md => lan@xWxusBtMEWnd-6n7oqjHz.md} (98%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/112-auth-methodologies/101-ldap.md => ldap@lV3swvD6QGLmD9iVfbKIF.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/ldaps@z_fDvTgKw51Uepo6eMQd9.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/100-malware-and-types.md => learn-how-malware-works-and-types@v7CD_sHqLWbm9ibXXESIK.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/legal@C5bCIdPi0gGkY_r4qqoXZ.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/101-incident-response-process/105-lessons-learned.md => lessons-learned@ErRol7AT02HTn3umsPD_0.md} (100%) rename src/data/roadmaps/cyber-security/content/{101-operating-systems/101-linux.md => linux@4frVcjYI1VlVU9hQgpwcT.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/112-auth-methodologies/104-local-auth.md => local-auth@vYvFuz7lAJXZ1vK_4999a.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/106-ip-terminology/101-localhost.md => localhost@0TWwox-4pSwuXojI8ixFO.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/tools-for-unintended-purposes/100-lolbas.md => lolbas@10qbxX8DCrfyH7tgYexxQ.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/106-ip-terminology/102-loopback.md => loopback@W_oloLu2Euz5zRSy7v_T8.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/103-hardening-concepts/100-mac-based.md => mac-based@OAukNfV5T0KTnIF9jKYRF.md} (100%) rename src/data/roadmaps/cyber-security/content/{101-operating-systems/102-macos.md => macos@dztwr-DSckggQbcNIi4_2.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-these/100-man.md => man@LrwTMH_1fTd8iB9wJg-0t.md} (98%) create mode 100644 src/data/roadmaps/cyber-security/content/management@s9tHpzYRj2HCImwQhnjFM.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/116-memdump.md => memdump@wspNQPmqWRjKoFm6x_bVw.md} (99%) create mode 100644 src/data/roadmaps/cyber-security/content/memory-leak@nOND14t7ISgSH3zNpV3F8.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/107-network-topologies/102-mesh-topology.md => mesh@PYeF15e7iVB9seFrrO7W6.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/114-mfa-2fa.md => mfa--2fa@pnfVrOjDeG1uYAeqHxhJP.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/mitm@ODlVT6MhV-RVUbRMG0mHi.md rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/103-popular-suites/102-ms-office-suite.md => ms-office-suite@-5haJATqlmj0SFSFAqN6A.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/103-hardening-concepts/101-nac-based.md => nac-based@6oAzYfwsHQYNVbi7c2Tly.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-the-terminology/104-nat.md => nat@Kkd3f_0OYNCdpDgrJ-_Ju.md} (99%) rename src/data/roadmaps/cyber-security/content/{101-operating-systems/learn-for-each/105-navigating-using-gui-and-cli.md => navigating-using-gui-and-cli@MGitS_eJBoY99zOR-W3F4.md} (99%) create mode 100644 src/data/roadmaps/cyber-security/content/netflow@xXz-SwvXA2cLfdCd-hLtW.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/104-netstat.md => netstat@2M3PRbGzo14agbEPe32ww.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/index.md => networking-knowledge@gSLr-Lc119eX9Ig-kDzJ2.md} (100%) rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/101-connection-types/100-nfc.md => nfc@hwAUFLYpc_ftCfXq95dey.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/nids@LIPtxl_oKZRcbvXT4EdNf.md create mode 100644 src/data/roadmaps/cyber-security/content/nips@7w9qj16OD4pUzq-ItdxeK.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/common-standards/101-nist.md => nist@SOkJUTd1NUKSwYMIprv4m.md} (99%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/100-nmap.md => nmap@Hoou7kWyfB2wx_yFHug_H.md} (99%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/110-nmap.md => nmap@xqwIEyGfdZFxk6QqbPswe.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/102-nslookup.md => nslookup@OUarb1oS1-PX_3OXNR0rV.md} (97%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/100-nslookup.md => nslookup@tk4iG5i1Ml9w9KRO1tGJU.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/functions-of-each/102-ntp.md => ntp@tf0TymdPHbplDHvuVIIh4.md} (98%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/100-cryptography/105-obfuscation.md => obfuscation@kxlg6rpfqqoBfmMMg3EkJ.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/109-common-cloud-storage/103-one-drive.md => onedrive@MWqnhDKm9jXvDDjkeVNxm.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/112-os-hardening.md => operating-system-hardening@_S25EOGS3P8647zLM5i-g.md} (100%) rename src/data/roadmaps/cyber-security/content/{101-operating-systems/index.md => operating-systems@UY6xdt_V3YMkZxZ1hZLvW.md} (100%) rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/102-os-independent-troubleshooting.md => os-independent-troubleshooting@pJUhQin--BGMuXHPwx3JJ.md} (100%) rename src/data/roadmaps/cyber-security/content/{extras/certifications/advanced-certifications/207-oscp.md => oscp@SwVGVP2bbCFs2uNg9Qtxb.md} (98%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/106-cloud-services/101-paas.md => paas@PQ_np6O-4PK2V-r5lywQg.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/packet-captures@TIxEkfBrN6EXQ3IKP1B7u.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/102-packet-sniffers.md => packet-sniffers@k6UX0BJho5arjGD2RWPgH.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/parrotos@zR6djXnfTSFVEfvJonQjf.md create mode 100644 src/data/roadmaps/cyber-security/content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/103-hardening-concepts/106-patching.md => patching@e-MDyUR3GEv-e4Qsx_5vV.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/120-penetration-rules-of-engagement.md => penetration-testing-rules-of-engagement@NkAAQikwH-A6vrF8fWpuB.md} (100%) rename src/data/roadmaps/cyber-security/content/{101-operating-systems/learn-for-each/108-performing-crud-on-files.md => performing-crud-on-files@zRXyoJMap9irOYo3AdHE8.md} (98%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/119-perimiter-dmz-segmentation.md => perimiter-vs-dmz-vs-segmentation@PUgPgpKio4Npzs86qEXa7.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/phishing@7obusm5UtHwWMcMMEB3lt.md rename src/data/roadmaps/cyber-security/content/{extras/ctfs/203-pico-ctf.md => picoctf@pou5xHwnz9Zsy5J6lNlKq.md} (99%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/106-ping.md => ping@GuuY-Q6FZzfspB3wrH64r.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/107-ping.md => ping@yfTpp-ePuDB931FnvNB-Y.md} (98%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/100-cryptography/103-pki.md => pki@fxyJxrf3mnFTa3wXk1MCW.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/103-hardening-concepts/102-port-blocking.md => port-blocking@W7bcydXdwlubXF2PHKOuq.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/105-port-scanners.md => port-scanners@iJRQHzh5HXADuWpCouwxv.md} (100%) rename src/data/roadmaps/cyber-security/content/{105-programming-knowledge/105-power-shell.md => power-shell@paY9x2VJA98FNGBFGRXp2.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/101-incident-response-process/100-preparation.md => preparation@w6V4JOtXKCMPAkKIQxvMg.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/100-cryptography/104-private-vs-public-key.md => private-vs-public-keys@7svh9qaaPp0Hz23yinIye.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/107-cloud-models/100-private.md => private@ecpMKP1cQXXsfKETDUrSf.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/102-privilege-escalation-attacks.md => privilege-escalation@cvI8-sxY5i8lpelW9iY_5.md} (100%) rename src/data/roadmaps/cyber-security/content/{105-programming-knowledge/index.md => programming-skills-optional-but-recommended@_RnuQ7952N8GWZfPD60sJ.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/109-protocol-analyzers.md => protocol-analyzers@K05mEAsjImyPge0hDtsU0.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/109-virtualization-technologies/104-proxmox.md => proxmax@jqX1A5hFF3Qznqup4lfiF.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/106-ip-terminology/100-public-vs-private-ip-addresses.md => public-vs-private-ip-addresses@2nQfhnvBjJg1uDZ28aE4v.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/107-cloud-models/101-public.md => public@ZDj7KBuyZsKyEMZViMoXW.md} (100%) rename src/data/roadmaps/cyber-security/content/{105-programming-knowledge/100-python.md => python@XiHvGy--OkPFfJeKA6-LP.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/112-auth-methodologies/105-radius.md => radius@tH3RLnJseqOzRIbZMklHD.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/108-common-protocols/101-rdp.md => rdp@Ia6M1FKPNpqLDiWx7CwDh.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/reconnaissance@UU_inxa8Y2lLP2BRhdLDT.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/101-incident-response-process/104-recovery.md => recovery@vFjbZAJq8OfLb3_tsc7oT.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/107-network-topologies/101-ring-topology.md => ring@9vEUVJ8NTh0wKyIE6-diY.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/common-standards/102-rmf.md => rmf@fjEdufrZAfW4Rl6yDU8Hk.md} (97%) create mode 100644 src/data/roadmaps/cyber-security/content/rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/117-compliance-and-auditors.md => roles-of-compliance-and-auditors@kqT0FRLt9Ak9P8PhHldO-.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/111-route.md => route@xFuWk7M-Vctk_xb7bHbWs.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-the-terminology/108-router.md => router@lwSFIbIX-xOZ0QK2sGFb1.md} (99%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/109-common-cloud-storage/100-s3.md => s3@2jsTgT7k8MeaDtx6RJhOP.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/106-cloud-services/100-saas.md => saas@sVw5KVNxPEatBRKb2ZbS_.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/100-cryptography/100-salting.md => salting@jqWhR6oTyX6yolUBv71VC.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/sandboxing@SLKwuLHHpC7D1FqrpPRAe.md rename src/data/roadmaps/cyber-security/content/{extras/ctfs/204-sans-holiday-hack-challenge.md => sans-holiday-hack-challenge@WCeJrvWl837m1BIjuA1Mu.md} (99%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/index.md => security-skills-and-knowledge@_hYN0gEi9BL24nptEtXWU.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/108-common-protocols/103-sftp.md => sftp@YEy6o-clTBKZp1yOkLwNb.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/shoulder-surfing@FD0bkmxNpPXiUB_NevEUf.md create mode 100644 src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/103-hardening-concepts/105-sinkholes.md => sinkholes@oFgyQYL3Ws-l7B5AF-bTR.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/smime@9rmDvycXFcsGOq3v-_ziD.md create mode 100644 src/data/roadmaps/cyber-security/content/smishing@d4U6Jq-CUB1nNN2OCFoum.md create mode 100644 src/data/roadmaps/cyber-security/content/soar@i0ulrA-GJrNhIVmzdWDrn.md create mode 100644 src/data/roadmaps/cyber-security/content/social-engineering@O1VceThdxRlgQ6DcGyY7Y.md create mode 100644 src/data/roadmaps/cyber-security/content/spam-vs-spim@cbEMUyg_btIPjdx-XqIM5.md create mode 100644 src/data/roadmaps/cyber-security/content/spoofing@LteSouUtAj3JWWOzcjQPl.md create mode 100644 src/data/roadmaps/cyber-security/content/sql-injection@P-Am25WJV8cFd_KsX7cdj.md create mode 100644 src/data/roadmaps/cyber-security/content/srtp@_9lQSG6fn69Yd9rs1pQdL.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/108-common-protocols/100-ssh.md => ssh@8Mog890Lj-gVBpWa05EzT.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/108-common-protocols/105-ssl-tls.md => ssl--tls@LKK1A5-xawA7yCIAWHS8P.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/103-ssl-and-tls-basics.md => ssl-and-tls-basics@dJ0NUsODFhk52W2zZxoPh.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/ssl-vs-tls@6ILPXeUDDmmYRiA_gNTSr.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/112-auth-methodologies/102-sso.md => sso@xL32OqDKm6O043TYgVV1r.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/stakeholders@lv6fI3WeJawuCbwKtMRIh.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/107-network-topologies/100-star-topology.md => star@P0ZhAXd_H-mTOMr13Ag31.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/106-ip-terminology/104-subnet-mask.md => subnet-mask@f-v8qtweWXFY_Ryo3oYUF.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-the-terminology/109-switch.md => switch@r9byGV8XuBPzoqj5ZPf2W.md} (98%) create mode 100644 src/data/roadmaps/cyber-security/content/syslogs@7oFwRkmoZom8exMDtMslX.md create mode 100644 src/data/roadmaps/cyber-security/content/tail@762Wf_Eh-3zq69CZZiIjR.md create mode 100644 src/data/roadmaps/cyber-security/content/tailgating@o-keJgF9hmifQ_hUD91iN.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/112-tcpdump.md => tcpdump@y8GaUNpaCT1Ai88wPOk6d.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/111-troubleshooting-tools/113-tracert.md => tracert@cSz9Qx3PGwmhq3SSKYKfg.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/101-tracert.md => tracert@jJtS0mgCYc0wbjuXssDRO.md} (99%) rename src/data/roadmaps/cyber-security/content/{101-operating-systems/learn-for-each/109-troubleshooting.md => troubleshooting@xeRWOX1fWQDLNLWMAFTEe.md} (98%) create mode 100644 src/data/roadmaps/cyber-security/content/true-negative--true-positive@M6uwyD4ibguxytf1od-og.md rename src/data/roadmaps/cyber-security/content/{extras/ctfs/201-try-hack-me.md => tryhackme@kht-L7_v-DbglMYUHuchp.md} (99%) create mode 100644 src/data/roadmaps/cyber-security/content/typo-squatting@0LeDwj_tMaXjQBBOUJ5CL.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/115-backups-and-resiliency.md => understand-backups-and-resiliency@9asy3STW4oTYYHcUazaRj.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/124-forensics.md => understand-basics-of-forensics@7KLGFfco-hw7a62kXtS3d.md} (100%) rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/103-popular-suites/index.md => understand-basics-of-popular-suites@_7RjH4Goi0x6Noy6za0rP.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/103-cia-triad.md => understand-cia-triad@uz6ELaLEu9U4fHVfnQiOa.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/127-common-exploit-frameworks.md => understand-common-exploit-frameworks@Lg7mz4zeCToEzZBFxYuaU.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/128-common-hacking-tools.md => understand-common-hacking-tools@rzY_QsvnC1shDTPQ-til0.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/126-defense-in-depth.md => understand-concept-of-defense-in-depth@Rae-f9DHDZuwIwW6eRtKF.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/111-concept-of-isolation.md => understand-concept-of-isolation@aDF7ZcOX9uR8l0W4aqhYn.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/125-runbooks.md => understand-concept-of-runbooks@Ec6EairjFJLCHc7b-1xxe.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/104-handshakes.md => understand-handshakes@zQx_VUS1zRmF4zCGjJD5-.md} (100%) rename src/data/roadmaps/cyber-security/content/{101-operating-systems/learn-for-each/106-understand-permissions.md => understand-permissions@bTfL7cPOmBBFl-eHxUJI6.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/101-cloud-deployment-flow.md => understand-the-basics-and-general-flow-of-deploying-in-the-cloud@XL3FVeGFDhAl_gSol6Tjt.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/103-infra-as-code.md => understand-the-concept-of-infrastructure-as-cloud@RJctUpvlUJGAdwBNtDSXw.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/100-security-concept-in-the-cloud.md => understand-the-concept-of-security-in-the-cloud@ThLsXkqLw--uddHz0spCH.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/104-concept-of-serverless.md => understand-the-concept-of-serverless@-83ltMEl3le3yD68OFnTM.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/116-definition-of-risk.md => understand-the-definition-of-risk@ggAja18sBUUdCfVsT0vCv.md} (100%) rename src/data/roadmaps/cyber-security/content/{104-cloud-skills-and-knowledge/102-cloud-vs-onpremises.md => understand-the-differences-between-cloud-and-on-premises@KGjYM4Onr5GQf1Yv9IabI.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/100-osi-model.md => understand-the-osi-model@OXUd1UPPsBhNoUGLKZJGV.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/urlscan@lMiW2q-b72KUl-2S7M6Vb.md create mode 100644 src/data/roadmaps/cyber-security/content/urlvoid@lFt1k1Q-NlWWqyDA3gWD1.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/109-virtualization-technologies/101-virtualbox.md => virtualbox@vGVFhZXYOZOy4qFpLLbxp.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/virustotal@rxzcAzHjzIc9lkWSw0fef.md create mode 100644 src/data/roadmaps/cyber-security/content/vlan-hopping@u4hySof6if5hiONSaW-Uf.md rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-the-terminology/100-vlan.md => vlan@d5Cv3EXf6OXW19yPJ4x6e.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/110-virutalization-basics/101-vm.md => vm@251sxqoHggQ4sZ676iX5w.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-the-terminology/103-vm.md => vm@ZTC5bLWEIQcdmowc7sk_E.md} (98%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/109-virtualization-technologies/100-vmware.md => vmware@AjywuCZdBi9atGUbetlUL.md} (100%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-the-terminology/110-vpn.md => vpn@gTozEpxJeG1NTkVBHH-05.md} (95%) rename src/data/roadmaps/cyber-security/content/{extras/ctfs/202-vuln-hub.md => vulnhub@W94wY_otBuvVW_-EFlKA6.md} (99%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/106-ip-terminology/102-wan.md => wan@vCkTJMkDXcQmwsmeNUAX5.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/watering-hole-attack@dcvuKHq0nHgHLcLwtl4IJ.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/101-owasp-top-10.md => web-based-attacks-and-owasp10@fyOYVqiBqyKC4aqc6-y0q.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/content/whaling@KSwl6sX2W47vUmytpm8LH.md create mode 100644 src/data/roadmaps/cyber-security/content/whishing@M65fCl72qlF0VTbGNT6du.md create mode 100644 src/data/roadmaps/cyber-security/content/whois@-RnlvUltJ9IDtH0HEnMbN.md rename src/data/roadmaps/cyber-security/content/{100-basic-it-skills/101-connection-types/101-wifi.md => wifi@fUBNKHNPXbemRYrnzH3VT.md} (100%) rename src/data/roadmaps/cyber-security/content/{101-operating-systems/100-windows.md => windows@BNUKEQ4YpZmIhSPQdkHgU.md} (100%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/115-winhex.md => winhex@gNan93Mg9Ym2AF3Q2gqoi.md} (98%) rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/incident-response-and-discovery-tools/114-wireshark.md => wireshark@Sm9bxKUElINHND8FdZ5f2.md} (97%) rename src/data/roadmaps/cyber-security/content/{102-networking-knowledge/understand-these/103-wlan.md => wlan@QCVYF1rmPsMVtklBNDNaB.md} (98%) create mode 100644 src/data/roadmaps/cyber-security/content/wpa-vs-wpa2-vs-wpa3-vs-wep@MBnDE0VyVh2u2p-r90jVk.md create mode 100644 src/data/roadmaps/cyber-security/content/wps@HSCGbM2-aTnJWUX6jGaDP.md create mode 100644 src/data/roadmaps/cyber-security/content/xss@2jo1r9O_rCnDwRv1_4Wo-.md create mode 100644 src/data/roadmaps/cyber-security/content/zero-day@v9njgIxZyabJZ5iND3JGc.md rename src/data/roadmaps/cyber-security/content/{103-security-skills-and-knowledge/102-threat-classification/100-zero-day.md => zero-day@zqRaMmqcLfx400kJ-h0LO.md} (100%) create mode 100644 src/data/roadmaps/cyber-security/migration-mapping.json diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/index.md b/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/index.md deleted file mode 100644 index 8509b3773..000000000 --- a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/index.md +++ /dev/null @@ -1 +0,0 @@ -# Learn for each diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/index.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/index.md deleted file mode 100644 index a9a084de3..000000000 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/index.md +++ /dev/null @@ -1,43 +0,0 @@ -# IP Terminology - -Understanding IP Terminology is essential in grasping the fundamentals of networking and cybersecurity. In this section, we'll cover essential terms in the world of IP networks. - -## Internet Protocol (IP) - -IP is a protocol that enables data exchange between computers over a network. Each device in the network has a unique IP address, enabling data packets to be sent correctly. - -## IPv4 and IPv6 - -_IPv4_: It's the fourth version of IP, using 32-bit addresses and allowing a total of about 4.3 billion unique addresses. - -_IPv6_: To overcome the exhaustion of IPv4 addresses, IPv6 was introduced. It expands the number of unique addresses by using 128-bit addresses, providing a virtually limitless pool of addresses. - -## IP Address - -An IP address is a unique identifier for devices on the internet or a local network. It helps in routing the data packets between different devices in the network. - -## Subnets - -A subnet is a smaller, designated portion of a network. Subnet masks help to define and isolate each subnet to manage traffic. - -## DHCP (Dynamic Host Configuration Protocol) - -DHCP is a protocol that assigns IP addresses dynamically to devices when they connect to a network, as opposed to static IP addresses. - -## DNS (Domain Name System) - -DNS is the system responsible for translating human-readable domain names like www.example.com into IP addresses so that data can be routed correctly. - -## Ports - -A port is a communication endpoint within a networking device. It allows the device to differentiate multiple connections and applications. Protocols, such as HTTP and FTP, have assigned default ports (80 and 21, respectively). - -## NAT (Network Address Translation) - -NAT allows multiple devices in a private network to share a single public IP address when connecting to the internet. This conserves the number of IP addresses and adds an additional layer of privacy. - -## Firewall - -A firewall is a security measure that filters, monitors, and controls incoming and outgoing traffic in a network. It helps to protect devices and data from unauthorized access or malicious activities. - -By understanding these IP terminologies, you'll be better equipped to handle networking and cybersecurity tasks. diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/index.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/index.md deleted file mode 100644 index 12e02a22d..000000000 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/index.md +++ /dev/null @@ -1,78 +0,0 @@ -# Network Topologies - -Network topologies describe the arrangement of various devices in a network, their connections, and the flow of data between them. Understanding common network topologies can help you identify potential vulnerabilities and enhance your overall cybersecurity posture. Here, we'll briefly discuss the different types of network topologies and their advantages and disadvantages. - -## Bus Topology - -In a bus topology, all devices in the network are connected to a single communication medium (usually a coaxial cable) called a "bus." Data is transmitted in a single direction along the bus, and devices look for their address in the data to know if it's meant for them. - -**Advantages:** - -- Easy to set up and extend -- Requires less cabling than other topologies - -**Disadvantages:** - -- If the main cable fails, the entire network fails -- Performance degrades as more devices are added -- Limited cable length and number of devices - -## Star Topology - -A star topology connects all devices to a central point or hub (typically a switch or a router). The central point is responsible for transmitting data between devices in the network. - -**Advantages:** - -- Easy to add or remove devices without affecting the rest of the network -- If one device fails, it doesn't affect the entire network -- Centralized management - -**Disadvantages:** - -- Requires more cabling than bus topology -- If the central hub fails, the entire network fails - -## Ring Topology - -In a ring topology, devices are connected in a circular pattern, with each device having exactly two neighbors. Data is transmitted in one direction around the ring, passing through each device before reaching its destination. - -**Advantages:** - -- Equal access to resources for all devices -- Can handle high-traffic loads - -**Disadvantages:** - -- Adding or removing devices can disrupt the network -- If one device fails, it can affect the entire network -- Data transmission can be slow due to the loop structure - -## Mesh Topology - -A mesh topology connects all devices directly to every other device in the network. It can be a full mesh (where every device is connected to every other device) or a partial mesh (where some devices are connected to all others, while others maintain only a few connections). - -**Advantages:** - -- High fault-tolerance and redundancy, making it more resilient -- Eliminates the need for a central hub - -**Disadvantages:** - -- Requires a large number of cables, making it expensive and difficult to manage -- Can be challenging to set up and maintain - -## Hybrid Topology - -A hybrid topology combines two or more different topologies, such as a star and ring topology, in a single network. It can be customized to fit specific network requirements and performance needs. - -**Advantages:** - -- Can be tailored to meet specific needs -- Optimizes the strengths of various topologies - -**Disadvantages:** - -- Can be complex and difficult to manage -- More expensive than other topologies - -Understanding these different network topologies can help you design a more secure and efficient network or improve the existing network structure in your organization. It's essential to consider factors such as scalability, reliability, and cost when selecting the best topology for your needs. diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/index.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/index.md deleted file mode 100644 index 10b3e4bb9..000000000 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/index.md +++ /dev/null @@ -1,38 +0,0 @@ -# Common Virtualization Technologies - -Virtualization technologies play a critical role in improving the efficiency, flexibility, and resilience of IT infrastructure. These technologies allow multiple operating systems and applications to run simultaneously on a single physical machine, enhancing the utilization of hardware resources and reducing costs. In the context of cybersecurity, virtualization tools provide additional layers of security and isolation, making it more difficult for attackers to compromise the entire system. - -In this section, we will discuss the following aspects of virtualization technologies: - -## What is Virtualization? - -Virtualization is the process of creating virtual instances of physical resources, such as hardware platforms, storage devices, or network resources. It enables operating systems, applications, and data to run on a shared pool of resources, which can be dynamically allocated and managed according to the needs of the system. - -## Types of Virtualization - -There are various types of virtualization, such as: - -- **Server virtualization**: The creation of multiple virtual servers on a single physical server to optimize resource utilization and facilitate fault isolation. -- **Desktop virtualization**: The separation of a user's computer environment from the physical device, enabling centralized management, improved security, and simplified maintenance. -- **Network virtualization**: The process of combining multiple physical networks into a single virtual network, offering better performance, security, and ease of management. -- **Storage virtualization**: The pooling of physical storage resources from multiple storage devices into a single, virtualized storage environment, allowing for simplified management, improved efficiency, and enhanced scalability. - -## Benefits of Virtualization - -Some of the key benefits of virtualization technologies include: - -- **Improved resource utilization**: By virtualizing resources, organizations can make better use of their hardware and IT infrastructure, ultimately reducing costs and environmental impact. -- **Increased agility**: Virtualization allows IT teams to provision resources quickly, enabling them to respond rapidly to changing business needs. -- **Enhanced security**: By isolating virtual environments, organizations can prevent the spread of malware and minimize the impact of security breaches. -- **Disaster recovery and business continuity**: Virtualization simplifies backup, replication, and recovery processes, ensuring that businesses can resume operations quickly after a disaster. - -## Popular Virtualization Software and Solutions - -There are several virtualization software and solutions available in the market, such as: - -- **VMware**: A leader in virtualization technology, offering solutions for server, desktop, storage, and network virtualization. -- **Microsoft Hyper-V**: A built-in virtualization solution for Windows Server, allowing for server, desktop, and storage virtualization. -- **Citrix XenServer**: An open-source virtualization platform that supports server, desktop, and network virtualization. -- **Oracle VM VirtualBox**: A free and open-source virtualization solution that supports server, desktop, and storage virtualization. - -To protect your organization's information assets and ensure the security of your virtualized environments, it's essential to understand virtualization technologies and implement best practices. In the sections that follow, we will discuss essential security measures and techniques to improve the overall cybersecurity posture of your virtualized infrastructure. diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/index.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/index.md deleted file mode 100644 index 9b521b16b..000000000 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/index.md +++ /dev/null @@ -1,37 +0,0 @@ -# Understand basics of Virtualization - -**Virtualization** is a key concept in the world of cybersecurity and IT infrastructure. It involves the creation of virtual (rather than physical) instances of resources, such as operating systems, servers, storage devices, and network components. By leveraging virtualization, multiple virtual instances can run on the same hardware simultaneously, resulting in more efficient use of resources, improved scalability, and reduced costs. - -Let's take a brief look at some virtualization basics: - -## Types of Virtualization - -- **Server Virtualization**: Server virtualization is the process of partitioning a physical server into multiple virtual servers. This allows several virtual machines (VMs) to run on a single server, each using a different operating system and each isolated from the others. - -- **Storage Virtualization**: Storage virtualization involves the pooling of multiple storage devices into a single, virtualized storage unit. It simplifies storage management and allows for better resource utilization. - -- **Network Virtualization**: Network virtualization is the process of combining hardware and software network resources and functionality into a single, virtualized network. It facilitates management and provisioning of resources, as well as improves network automation and flexibility. - -- **Application Virtualization**: Application virtualization involves the separation of an application from its underlying operating system, allowing applications to run on various platforms without having to be installed on each device. This streamlines deployment, management, and updates of applications. - -## Advantages of Virtualization - -- **Cost Savings**: Virtualization reduces the need for physical hardware, resulting in reduced power consumption, cooling, and physical space requirements. - -- **Scalability**: Virtual instances can be easily created, decommissioned, or scaled up or down depending on the needs of the organization. This allows for better utilization of resources, on-demand capacity, and rapid deployment of new applications or services. - -- **Improved Security**: Virtualized environments can provide security benefits through isolation between VMs, reducing the potential impact of a security breach. - -- **Disaster Recovery**: Virtualization enables easier backup and replication of VMs, which simplifies disaster recovery planning and reduces downtime in the event of hardware failure or data loss. - -## Popular Virtualization Solutions - -- **VMware**: VMware is a widely used virtualization platform that provides various solutions, such as vSphere, for server virtualization, NSX for network virtualization, and vSAN for storage virtualization. - -- **Microsoft Hyper-V**: Hyper-V is a Windows Server-based virtualization platform, allowing you to create and manage VMs on Windows or Linux operating systems. - -- **Citrix XenServer**: XenServer is another popular virtualization solution that provides a scalable, high-performance server virtualization platform. - -- **Oracle VirtualBox**: VirtualBox is a free, open-source virtualization solution that supports various operating systems, making it a popular choice for developers and researchers. - -Understanding the basics of virtualization can help you better maintain, secure, and optimize your IT infrastructure. As you continue your journey through cybersecurity, consider diving deeper into the various aspects of virtualization and explore how it can benefit your organization. diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/index.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/index.md deleted file mode 100644 index 0149f65de..000000000 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/index.md +++ /dev/null @@ -1,41 +0,0 @@ -# Troubleshooting Tools - -In this section, we will discuss various troubleshooting tools that you can use to diagnose and resolve network-related issues. Possessing a strong understanding of these tools is crucial for maintaining a secure and efficient network. - -## Ping - -`Ping` is a basic command-line tool used to test the reachability of a network host. It sends ICMP Echo Request packets to the target host and waits for an ICMP Echo Reply. If the target host is reachable, you will receive the packets back with round-trip time statistics. - -Usage: `ping [target host/IP]` - -## Traceroute/tracert - -`traceroute` (Linux) and `tracert` (Windows) are command-line tools used to display the path taken by packets across a network. They can help to identify routing problems, latency, and packet loss. - -Usage: `traceroute [target host/IP]` or `tracert [target host/IP]` - -## Nslookup - -`nslookup` is a network administration command-line tool used to query Domain Name System (DNS) servers for host information or IP address resolution. - -Usage: `nslookup [hostname]` - -## Netstat - -The `netstat` command is a versatile command-line tool that displays network connections, routing tables, and network interface statistics. It can help identify critical connections, open ports, and listening services. - -Usage: `netstat [-options]` - -## Nmap - -`Nmap` (Network Mapper) is an open-source tool for network discovery and security auditing. It can scan for open ports, running services, and identify network vulnerabilities. - -Usage: `nmap [-options] [target host/IP]` - -## Wireshark - -`Wireshark` is a widely-used network protocol analyzer that allows you to capture and analyze network traffic in real-time. It provides detailed information about packets, protocols, and network behavior that aids in troubleshooting and security analysis. - -Download link: [https://www.wireshark.org/download.html](https://www.wireshark.org/download.html) - -Understanding these troubleshooting tools and their applications will help you resolve network issues more effectively and maintain a secure IT infrastructure. Remember to balance security and functionality when managing your network. Practicing good cyber hygiene, staying updated with the latest threats, and continuously assessing your network security will help you stay one step ahead of potential attackers. diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/index.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/index.md deleted file mode 100644 index c68da5b59..000000000 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/index.md +++ /dev/null @@ -1,29 +0,0 @@ -# Authentication Methodologies - -Authentication methodologies are techniques and processes employed in order to verify the identity of a user, device, or system attempting to access restricted data or resources within a network. This is a crucial backbone of cyber security as it ensures that only verified and authorized users can interact with sensitive data and services. In this section, we will explore various authentication methodologies that you can implement to enhance the security of your network. - -## Password-based Authentication - -One of the most widely adopted authentication methods is the use of passwords. A user provides a username and a secret password, which are then compared to stored credentials. If the provided credentials match the stored ones, access is granted. This method can be strengthened by enforcing strong password policies, such as requiring a combination of upper and lowercase letters, numbers, and special characters. - -## Multi-factor Authentication (MFA) - -MFA involves the use of two or more independent factors to verify a user's identity. These factors usually fall into three categories: - -- **Knowledge**: Something the user knows (e.g., password, PIN). -- **Possession**: Something the user has (e.g., hardware token, mobile phone). -- **Inherence**: Something the user is (e.g., biometrics, such as fingerprints or facial recognition). - -By requiring multiple factors, an attacker would need to bypass more than just a single barrier to gain unauthorized access, significantly increasing the security of the system. - -## Certificate-based Authentication - -This methodology involves the use of digital certificates to authenticate a user or device. Digital certificates are electronic documents containing cryptographic keys and details about the subject they represent. The certificate is issued by a trusted Certificate Authority (CA), ensuring that the public key within the certificate belongs to the user, device or server. This method allows for secure transactions and interactions, as it assures entities involved that the data is coming from a verified and trusted source. - -## Single Sign-on (SSO) - -SSO is an authentication process that enables users to access multiple related, but independent, software systems using a single set of credentials. By centralizing the authentication process, SSO simplifies user management and reduces the risk of password-related security breaches (e.g., reuse, weak passwords). Popular SSO solutions include OAuth, SAML, and OpenID Connect. - ---- - -To maintain a strong cyber security posture, implementing effective authentication methodologies is essential. Each method has its own strengths and weaknesses, and the best approach depends on your organization's individual needs and resources. By choosing the right mix of authentication methods, you can ensure that only authorized users have access to your sensitive systems and data, significantly reducing the risk of cyber threats. diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/100-dhcp.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/100-dhcp.md deleted file mode 100644 index 805cb68fd..000000000 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/100-dhcp.md +++ /dev/null @@ -1,21 +0,0 @@ -# DHCP - -DHCP, or Dynamic Host Configuration Protocol, is a network management protocol that simplifies IP address assignment, as well as other network configuration details, to devices in a network. It accomplishes this by automatically assigning IP addresses to devices based on their MAC addresses when they connect to the network. This dynamic approach to IP address allocation eliminates manual tracking and configuration, making it easier for network administrators to manage their networks. - -## Key Features - -- **Automated IP address allocation**: DHCP uses a range of IP addresses, known as a "pool" or "scope," to automatically assign IP addresses to devices on the network. This helps avoid IP address conflicts and ensures efficient use of available IP addresses. - -- **Lease management**: DHCP allows for temporary assignment of IP addresses, called "leases." Leases have expiration periods, after which the IP addresses are returned to the pool, so they can be reassigned to other devices. - -- **Centralized configuration**: DHCP also provides a mechanism for central management of network settings, such as DNS servers, default gateways, and subnet masks. This helps maintain a consistent network configuration and reduces the potential for errors. - -## Benefits - -- **Reduced administration effort**: DHCP reduces the time and effort required to manage IP address assignments in a network, as it automatically assigns and reclaims IP addresses based on lease management. - -- **Scalability**: DHCP is helpful for both small and large networks. It allows the easy integration and removal of new devices, without manual IP address assignments. - -- **Consistency**: DHCP enables consistent management of network settings, which helps reduce errors and ensures that devices in the network can access the necessary resources. - -In summary, DHCP simplifies IP address management and network configuration for network administrators, ensuring efficient use of IP addresses and streamlining network administration. This is particularly valuable in large networks with numerous devices or when devices frequently need to connect or disconnect from the network. diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/101-dns.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/101-dns.md deleted file mode 100644 index 44040eeff..000000000 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/101-dns.md +++ /dev/null @@ -1,23 +0,0 @@ -# DNS - -The Domain Name System, or DNS, is a core component of the internet infrastructure. It is often described as the phonebook of the internet, as it translates human-readable domain names (such as www.example.com) into IP addresses (such as 192.0.2.1) that computers use to identify each other on the network. - -Here are the key concepts and functions of DNS: - -- **Domain Name Resolution**: DNS servers, also known as name servers, are responsible for resolving domain names into IP addresses. When you enter a URL in your browser or click on a link, a DNS query is sent to a DNS resolver, which contacts a series of DNS servers to get the correct IP address for the requested domain. Once the IP address is obtained, your browser can then establish a connection with the web server hosting the domain. - -- **Hierarchical Structure**: DNS follows a hierarchical structure, with the Root DNS servers at the top. Below the root servers are Top-Level Domain (TLD) servers, which are responsible for managing domain names with specific TLDs (such as .com, .org, .net). After that, there are Second-Level Domain (SLD) servers that manage domain names under specific TLDs (for example, example.com). - -- **Caching**: To speed up the domain name resolution process and reduce the load on DNS servers, resolvers and servers often store the results of previous DNS queries in a cache. Cached results have a Time to Live (TTL) value determined by the domain's owner, and once that TTL expires, the resolver will re-query the DNS servers to obtain the updated information. - -- **DNS Records**: Domain owners configure various types of DNS records to provide specific information about their domains. Some common DNS record types include: - - - A Record: Address record that maps a domain name to an IPv4 address - - AAAA Record: Address record for mapping a domain name to an IPv6 address - - CNAME Record: Canonical name record that maps one domain name (alias) to another domain name (canonical) - - MX Record: Mail exchange record that specifies the mail server responsible for handling email for the domain - - TXT Record: Text records providing additional information about the domain, often used for verification or security purposes - -- **DNS Security**: Cyber threats such as DNS hijacking, cache poisoning, and Distributed Denial of Service (DDoS) attacks have highlighted the importance of DNS security. Several security measures and protocols, including DNSSEC (Domain Name System Security Extensions), help protect DNS servers and their records from these threats. - -In summary, DNS is a critical component of the internet, enabling users to connect to websites and online services using easily memorable domain names instead of numerical IP addresses. DNS servers, hierarchically organized and employing caching mechanisms, efficiently manage and resolve domain name queries while implementing security measures to maintain the integrity and safety of the internet infrastructure. diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/index.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/index.md deleted file mode 100644 index 1a5dcb4cd..000000000 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/index.md +++ /dev/null @@ -1 +0,0 @@ -# Functions of each diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/index.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/index.md deleted file mode 100644 index 85e58a302..000000000 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/index.md +++ /dev/null @@ -1 +0,0 @@ -# Understand the terminology diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/index.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/index.md deleted file mode 100644 index 9e70d9fc5..000000000 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/index.md +++ /dev/null @@ -1 +0,0 @@ -# Understand these diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/index.md deleted file mode 100644 index 203da0fdc..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/index.md +++ /dev/null @@ -1,37 +0,0 @@ -# Basics of Cryptography - -Cryptography is a critical aspect of cyber security, essential for ensuring the confidentiality, integrity, and authenticity of data exchanged across digital networks. It involves the use of mathematical algorithms and techniques to encrypt and decrypt data, making it almost impossible for unauthorized users to access or modify the information. - -## Types of Cryptography - -There are three main types of cryptography in the context of cyber security: - -- **Symmetric cryptography**: In this method, the same key, known as a secret key, is used to encrypt and decrypt the data. Examples of symmetric encryption algorithms include AES, DES, and Blowfish. - -- **Asymmetric cryptography**: This approach uses two keys, known as a public key and a private key, for encryption and decryption. Data encrypted with one key can only be decrypted with the other key. Examples of asymmetric encryption algorithms include RSA, ECC, and ElGamal. - -- **Hash functions**: These are cryptographic algorithms that produce a fixed-size output (usually called a hash or digest) from an input of any size, ensuring the integrity of data. A small change in the input data leads to a significant change in the output hash. Examples of widely used hash functions include SHA-256, MD5, and RIPEMD-160. - -## Cryptographic Protocols - -Various cryptographic protocols define how cryptographic algorithms are applied to data and how the data is securely exchanged between different parties. Some of the most common protocols include: - -- **Secure Sockets Layer (SSL) and Transport Layer Security (TLS)**: These protocols are used to provide encrypted communication over the internet. TLS, the successor to SSL, is widely used for secure web browsing, email, and other data exchanges. - -- **Secure Shell (SSH)**: SSH is a protocol that allows secure login to remote machines and the encrypted transfer of data between systems. - -- **Pretty Good Privacy (PGP)**: PGP is a protocol used for encrypting and digitally signing messages, providing confidentiality and authenticity in digital communication. - -## Key Management - -Proper key management is crucial to maintain the security of encrypted data. Key management involves the creation, distribution, storage, and disposal of cryptographic keys. It is essential to ensure that keys are securely distributed, regularly updated, and stored in secure locations to prevent unauthorized access. - -## Cryptanalysis - -Cryptanalysis is the process of attempting to break cryptographic systems, often by exploiting weaknesses in the algorithms, protocols, or key management processes. The strength of a cryptographic system lies in its resistance to cryptanalysis. As a cyber security professional, understanding cryptanalysis techniques can help you identify and protect against potential vulnerabilities in your organization's cryptographic infrastructure. - -In conclusion, cryptography is a fundamental aspect of cyber security, offering a layer of protection for sensitive data in digital networks. To effectively implement cryptography in your organization, you should be familiar with the various types of cryptography, cryptographic protocols, and key management best practices, and understand the potential threats posed by cryptanalysis. - -- [@article@Cryptography for Dummies (TryHackMe)](https://tryhackme.com/room/cryptographyfordummies) -- [@article@How to Protect Data in Transit using HMAC and Diffie-Hellman in Node.js](https://www.freecodecamp.org/news/hmac-diffie-hellman-in-node/) -- [@feed@Explore top posts about Cryptography](https://app.daily.dev/tags/cryptography?ref=roadmapsh) diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/index.md deleted file mode 100644 index f9022b0e9..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/index.md +++ /dev/null @@ -1,55 +0,0 @@ -# Understand the Incident Response Process - -The incident response process is a set of procedures and guidelines that an organization follows to effectively identify, investigate, and remediate incidents affecting its information systems and sensitive data. The primary objective of the incident response process is to minimize the impact of security incidents, reduce downtime, and prevent future attacks. - -A well-defined incident response process typically involves the following key stages: - -## Preparation - -This stage helps organizations establish a proactive approach to incident response by developing comprehensive plans, policies, and procedures. Key steps include: - -- Assembling an incident response team (IRT) with clearly defined roles and responsibilities -- Conducting periodic security awareness and training programs -- Ensuring readiness through scenario planning, tabletop exercises, and breach simulations - -## Identification - -The identification stage is crucial to detect security incidents early on and gather relevant information for later analysis. Some identification techniques include: - -- Monitoring system logs, network traffic, and user activities -- Setting up intrusion detection systems and security information and event management (SIEM) tools -- Receiving and investigating potential incident reports from internal and external sources - -## Containment - -Once an incident is identified, it is crucial to contain its impact by isolating affected systems, networks, and devices. Some containment strategies include: - -- Blocking malicious IP addresses and restricting access to compromised accounts -- Disabling networking features on affected hosts -- Implementing compensating controls to restrict further damage - -## Eradication - -In this stage, the root cause of the incident is investigated and eliminated from the environment to prevent future occurrences. This may involve: - -- Identifying malicious processes, files, or unauthorized users and removing them from the system -- Updating security configurations and patching software vulnerabilities -- Developing solutions to address system or process weaknesses - -## Recovery - -Recovery involves restoring affected systems and services to normal operations. Some recovery steps include: - -- Checking system integrity and validating data for accuracy and completeness -- Re-deploying affected systems using clean backups or restoring to known-good configurations -- Gradually reintegrating systems into the production environment after ensuring security - -## Lessons Learned - -The final stage of the incident response process aims to learn from the incident and improve the organization's security posture. Key steps include: - -- Conducting a thorough post-incident review to identify areas for improvement -- Updating the incident response plan based on lessons learned -- Sharing findings with relevant stakeholders and incorporating feedback for continuous improvement - -An effective incident response process can significantly reduce the impact of security incidents and help organizations recover more quickly. Regular review and practice of the process will ensure that the right skills and knowledge are in place to handle any potential threats. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/index.md deleted file mode 100644 index c7e608c06..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/index.md +++ /dev/null @@ -1,50 +0,0 @@ -# Understand Threat Classification - -Threat classification is an important aspect of cyber security, as it helps organizations identify, analyze, and prioritize potential cyber threats. In this section, we will discuss various types of threats, their characteristics, and the best practices to handle them. - -## Types of Threats - -There are several types of cyber threats that organizations should be aware of. Here, we will classify them into four main categories: - -## Malware - -Malware is the term used for malicious software designed to damage, exploit, or gain unauthorized access to a device, computer, or network. Common types of malware include: - -- **Virus**: A self-replicating program that spreads by infecting files or disk drives and can cause various system disruptions. -- **Worm**: A self-replicating program which spreads through the network without user interaction. -- **Trojan**: A deceptive program that appears legitimate but contains malicious code or functions. -- **Ransomware**: A type of malware that encrypts user files and demands payment for their decryption. - -## Phishing and Social Engineering - -Phishing and social engineering threats involve manipulation or deception of individuals to reveal sensitive information or perform actions which benefit the attacker. Common types include: - -- **Phishing**: The practice of sending fraudulent emails or messages pretending to be from a trusted source, with the intent of obtaining sensitive information or installing malware. -- **Spear-phishing**: A targeted phishing attack aimed at specific individuals or organizations. -- **Whaling**: A form of phishing targeted at high-level executives or decision-makers. -- **Social engineering**: The use of psychological manipulation to trick victims into providing sensitive information or access to their systems. - -## Unauthorized Access - -This threat category covers various methods of unauthorized access to computer systems, networks, or data, including: - -- **Hacking**: Gaining unauthorized access to a computer system or network by exploiting security vulnerabilities. -- **Brute force**: Using trial-and-error methods to guess or crack passwords or encryption keys. -- **Privilege escalation**: Gaining additional privileges or permissions, typically by exploiting vulnerabilities or misconfigurations. - -## Distributed Denial of Service (DDoS) Attacks - -DDoS attacks are attempts to render a computer system, network, or website unavailable by overwhelming it with a flood of malicious traffic. These attacks can be executed through various methods including: - -- **Volume-based attacks**: Overloading the target with overwhelming amounts of traffic, such as UDP floods or ICMP floods. -- **Protocol-based attacks**: Exploiting weaknesses in network protocols, such as SYN floods or Ping of Death attacks. -- **Application-layer attacks**: Targeting specific applications, such as HTTP or DNS attacks. - -## Best Practices for Handling Threats - -- **Awareness**: Familiarize yourself and your team with common types of threats and their characteristics. -- **Prevention**: Implement measures to mitigate threats, such as regular software updates, strong passwords, and endpoint protection. -- **Detection**: Implement monitoring and detection tools to identify threats or suspicious activity. -- **Response**: Develop a response plan for handling incidents, including containment, remediation, and communication. - -By understanding the various types of cyber threats and their characteristics, organizations can better protect themselves and their assets from potential attack. Regularly updating your threat classification knowledge and revising your security practices will ensure that your organization stays one step ahead of cyber criminals. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/index.md deleted file mode 100644 index 271554d0a..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/index.md +++ /dev/null @@ -1,37 +0,0 @@ -# Understand Hardening Concepts - -Hardening refers to the process of securing a given system, network, or application by reducing its attack surface, strengthening its security measures, and minimizing potential vulnerabilities. The primary goal of hardening is to reduce the risk associated with cyber threats and protect the system from unauthorized access or attacks. In this section, we will discuss various hardening concepts that you should be familiar with. - -## Least Privilege Principle - -The Least Privilege Principle entails granting users and applications only the necessary permissions to perform their roles or tasks, and nothing more. By limiting the access and actions a user or application can perform, we reduce the risk of unauthorized activities, infiltration, or exploitation of the system. - -## Defense in Depth - -Employ multiple layers of security measures to prevent a single point of failure in the system. Defense in Depth involves using multiple security solutions, such as firewalls, intrusion detection systems (IDS), anti-malware software, and security policies to provide a holistic security approach. - -## Patch Management - -Regularly updating and patching systems is crucial in maintaining security. Patch management involves keeping all software, operating systems, and applications up-to-date with the latest security patches and updates. This ensures that potential vulnerabilities are fixed, reducing the risk of exploitation by cybercriminals. - -## Secure Configuration - -Implement secure configurations to harden your system. This involves disabling unnecessary services, removing unused software, and ensuring proper authorization controls are in place. Additionally, always use strong authentication mechanisms, change default passwords, and maintain password complexity policies. - -## Network Segmentation - -Divide the network into smaller, isolated segments to reduce potential attack surface and contain attacks when they occur. Network segmentation limits the damage an attacker can cause, as they cannot access every part of the network once they have infiltrated a segment. - -## Encryption - -Encrypt any sensitive data, both when it is stored and when it is transmitted. Encryption safeguards data, ensuring that even if it falls into the wrong hands, it remains unreadable and unusable. - -## Regular Auditing - -Perform regular audits on the security of your systems, networks, and applications to identify potential gaps in your security posture. Auditing can include system logs, intrusion detection, and vulnerability assessments. It is essential to review and remediate any findings to maintain a strong security posture continually. - -## User Awareness Training - -Ensure that all users are educated and aware of security threats and practices, including phishing, password security, and safe browsing habits. Regularly train and refresh employees on security best practices to maintain a security-conscious environment. - -By implementing these hardening concepts, you can significantly enhance the security of your systems, networks, and applications, reducing the risk of cyber threats and unauthorized access. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/106-false-true-negative-positive.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/106-false-true-negative-positive.md deleted file mode 100644 index b88c9936a..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/106-false-true-negative-positive.md +++ /dev/null @@ -1,30 +0,0 @@ -# False Negative / False Positive - -In cybersecurity, one important aspect is the accuracy of security tools and systems in detecting threats and attacks. To capture this concept, we refer to four terms: _true positive, true negative, false positive, and false negative_. - -## True Positive (TP) - -A true positive is an instance when security tools correctly detect and identify a threat, such as a malware or intrusion attempt. A high number of true positives indicates that a security tool is working effectively and catching potential threats as required. - -## True Negative (TN) - -A true negative occurs when the security tool correctly identifies that there is no threat or attack in a given situation. In other words, the system does not raise an alarm when there is no attack happening. A high number of true negatives show that the security tool is not overly sensitive, generating unnecessary alerts. - -## False Positive (FP) - -A false positive happens when the security tool mistakenly identifies a non-threat as a threat. For example, it might raise an alarm for a legitimate user's activity, indicating a potential attack when there isn't any. A high number of false positives can cause unnecessary diverting of resources and time, investigating false alarms. Additionally, it could lead to user frustration if legitimate activities are being blocked. - -## False Negative (FN) - -A false negative occurs when the security tool fails to detect an actual threat or attack. This could result in a real attack going unnoticed, causing damage to the system, data breaches, or other negative consequences. A high number of false negatives indicate that the security system needs to be improved to capture real threats effectively. - -To have an effective cybersecurity system, security professionals aim to maximize true positives and true negatives, while minimizing false positives and false negatives. Balancing these aspects ensures that the security tools maintain their effectiveness without causing undue disruptions to a user's experience. - -## Key Points - -- **True Positive (TP)**: Correctly identifying a threat -- **True Negative (TN)**: Correctly identifying there is no threat -- **False Positive (FP)**: Mistakenly identifying a non-threat as a threat -- **False Negative (FN)**: Failing to detect a real threat - -In summary, understanding false true negative positive concepts is crucial in developing and maintaining an effective cyber security system. By considering these metrics, security professionals can optimize their tools and processes to provide the best protection against cyber threats. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/108-authentication-vs-authorization.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/108-authentication-vs-authorization.md deleted file mode 100644 index 0e0b4b7db..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/108-authentication-vs-authorization.md +++ /dev/null @@ -1,27 +0,0 @@ -# Authentication vs Authorization - -To ensure cybersecurity, it's essential to understand the differences between two key concepts: **Authentication** and **Authorization**. Though the terms might sound similar, they have distinct functions in ensuring the security of your systems and applications. - -## Authentication - -**Authentication** is the process of validating the identity of a user, device, or system. It confirms that the entity attempting to access the resource is who or what they claim to be. The most common form of authentication is the use of usernames and passwords. In simple terms, authentication answers the question, _"Who are you?"_ - -## Authorization - -**Authorization** comes into play after the authentication process is complete. It involves granting or denying access to a resource, based on the authenticated user's privileges. Authorization determines what actions the authenticated user or entity is allowed to perform within a system or application. - -For example, a basic user may be authorized to view and edit their personal data, while an administrator would have the authority to access and manage all user accounts within the same application. In a nutshell, authorization answers the question, _"What are you allowed to do?"_ - -## Conclusion - -Authentication and authorization are critical components of a secure system. By understanding their distinct roles in the security process, you can better manage access to resources and protect sensitive data. Remember, authentication verifies the identity of a user, while authorization determines and enforces the actions and resources the user is permitted to access within a system or application. - -Learn more from the following resources: - -- [@article@Two-factor authentication (2FA)](https://authy.com/what-is-2fa/) -- [@article@Biometrics (fingerprint, facial recognition, etc.)](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5428991/) -- [@article@Security tokens or certificates](https://www.comodo.com/e-commerce/ssl-certificates/certificate.php) -- [@article@Role-based access control (RBAC)](https://en.wikipedia.org/wiki/Role-based_access_control) -- [@article@Access Control Lists (ACLs)](https://en.wikipedia.org/wiki/Access-control_list) -- [@article@Attribute-based access control (ABAC)](https://en.wikipedia.org/wiki/Attribute-based_access_control) -- [@feed@Explore top posts about Authentication](https://app.daily.dev/tags/authentication?ref=roadmapsh) diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/100-phishing-vishing-whaling-smishing.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/100-phishing-vishing-whaling-smishing.md deleted file mode 100644 index 3435fbe57..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/100-phishing-vishing-whaling-smishing.md +++ /dev/null @@ -1,53 +0,0 @@ -# Phishing vs Vishing vs Whaling vs Smishing - -In this section of our Cyber Security Guide, we'll discuss various types of cyber-attacks that you should be aware of. Understanding these attack types can help you recognize and defend against them. - -## Phishing - -Phishing is an attempt to obtain sensitive information, such as login credentials or credit card details, by masquerading as a trustworthy entity. This usually occurs via email. The attacker often creates an email that appears to be from a reputable source, such as a bank, social media platform, or even a known contact. The email may contain a link that directs the victim to a fake website, where they are asked to enter their credentials or other sensitive information. - -**How to protect yourself:** - -- Be cautious when opening emails from unknown senders -- Look for suspicious signs in the email, such as poor grammar or inconsistencies in branding -- Always hover over links in emails to check the actual URL before clicking -- Enable two-factor authentication (2FA) on your online accounts - -## Vishing - -Vishing, or voice phishing, involves attackers using phone calls or voice messages to persuade victims into revealing sensitive information, such as banking details or passwords. Vishing attacks often rely on social engineering tactics, tricking the target into believing they're speaking with a legitimate company representative or authority figure. - -**How to protect yourself:** - -- Be cautious when receiving unexpected phone calls, especially from unknown numbers -- Verify the caller's identity by asking for details only the legitimate party would know -- Avoid providing personal information over the phone, unless you initiated the call and trust the recipient -- If in doubt, hang up and call the known, verified number for the company or institution the caller claimed to represent - -## Whaling - -Whaling is a specific type of phishing attack that targets high-profile individuals, such as executives, celebrities, or politicians. These attacks tend to be more targeted and sophisticated, as the attacker has likely conducted extensive research on the victim. - -**How to protect yourself:** - -- Be aware of the potential risks associated with a high-profile position -- Utilize strong, unique passwords for each of your accounts -- Train employees on phishing and whaling techniques to minimize the likelihood of a successful attack -- Regularly conduct security audits to ensure your organization's security measures are up-to-date - -## Smishing - -Smishing, or SMS phishing, is the act of using text messages to deceive victims into revealing sensitive information or downloading malicious software. The attacker may include a shortened URL or a phone number, attempting to trick the victim into following the link or calling the number. - -**How to protect yourself:** - -- Be cautious when receiving unsolicited text messages, especially from unknown senders -- Check the sender's phone number to ensure it's legitimate or corresponds to the alleged source -- Never click on suspicious links included in text messages -- Install mobile security software to protect your device from potential threats - -By staying informed about these various attack types, you can better protect yourself and your organization from falling victim to cyber threats. Remain vigilant and ensure you have proper security measures in place to minimize the risk of these attacks. - -- [@official@What is Phishing?](https://www.phishing.org/what-is-phishing) -- [@official@Phishing Examples](https://www.phishing.org/phishing-examples) -- [@feed@Explore top posts about Phishing](https://app.daily.dev/tags/phishing?ref=roadmapsh) diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/101-spam-vs-spim.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/101-spam-vs-spim.md deleted file mode 100644 index 0d5893926..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/101-spam-vs-spim.md +++ /dev/null @@ -1,43 +0,0 @@ -# Spam vs Spim - -When discussing cyber security, it's essential to be aware of the various attack types that one might face in the digital world. In this section, we'll compare two common attacks: **spam** and **spim**. By understanding the differences between these two methods, you can better protect yourself from these types of attacks. - -## Spam - -Spam refers to any unwanted, unsolicited, or irrelevant messaging sent over the internet, usually to a large number of users, for the purposes of advertising, phishing, or spreading malware. These messages are typically sent via email, which is why they are often called "spam emails." Spam may contain malicious attachments or links that, when clicked, download malware or lead users to compromised websites. - -Spammers often use automated systems to send these messages to a large number of recipients. Some common characteristics of spam emails include: - -- Suspicious sender addresses -- Generic greeting -- Unusual or unexpected attachments or links -- Urgent or threatening language -- Requests for personal information - -To protect yourself from spam, you should: - -- Set up effective email filters -- Never share your email address publicly -- Avoid clicking on suspicious links or attachments -- Report spam to your email provider - -## Spim - -Spim, or "spam over instant messaging," is similar to spam but occurs over instant messaging (IM) services, such as Facebook Messenger, WhatsApp, and others. The main difference between spam and spim is the medium through which the unwanted messages are sent. Just like spam, spim can be used for advertising, spreading malware, or conducting phishing attacks. - -Some common characteristics of spim messages include: - -- Unknown or suspicious sender accounts -- Messages containing links or attachments -- Unsolicited promotions or offers -- Requests for personal information -- Unexpected urgency or threats - -To protect yourself from spim, you should: - -- Set your IM service's privacy settings to limit who can message you -- Be cautious when clicking on links or attachments from unknown or suspicious accounts -- Block or report spim accounts -- Keep your IM client software updated - -In conclusion, **spam** and **spim** are two distinct types of unwanted messages, with the primary difference being the medium through which they are delivered. Both can pose significant risks to your digital security, so it's crucial to be vigilant, maintain proper security measures, and educate yourself about the various attack types you may encounter. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/102-shoulder-surfing.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/102-shoulder-surfing.md deleted file mode 100644 index 10945f3af..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/102-shoulder-surfing.md +++ /dev/null @@ -1,22 +0,0 @@ -# Shoulder Surfing - -Shoulder surfing is a type of social engineering attack where an attacker observes someone's screen, keyboard, or any other device to gain unauthorized access to sensitive information. It is typically performed by secretly watching the victim during data entry, either directly or indirectly through reflections, smartphones, or other recording equipment. - -## How Shoulder Surfing Occurs - -- **Direct observation**: An attacker stands close to the target and observes their activities, such as typing passwords, entering credit card details, or accessing confidential data. -- **Using cameras**: An attacker may use a hidden camera or a smartphone to secretly record keystrokes, which can be analyzed later to extract sensitive information. -- **Seeing reflections**: Attackers may view reflections on nearby surfaces such as windows, shiny objects, or even the victim's glasses to monitor their activities. - -## Preventing Shoulder Surfing - -To protect yourself from shoulder surfing, follow these guidelines: - -- Be aware of your surroundings, especially in public places where the risk of shoulder surfing is higher. -- Use privacy screens or screen guards to reduce the visibility of your device from different angles. -- If using a smartphone or tablet, tilt the screen towards you and away from potential observers. -- When entering sensitive information such as PIN codes or passwords, shield your keyboard or keypad with your body or hand. -- Change passwords regularly and avoid using easy-to-guess or common passwords. -- Educate employees about the risks of shoulder surfing and the importance of maintaining confidentiality in the workplace. - -By staying cautious and adopting these security measures, you can greatly reduce the risk of shoulder surfing and protect your sensitive data from unauthorized access. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/103-dumpster-diving.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/103-dumpster-diving.md deleted file mode 100644 index f7655a1f7..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/103-dumpster-diving.md +++ /dev/null @@ -1,16 +0,0 @@ -# Dumpster Diving - -**Dumpster diving** is a low-tech but potentially effective method used by attackers to gather sensitive and valuable information by physically searching through an organization's trash. Dumpster divers often target discarded documents such as old memos, printouts, and reports that may still contain sensitive information like usernames, passwords, credit card numbers, and other confidential details. - -## How it works - -Attackers search public and private trash receptacles to find information that may be helpful in their attack strategy. By piecing together various details from discarded documents, attackers may piece together a complete understanding of the organization's internal workings and gain access to protected systems. - -## Countermeasures - -- **Implement a 'shred-all' policy**: Ensure that all sensitive documents are shredded before being discarded. Make it a standard company policy, and ensure that all employees are trained in this practice. -- **Raise awareness**: Train employees to recognize the potential risks of improper disposal and encourage them to be diligent in disposing of sensitive documents. -- **Secure disposal**: Use lockable bins and trash bags or dispose of sensitive documents in a designated, secured place where they will be safely destroyed. -- **Periodic audits**: Conduct regular audits of your physical security measures, including trash receptacles and disposal methods. - -By implementing these countermeasures, your organization can significantly reduce its risk of exposing sensitive information through dumpster diving. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/104-tailgating.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/104-tailgating.md deleted file mode 100644 index c68d37004..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/104-tailgating.md +++ /dev/null @@ -1,20 +0,0 @@ -# Tailgating - -Tailgating, also known as "piggybacking", is a social engineering technique used by attackers to gain unauthorized access to secure facilities or systems by following closely behind a legitimate user. This attack exploits the human tendency to trust others and help them out in various situations. - -## How it works - -- **Target identification:** The attacker chooses a target building, office, or data center which requires secure access. -- **Observation:** The attacker watches for patterns, studying employees' routines and behaviors, identifying an ideal opportunity to slip in unnoticed. -- **Entry:** The attacker waits for a situation where an employee is entering the secure area using their access card, and pretends to have forgotten their card, phone or being preoccupied. The attacker follows the employee entering the area or even asks the employee to hold the door open. -- **Securing Access:** Once inside, the attacker may even steal a physical access card or exploit other vulnerabilities to secure long-term access. - -## Prevention Measures - -- **Awareness training:** Ensure that employees are aware of tailgating as a threat and the importance of adhering to security policies. -- **Physical security:** Implement security measures like turnstiles, mantraps, or security guards to monitor and control access. -- **Access control:** Ensure that access cards are unique to each employee and cannot be easily duplicated. -- **Strict policies:** Enforce strict policies regarding holding doors open for others or allowing individuals into secure areas without proper credentials. -- **Security culture:** Build a strong security culture where employees feel responsible for the organization's security and report any suspicious behavior. - -It is essential to keep in mind that tailgating relies heavily on human behavior and trust. While physical and technical security measures are crucial, fostering a culture of vigilance and employee awareness can be just as effective in preventing such attacks. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/105-zero-day.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/105-zero-day.md deleted file mode 100644 index 5f6e41ce6..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/105-zero-day.md +++ /dev/null @@ -1,32 +0,0 @@ -# Zero Day - -A **zero day attack** is an exploit that takes advantage of an unknown software vulnerability that has not been discovered, disclosed or patched by the software's developer. This type of attack, also known as an _exploit_, is particularly dangerous because it exploits a security gap that the vendor is not aware of, meaning there is no existing fix or protection against it. - -## Characteristics - -There are certain characteristics that make zero day attacks particularly dangerous, such as: - -- **Undetected vulnerability**: Attackers target vulnerabilities in software that developers or manufacturers are not aware of, making it difficult for defenders to protect against the attack. -- **Speed**: Zero day attacks are quickly executed, often before any security measures can be implemented, resulting in a higher success rate for attackers. -- **Stealth**: Attackers usually exploit these vulnerabilities quietly, making their intrusion hard to detect, and can maintain undetected access to a network or system. - -## Consequences - -Zero day attacks can have serious consequences, including: - -- Data theft or loss -- Damaged systems or infrastructure -- Financial losses -- Reputation damage - -Organizations should invest in proactive security measures to protect against such attacks, as reactive measures alone may not be enough. - -## Mitigation Strategies - -- **Keep software up-to-date**: Regularly update software and apps, as developers often release patches and fixes for known vulnerabilities. -- **Implement multi-layered security**: Employ a combination of robust security solutions, including firewalls, intrusion detection and prevention systems, anti-malware software, and more. -- **Monitor network and device activity**: Regularly monitor and analyze network and device activities to spot any unusual behavior, potentially indicating an exploit. -- **Encrypt sensitive data**: By encrypting sensitive data, it becomes harder for hackers to steal and misuse it. -- **Segment networks**: Segment your networks to limit access to sensitive information and systems, minimizing the damage in case of a breach. -- **Educate employees**: Provide training for employees about the threat landscape, good security practices, and how to avoid falling victim to phishing or social engineering attacks. -- **Regular backups and disaster recovery planning**: Routinely and securely back up data and develop a disaster recovery plan to mitigate damages from security breaches or attacks. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/106-social-engineering.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/106-social-engineering.md deleted file mode 100644 index 17d13f914..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/106-social-engineering.md +++ /dev/null @@ -1,33 +0,0 @@ -# Social Engineering - -Social engineering is a subtle yet highly effective method of manipulation that plays on human emotions and behavior to gain unauthorized access to sensitive information. It relies on psychological tactics, rather than technical ones, to deceive people into providing confidential data, allowing unauthorized access, or performing actions that compromise cybersecurity. - -## Types of Social Engineering - -There are various forms of social engineering, including: - -- **Phishing**: A widespread technique where attackers create fake emails and websites, imitating legitimate organizations, to deceive victims into sharing sensitive data such as login credentials or financial information. - -- **Pretexting**: This method involves the attacker fabricating a believable scenario or pretext to establish trust with the target and trick them into divulging sensitive information. - -- **Baiting**: Tempting the victim with free or irresistible offers such as software, downloads, or attractive discounts, with the intention of installing malware or gaining unauthorized access. - -- **Quid pro quo**: Offering a service, information, or assistance in exchange for the victim's sensitive information or system access. - -- **Tailgating/piggybacking**: Attacker gains unauthorized physical access to restricted areas by closely following an authorized individual or posing as an employee or contractor. - -## Preventive Measures - -To protect yourself and your organization against social engineering attacks, keep the following tips in mind: - -- Educate employees about the various social engineering methods, signs of potential attacks, and best practices to avoid falling victim. - -- Implement robust security protocols, including multi-factor authentication, password policies, and restricted access to valuable data. - -- Encourage a culture of verification and validation to ensure the authenticity of requests, emails, and communication. - -- Keep software and security solutions up-to-date to minimize vulnerabilities that can be exploited by attackers. - -- Regularly back up data and have an incident response plan in place to mitigate the impact of successful attacks. - -Remember, social engineering preys on human psychology and behavior. Therefore, awareness, vigilance, and adherence to best practices are crucial to defend against such threats. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/107-reconnaissance.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/107-reconnaissance.md deleted file mode 100644 index d6b3e2b42..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/107-reconnaissance.md +++ /dev/null @@ -1,24 +0,0 @@ -# Reconnaissance - -Reconnaissance is a crucial stage in any cyber attack and refers to the process of gathering information about potential targets, their systems, networks, and vulnerabilities. This information is used by attackers to select which tactics, techniques, or tools will be most effective when attempting to compromise a target system or organization. Reconnaissance can be divided into two primary methods: active and passive. - -## Active Reconnaissance - -In active reconnaissance, attackers directly engage with their target to gather information. This may include scanning networks for open ports or services, attempting to query servers or probing for vulnerabilities. Since the attacker is actively interacting with target systems, it has higher chances of being detected by intrusion detection systems, firewalls or security teams. - -Common active reconnaissance tools include: - -- Nmap: A network scanner that can discover hosts, services, and open ports. -- Nessus: A vulnerability assessment tool that allows attackers to scan for known vulnerabilities in target systems. - -## Passive Reconnaissance - -In passive reconnaissance, the attacker seeks to gather information about the target without making any contact or directly engaging with target systems. Passive reconnaissance is often harder to detect and involves activities such as social engineering, open-source intelligence (OSINT) gathering, or analyzing leaked data. - -Common passive reconnaissance techniques include: - -- Searching public forums, social media profiles, or websites for information about an organization or its employees. -- Using search engines to find exposed or inadvertently leaked data. -- Sifting through DNS records and WHOIS information to discover sub-domains and email addresses that might be used in further attacks. - -Defensive measures against reconnaissance include monitoring network traffic for unusual patterns or repeated probing attempts, regularly updating and patching systems, providing employee training on social engineering awareness, and implementing network segmentation to limit access to sensitive information. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/108-impersonation.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/108-impersonation.md deleted file mode 100644 index bff0629f2..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/108-impersonation.md +++ /dev/null @@ -1,28 +0,0 @@ -# Impersonation - -Impersonation is a type of cyber attack where an attacker pretends to be a legitimate user, system, or device to gain unauthorized access or manipulate their target. This kind of attack can happen through various channels like email, phone calls, social media, or instant messaging platforms. Impersonation attacks mainly aim to deceive the target into providing sensitive information, executing malicious actions, or gaining unauthorized access to secure systems. - -## Types of Impersonation Attacks - -- **Phishing:** Attackers send emails appearing to be from legitimate sources, tricking the target into revealing sensitive information or downloading malware. - -- **Spear phishing:** A more targeted form of phishing, where the attacker possesses specific information about their target and creates a personalized email. - -- **Whaling:** This attack targets high-ranking individuals like CEOs or CFOs, using a combination of personalized spear-phishing and social engineering to extract valuable information or conduct fraudulent transactions. - -- **Caller ID spoofing:** Attackers manipulate phone numbers to appear as if they're coming from a legitimate source, often impersonating customer support agents or bank representatives to deceive targets into providing sensitive information. - -- **Man-in-the-middle (MITM) attacks:** Attackers insert themselves between the target user and a website or service, impersonating both ends of the communication to intercept sensitive data. - -- **Social media impersonation:** Attackers create fake profiles that resemble trusted individuals or organizations in order to deceive their targets, gain information, or spread misinformation. - -## Ways to Prevent Impersonation Attacks - -- **Enable multi-factor authentication (MFA):** By requiring two or more forms of identity verification, you can reduce the risk of unauthorized access. -- **Educate users:** Teach users about the risks of impersonation attacks and how to recognize potential red flags. -- **Implement strong password policies:** Encourage users to create unique, complex passwords and change them regularly. -- **Keep software up-to-date:** Regularly update and patch all software, including operating systems and applications, to protect against known vulnerabilities. -- **Use encryption:** Protect sensitive data by using encryption both in transit and at rest. -- **Monitor and analyze network traffic:** Regularly review network logs and use tools to detect and analyze anomalies or signs of potential impersonation attacks. - -By understanding the various types of impersonation attacks and implementing these security best practices, you can better defend your organization against these ever-evolving cyber threats. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/109-watering-hole-attack.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/109-watering-hole-attack.md deleted file mode 100644 index 9c5b7e0ff..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/109-watering-hole-attack.md +++ /dev/null @@ -1,22 +0,0 @@ -# Watering Hole Attack - -A **watering hole attack** is a targeted cyber attack in which an attacker observes the websites frequently visited by a specific group or organization and seeks to compromise those sites in order to infect their desired targets. These attacks are named after the natural predator-prey relationship; much like how predators wait near a watering hole to hunt their prey. - -In this type of attack, the attacker does not directly target the victims; instead, they focus on the websites that the targeted users commonly visit. Here's a step-by-step breakdown of a typical watering hole attack: - -- **Identify Target**: The attacker identifies a specific organization or group they want to target, like a government agency or a corporation. -- **Study Behavior**: The attacker studies the internet browsing behavior of the target users, observing which websites they frequently visit. -- **Compromise Website**: The attacker exploits vulnerabilities in one or more of the target websites and injects malicious code into them. This could be through a vulnerable plugin, weak passwords, or even by gaining access to the site's hosting platform. -- **Infect Victims**: When the target users visit the compromised websites, they unknowingly download the malicious code onto their machines, allowing the attacker to further exploit the infected devices. - -## Detection and Prevention - -To protect against watering hole attacks, it is important to adopt best practices, including: - -- Regularly updating software on both servers and user devices. -- Installing robust security plugins for websites. -- Adopting a strong password policy and using multi-factor authentication. -- Conducting cybersecurity awareness training to educate your employees. -- Implementing network and endpoint security solutions to detect and prevent intrusions. - -In conclusion, a watering hole attack is a subtle yet dangerous vector for cybercriminals to infiltrate their targets' systems. Organizations should prioritize cybersecurity hygiene and user education to minimize the risks posed by these attacks. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/110-drive-by-attack.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/110-drive-by-attack.md deleted file mode 100644 index 5d872ed14..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/110-drive-by-attack.md +++ /dev/null @@ -1,29 +0,0 @@ -# Drive by Attack - -A **Drive-by Attack** is a common cyber security threat where an attacker aims to infect a user's computer or device by exploiting vulnerabilities in their web browser or its plugins. Typically, users unknowingly fall victim to drive-by attacks when they visit a malicious or compromised website, which in turn automatically executes the malicious code. - -## How Drive-By Attacks Work - -- **Exploiting web vulnerabilities**: Attackers often target popular websites with security flaws or vulnerabilities, which can be exploited to inject malicious code. - -- **Malvertisements**: Another common method for drive-by attacks is through online advertising. Cybercriminals use advertising networks to circulate infected ads that, once clicked, execute the malicious code on the user's device. - -- **Social Engineering**: Attackers use social engineering tactics to trick users into visiting compromised websites that exploit browser vulnerabilities. - -## Preventing Drive-By Attacks - -To safeguard against drive-by attacks, consider the following measures: - -- **Keep your software up-to-date**: Regularly update your web browser, plugins, and operating system to defend against known vulnerabilities. - -- **Use a reputable antivirus software**: Employ a trusted antivirus solution with real-time scanning and frequent signature updates to detect and remove malware. - -- **Enable click-to-play for plugins**: Adjust your browser settings to require manual activation of plugins, like Adobe Flash, which can be exploited by attackers. - -- **Practice good browsing habits**: Avoid visiting suspicious websites, opening unknown email attachments, and clicking on unverified links from sources you do not trust. - -- **Disable JavaScript and browser plugins when not needed**: Disabling browser features, like JavaScript and browser plugins, can reduce the chances of a drive-by attack. - -- **Implement web filtering**: Utilize content filtering or secure web gateways to block access to malicious websites. - -By understanding the methods and tactics used in drive-by attacks and following these preventative measures, you can better protect yourself and maintain a secure online presence. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/111-typo-squatting.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/111-typo-squatting.md deleted file mode 100644 index 6b8ba2df7..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/111-typo-squatting.md +++ /dev/null @@ -1,27 +0,0 @@ -# Typo Squatting - -**Typo Squatting**, also known as **URL hijacking** or **domain squatting**, is a malicious cyber-attack technique that targets internet users who mistakenly enter an incorrect website address into their web browsers. When this occurs, the users are directed to a fake website that closely resembles a legitimate one. The attackers create these fake websites by registering domain names similar to the target website, but with common typographical errors. The goal of typo squatting is often to spread malware, steal personal information or financial details, sell counterfeit products, or promote phishing scams. - -## How Typo Squatting Works - -- **Domain Registration**: Attackers register domain names that are similar to popular websites, but with slight typos, such as missing or swapped characters. For example, if the intended website is `example.com`, the attacker may register `exapmle.com` or `exampl.com`. - -- **Creating Fake Websites**: Attackers create a website that visually resembles the targeted website. This can include using the same logos, images, and layout, making it difficult for users to distinguish the fake site from the real one. - -- **Luring Victims**: Unsuspecting users who make typographical errors while typing the URL are redirected to the fake website, where they may unknowingly provide their personal or financial information, download malware, or fall victim to phishing scams. - -- **Exploitation**: Attackers may use the gathered information for identity theft, financial fraud, or sell the data on the dark web. They may also use the malware-infected devices to create botnets or perform further attacks on other targets. - -## Prevention and Mitigation - -- **Double-check URLs**: Always double-check the URL you type into your browser to ensure you are accessing the intended website. - -- **Use Bookmarks**: Bookmark frequently visited websites to avoid typing the URL manually every time. - -- **Search Engines**: If unsure about the correct URL, use search engines to locate the desired website. - -- **Use Security Software**: Install and maintain up-to-date security software on your devices, such as anti-virus, anti-phishing, and anti-malware tools, to protect against potential threats from typo squatting. - -- **Enable Browser Protection**: Many web browsers offer built-in security features that help identify and block malicious websites. Ensure these features are enabled and configured correctly. - -In conclusion, while typo squatting presents a significant risk to internet users, awareness and vigilance can significantly reduce the chances of becoming a victim. Always verify that you're visiting the correct website before entering any personal or sensitive information. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/112-brute-force-vs-password-spray.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/112-brute-force-vs-password-spray.md deleted file mode 100644 index b7b910f4f..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/112-brute-force-vs-password-spray.md +++ /dev/null @@ -1,33 +0,0 @@ -# Brute Force vs Password Spray - -In this section, we will discuss two common techniques employed by cybercriminals to gain unauthorized access to a victim's system or account: **Brute Force** and **Password Spray** attacks. By understanding these attack types, you will be better equipped to protect your systems and recognize potential threats. - -## Brute Force Attacks - -**Brute Force attacks** are a trial-and-error method used by attackers to discover the correct credential combinations (username and password) to gain unauthorized access to an account or system. This is done by systematically trying as many possibilities as possible until the correct combination is found. - -In a Brute Force attack, the attacker usually utilizes automated tools to generate and test numerous password combinations. This strategy can be time-consuming, resource-intensive, and potentially detectable due to the massive number of login attempts made in a short period. - -## Protecting Against Brute Force Attacks - -To mitigate the risks of a Brute Force attack, implement the following best practices: - -- **Strong password policies:** Encourage users to create complex and unique passwords, combining upper and lower case letters, numbers, and special characters. -- **Account lockout policies:** Lock user accounts temporarily after a set number of unsuccessful login attempts. -- **Multi-factor authentication (MFA):** Implement MFA to make it more difficult for attackers to gain access, even if they obtain the correct credentials. - -## Password Spray Attacks - -**Password Spray attacks** take a more sophisticated approach to compromise accounts. Instead of attempting various passwords against one account, as in Brute Force attacks, attackers try a single (often commonly used) password against multiple accounts. This method minimizes the risk of detection by spreading the attempts over many accounts and making them appear as ordinary user login attempts. - -In a Password Spray attack, the attacker typically uses a list of known usernames and tries a small set of commonly used passwords against each username. As many individuals still use weak and common passwords, this attack type can be surprisingly effective. - -## Protecting Against Password Spray Attacks - -To defend against Password Spray attacks, follow these best practices: - -- **Educate users on password choice:** Teach users about the importance of choosing strong, unique passwords that are not easily guessed or found in password dictionaries. -- **Monitor for unusual login patterns:** Use monitoring tools to detect unusual login patterns, such as numerous successful logins with specific (common) passwords. -- **Implement multi-factor authentication (MFA):** Require users to provide an additional layer of authentication when logging in. - -In conclusion, understanding the differences between Brute Force and Password Spray attacks, as well as adopting strong security measures, can help protect your systems and accounts from unauthorized access. Encourage the use of strong, unique passwords and implement multi-factor authentication to improve overall cybersecurity. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/index.md deleted file mode 100644 index 0fbb9aabc..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/attack-types/index.md +++ /dev/null @@ -1 +0,0 @@ -# Attack types diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/100-parrot-os.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/100-parrot-os.md deleted file mode 100644 index 0df2c8253..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/100-parrot-os.md +++ /dev/null @@ -1,21 +0,0 @@ -# ParrotOS - -Parrot OS, also known as Parrot Security OS, is a powerful Linux-based distribution designed for penetration testing, digital forensics, and ethical hacking. Developed by Frozenbox, this Debian-based operating system comes with a wide range of tools for cyber security enthusiasts, making it one of the most popular choices among hackers and security professionals. - -## Key Features - -- **MATE Desktop Environment**: Parrot OS uses the customizable, lightweight MATE desktop environment, providing a seamless and user-friendly interface. -- **Wide Range of Hacking Tools**: Parrot OS comes preloaded with a variety of hacking tools, such as Metasploit, Wireshark, Aircrack-ng, Armitage, and more. This ensures users have access to the necessary tools for pentesting and security assessments without needing to install them separately. -- **Regular Updates**: The distribution receives frequent updates, ensuring its tools and features stay current with the latest developments in the cyber security field. -- **Anonymity and Privacy**: Parrot OS comes with built-in tools like Anonsurf and TOR to enhance user privacy and anonymity, which are commonly used by cyber criminals as well as ethical hackers. -- **Resource Efficient**: Parrot OS is designed to be lightweight, consuming fewer system resources compared to other hacking-oriented distros, making it suitable for low-spec devices or hardware. - -## Use Cases - -- **Penetration Testing**: Parrot OS is equipped with numerous tools for network scanning, vulnerability assessment, and exploitation that facilitate comprehensive security testing in various environments. -- **Digital Forensics**: With a range of digital forensics tools, Parrot OS enables performing detailed analysis of computers and networks for potential evidence of cybercrime. -- **Reverse Engineering**: The OS also includes tools for reverse engineering, assisting security professionals in examining and analyzing software or malware designs. - -Overall, Parrot OS is a reliable, versatile, and user-friendly cyber security distribution, ideal for both beginners and advanced users engaged in ethical hacking, penetration testing, and digital forensics. - -- [@article@Link to Download Parrot OS ](https://www.parrotsec.org/download/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md deleted file mode 100644 index d99ba3b67..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md +++ /dev/null @@ -1,43 +0,0 @@ -# Kali Linux - -Kali Linux is one of the most popular Linux distributions used by cybersecurity professionals, ethical hackers, and penetration testers. This operating system is designed specifically for advanced security tasks such as penetration testing, exploit development, and digital forensics. - -## Features - -Developed and maintained by Offensive Security, Kali Linux provides an extensive toolkit that comes pre-installed with numerous security tools, including: - -- Metasploit: A powerful exploit development framework -- Nmap: A network scanning utility -- Wireshark: A network protocol analyzer -- John the Ripper: A password-cracking tool -- Aircrack-ng: A suite for wireless network assessment -- SQLmap: An automated SQL injection tool - -## Advantages - -The main advantages of using Kali Linux are: - -- **Specialized Tools**: As mentioned above, Kali Linux comes with a plethora of pre-installed tools dedicated to cybersecurity, making it an ideal choice for professionals in the field. - -- **Regular Updates**: Kali Linux receives continuous updates to ensure its tools, features, and capabilities are up-to-date, catering to the ever-evolving cybersecurity landscape. - -- **Extensive Documentation**: The Kali Linux community offers comprehensive documentation, making it easy to learn and understand the tools and features provided with the distribution. - -- **Customization**: Kali Linux can be customized according to individual requirements, allowing users to tailor the operating system to fit their specific objectives. - -## Limitations - -While Kali Linux is widely used and respected in the cybersecurity community, it has some limitations that users should be aware of: - -- **Not for beginners**: Kali Linux is designed specifically for skilled professionals familiar with Linux systems and cybersecurity concepts, and may be overwhelming for those new to Linux or cybersecurity. - -- **Resource Intensive**: Kali Linux may have higher system requirements compared to other lightweight distributions, potentially impacting performance on older or resource-constrained devices. - -- **Potential Legal Issues**: Since Kali Linux contains tools that can break into systems and networks, it's crucial to use them responsibly and ethically, always obtaining proper authorization for any penetration testing activity to avoid legal repercussions. - -## Conclusion - -Kali Linux is a powerful and widely used distribution tailored for cybersecurity experts and penetration testers. Its extensive collection of tools, combined with regular updates and customization options, make it an attractive choice for those seeking a reliable and feature-rich operating system geared towards cybersecurity tasks. However, it is essential for users to remain mindful of the responsibility and legality associated with using these tools. - -- [@official@kali Linux](https://www.kali.org/) -- [@feed@Explore top posts about Linux](https://app.daily.dev/tags/linux?ref=roadmapsh) diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/index.md deleted file mode 100644 index 030946b7e..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/index.md +++ /dev/null @@ -1 +0,0 @@ -# Common distros for hacking diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/100-dos-vs-ddos.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/100-dos-vs-ddos.md deleted file mode 100644 index c1b42274a..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/100-dos-vs-ddos.md +++ /dev/null @@ -1,31 +0,0 @@ -# DoS vs DDoS - -In this section, we will discuss the differences between DoS (Denial of Service) and DDoS (Distributed Denial of Service) attacks, two common network-based attacks that can severely impact the availability and performance of targeted systems. - -## DoS (Denial of Service) Attack - -A DoS attack is a type of cyber attack where an attacker aims to make a computer or network resource unavailable to its intended users by overwhelming the target system with requests, it essentially becomes inaccessible due to server overloading. - -Some common methods employed in DoS attacks include: - -- **Flooding** - The attacker sends a massive number of requests to the target system, overwhelming its capacity to respond and eventually crashing the system. -- **Ping of Death** - The attacker sends a large, malformed ICMP packet to the target system, which can cause the system to crash. - -## DDoS (Distributed Denial of Service) Attack - -A DDoS attack is similar to a DoS attack in its intent, but it utilizes multiple computers or devices (usually compromised by malware) to launch the attack. These devices, collectively called a "botnet", send an overwhelming amount of requests to the target system, making it even harder to mitigate the attack and protect the resources. - -Some common methods employed in DDoS attacks include: - -- **UDP Flood** - A DDoS attack that sends numerous User Datagram Protocol (UDP) packets to the target system, consuming its resources and eventually leading to a crash. -- **HTTP Flood** - A DDoS attack that generates a large number of HTTP requests to the target server, which exceeds its processing capacity and causes a slowdown or crash. - -## Key Differences - -- **Scale**: While DoS attacks are limited by the resources of a single attacker, DDoS attacks involve multiple attacking devices, making them more effective at overwhelming and disrupting the target system. -- **Mitigation**: DoS attacks can usually be mitigated with simpler countermeasures, but DDoS attacks often require more sophisticated defense strategies due to their distributed and coordinated nature. - -In conclusion, both DoS and DDoS attacks aim to disrupt the availability of a target system by overwhelming its resources. However, their key differences lie in the scale and complexity of the attack, with DDoS attacks being more powerful and more challenging to defend against. It is crucial for organizations to implement robust security measures to detect and mitigate these attacks to maintain the availability and integrity of their systems. - -- [@video@DDOS Attack](https://www.youtube.com/watch?v=PTJ6UZz1pPQ) -- [@feed@Explore top posts about Cybersecurity](https://app.daily.dev/tags/cyber?ref=roadmapsh) diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/101-mitm.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/101-mitm.md deleted file mode 100644 index 1293f5c92..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/101-mitm.md +++ /dev/null @@ -1,26 +0,0 @@ -# MITM - -A _Man-In-The-Middle (MITM)_ attack occurs when a malicious actor intercepts the communication between two parties without their consent, with the objective of eavesdropping or manipulating the exchanged data. By this method, attackers may steal sensitive information, tamper with the transmitted data, or impersonate the involved parties to gain unauthorized control or access. - -## 4.1 Types of MITM Attacks - -Some common types of MITM attacks include: - -- **IP Spoofing:** The attacker impersonates another device's IP address to establish a connection with the victim. -- **DNS Spoofing:** The attacker modifies the DNS records to redirect the victim to a malicious website instead of the intended one. -- **ARP Spoofing:** The attacker alters the target's ARP cache to associate their MAC (Media Access Control) address with the victim's IP address, redirecting network traffic through the attacker's device. -- **SSL and TLS Interception:** The attacker intercepts and decrypts encrypted SSL/TLS communication between the victim and the web server, gaining access to sensitive data. - -## 4.2 Prevention and Mitigation Strategies - -To reduce the risk of MITM attacks, developers, administrators, and users should follow these best practices: - -- **Use HTTPS and encryption:** Make sure to encrypt all sensitive data using secure communication protocols like HTTPS, SSL, or TLS. -- **Validate certificates:** Use a Certificate Authority (CA) to verify digital certificates for secure connections. -- **Implement HSTS:** Deploy HTTP Strict Transport Security (HSTS), a security policy that enforces browsers to use HTTPS connections only. -- **Secure DNS:** Use DNS Security Extensions (DNSSEC) to ensure the integrity and authenticity of DNS records. -- **Enable network segregation:** Segment networks and restrict access between them to prevent malicious actors from gaining access to sensitive data or systems. -- **Regularly update software and firmware:** Keep all systems, applications, and devices up-to-date to minimize known vulnerabilities. -- **Educate users:** Provide awareness training and support resources to help users recognize and avoid potential MITM attacks. - -By understanding MITM attacks and implementing the appropriate preventive measures, you can significantly reduce the risk of falling victim to these types of cyber threats. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/102-arp-poisoning.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/102-arp-poisoning.md deleted file mode 100644 index 0ec98afb6..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/102-arp-poisoning.md +++ /dev/null @@ -1,26 +0,0 @@ -# ARP Poisoning - -**ARP Poisoning**, also known as ARP spoofing or ARP cache poisoning, is a cyber attack technique that exploits the Address Resolution Protocol (ARP) in a computer network. ARP is responsible for mapping an IP address to a corresponding Media Access Control (MAC) address, so that data packets can be correctly transmitted to the intended network device. An attacker can use ARP poisoning to intercept, modify, or disrupt communications between network devices. - -**How It Works:** - -- The attacker sends falsified ARP messages to the network, associating their MAC address with the IP address of a targeted device (such as a server or gateway). -- Other devices on the network treat the attacker's MAC address as the legitimate one for the targeted IP address, updating their ARP tables accordingly. -- As a result, data packets that were meant for the targeted device are now sent to the attacker instead, potentially enabling them to eavesdrop, modify, or disrupt network traffic. - -**Consequences:** - -ARP poisoning can lead to serious security issues, including: - -- Data leakage: Attackers can intercept sensitive data exchanged between devices on the network. -- Man-in-the-middle attacks: Attackers can modify data in transit, potentially inserting malicious content. -- Denial of Service (DoS) attacks: Attackers can render a targeted device unresponsive by flooding it with traffic or by dropping all packets bound for it. - -**Prevention and Mitigation:** - -Several strategies can help protect networks against ARP poisoning: - -- Static ARP entries: Assign static IP-to-MAC address mappings to prevent attackers from forging ARP responses. -- ARP inspection tools: Use switches, firewalls, or Intrusion Detection/Prevention Systems (IDS/IPS) that support Dynamic ARP Inspection (DAI) or similar features to validate or filter suspicious ARP traffic. -- IPsec or SSL/TLS: Encrypt traffic between network devices with secure protocols like IPsec or SSL/TLS to mitigate eavesdropping or tampering risks. -- Regular monitoring: Continuously monitor network traffic and device ARP tables for anomalies or inconsistencies, possibly using Network Intrusion Detection Systems (NIDS) or other security tools. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/103-evil-twin.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/103-evil-twin.md deleted file mode 100644 index 0d41bc831..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/103-evil-twin.md +++ /dev/null @@ -1,23 +0,0 @@ -# Evil Twin - -An **Evil Twin Attack** is a malicious tactic used by cybercriminals to deceive users by creating a fake wireless Access Point (AP) that mimics the characteristics of a legitimate one. This rogue access point usually has the same network name (SSID) and security settings as a genuine AP, making it difficult for users to differentiate between the two. - -## How it works - -- The attacker sets up their own hardware in the vicinity of the targeted wireless network and configures a rogue AP with the same SSID and security settings as the genuine network. -- Unsuspecting users connect to the rogue AP, thinking it's the legitimate network. -- The attacker can now intercept and, in some cases, alter the user's data transmitted over the network. This can include sensitive information such as login credentials, credit card details, and personal conversations. - -## Risks associated with Evil Twin Attacks - -- Unauthorized access to sensitive information: The attacker can gain access to your usernames, passwords, and other confidential information. -- Loss of privacy: The attacker can eavesdrop on personal or business conversations, which can lead to blackmail or identity theft. -- Data manipulation: The attacker can alter transmitted data, leading to misinformation or unintended actions. - -## Preventing Evil Twin Attacks - -- **Use a VPN**: A Virtual Private Network (VPN) secures your data by encrypting the information transmitted between your device and the Internet. Even if you connect to a rogue AP, your data will be protected. -- **Verify the SSID**: Make sure you are connecting to the correct SSID. Be cautious of networks with similar names or those that don't require a password. -- **Enable two-factor authentication**: Enable two-factor authentication (2FA) for critical accounts and services. This provides an additional layer of security, making it more difficult for attackers to gain unauthorized access. -- **Keep software up-to-date**: Regularly update your devices, software, and operating system to protect against known vulnerabilities and security threats. -- **Educate yourself and others**: Be aware of the risks associated with Evil Twin Attacks, and inform others to increase overall security awareness. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/104-dns-poisoning.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/104-dns-poisoning.md deleted file mode 100644 index 0e0dc49d6..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/104-dns-poisoning.md +++ /dev/null @@ -1,34 +0,0 @@ -# DNS Poisoning - -**DNS Poisoning**, also known as **DNS Cache Poisoning** or **DNS Spoofing**, is a type of cyberattack where cyber-criminals manipulate the Domain Name System (DNS) responses to redirect users to malicious websites. Let's dive deeper to understand how it works and its potential impact. - -## How DNS Poisoning Works - -The DNS is like the internet's phonebook; it translates human-readable domain names (e.g., www.example.com) into their corresponding IP addresses for computers to understand. This process involves a DNS resolver, which refers to a cached DNS database to find the correct IP address. In a DNS poisoning attack, an attacker exploits vulnerabilities in the DNS to inject false or malicious data into a DNS resolver's cache. - -Here's a quick outline of the process: - -- User requests the IP address for a legitimate website (e.g., www.example.com). -- The DNS resolver sends a request to a DNS server to resolve the domain name into the IP address. -- The attacker intercepts the DNS request and injects false DNS information into the DNS resolver's cache. -- The DNS resolver then returns the falsified IP address to the user. -- The user unknowingly accesses the attacker-controlled malicious website instead of the intended legitimate site. - -## Impacts of DNS Poisoning - -DNS poisoning has several potential impacts on both users and organizations: - -- **Phishing and Identity Theft**: By redirecting users to malicious websites, attackers can steal sensitive information, such as login credentials or personal details, to be used for identity theft or other fraudulent activities. -- **Malware Distribution**: Malicious websites may expose users to malware, ransomware, or other cyber threats. -- **Loss of Trust**: If an organization's domain is targeted in a DNS poisoning attack, its customers may lose trust and doubt the security of the organization's online services. - -## Preventing and Mitigating DNS Poisoning - -Here are some steps you can take to prevent and mitigate the risk of DNS poisoning: - -- **Use DNSSEC**: DNSSEC (Domain Name System Security Extensions) is a security protocol that adds an additional layer of authentication and integrity to DNS responses, making it harder for attackers to corrupt DNS data. -- **Keep Software Updated**: Regularly update your DNS software, operating systems, and other network tools to ensure they're protected against known vulnerabilities. -- **Use Secure DNS Resolvers**: Choose a secure DNS resolver that has built-in mechanisms to prevent DNS poisoning, such as validating DNSSEC signatures. -- **Monitor Your DNS Traffic**: Regularly monitoring DNS query logs can help you identify suspicious patterns or unusual activities, which may indicate DNS poisoning attempts. - -In summary, DNS poisoning is a potent cyber threat that manipulates DNS data to redirect users to malicious websites. By implementing security measures such as DNSSEC, keeping software updated, and closely monitoring DNS traffic, you can significantly reduce the risk of falling victim to DNS poisoning attacks. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/105-spoofing.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/105-spoofing.md deleted file mode 100644 index 326ef5cab..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/105-spoofing.md +++ /dev/null @@ -1,29 +0,0 @@ -# Spoofing - -Spoofing is a type of cyber attack where an attacker impersonates or masquerades as another entity (person or system) to gain unauthorized access to sensitive information, manipulate communications or bypass network security measures. Spoofing can come in various forms, including: - -## IP Spoofing - -IP Spoofing refers to when an attacker sends fake packets with a forged source IP address. This is often done to bypass IP-based security measures or to make an attack seem like it's coming from another source. Potential consequences of a successful IP spoofing attack include unauthorized access to systems, data manipulation and denial of service attacks. - -To protect against IP spoofing, organizations can implement ingress and egress filtering and adopt network protocols that include authentication for incoming packets. - -## Email Spoofing - -Email spoofing involves forging the header information of an email to make it appear as if it's sent from a legitimate source. Attackers often use this tactic in phishing attacks, where emails are made to look like they are from trusted sources, prompting recipients to click on malicious links or share sensitive information. - -To defend against email spoofing, it is essential to use email authentication protocols, such as Sender Policy Framework (SPF), Domain Key Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC). - -## Caller ID Spoofing - -In caller ID spoofing, an attacker changes the caller ID information to deceive the recipient. This technique is commonly used in phone scams, where the attacker disguises their identity to create a sense of trust, convince the recipient to share personal information or execute malicious activities. - -To reduce the risk of caller ID spoofing, be cautious of unexpected calls from unknown numbers, never share sensitive information over the phone, and implement call-blocking services. - -## Address Resolution Protocol (ARP) Spoofing - -ARP Spoofing, also known as ARP poisoning, involves an attacker forging ARP messages to associate their MAC address with the IP address of a legitimate network device. This allows the attacker to intercept and modify network traffic, potentially leading to man-in-the-middle attacks or denial of service. - -To defend against ARP spoofing, organizations can employ dynamic ARP inspection, static ARP entries, and intrusion detection systems that monitor for unusual ARP activity. - -In summary, spoofing attacks can impact various aspects of digital communication, whether it be IP-based, email, phone, or network traffic. To protect against spoofing, be vigilant and employ defensive measures, such as network authentication protocols, monitoring suspicious activities, and educating users about potential risks. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/106-deauth-attack.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/106-deauth-attack.md deleted file mode 100644 index 05feb4f92..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/106-deauth-attack.md +++ /dev/null @@ -1,33 +0,0 @@ -# Deauth Attack - -A **Deauthentication (Deauth) Attack** is a type of Denial-of-Service (DoS) attack that specifically targets wireless networks. It works by exploiting how Wi-Fi devices communicate with one another, intentionally causing legitimate users to be disconnected from the access point. The attacker sends a flood of deauthentication (Deauth) frames to the targeted access point, effectively overwhelming it and forcing connected clients to disconnect. - -## How Does a Deauth Attack Work? - -Deauth attacks take advantage of the management frames used in the 802.11 Wi-Fi standard. These control frames ensure efficient operation of communications between connected devices and include the authentication, association, and deauthentication subtypes. Since management frames are often not encrypted, attackers can easily generate and transmit fake deauthentication frames to force disconnections. - -When a Deauth frame is received by a user's device, it releases its connection to the access point, and the user must re-connect in order to reestablish data transfer with the Wi-Fi network. - -## Impacts and Consequences - -Deauth attacks can cause the following problems: - -- **Loss of connectivity:** The most obvious consequence is that network connectivity is lost, disrupting any network-related activity and potentially causing loss of unsaved data. - -- **Network congestion:** As deauthenticated devices try to reconnect, this increased activity can cause network congestion, leading to further performance degradation. - -- **Credentials theft:** Deauth attacks can be used in conjunction with fake access points, allowing attackers to trick users into connecting to these malicious networks, and subsequently stealing their credentials and sensitive data. - -## How to Prevent Deauth Attacks - -There isn't a foolproof solution to protect against deauth attacks, particularly due to the inherent lack of encryption in management frames. However, you can take the following steps to reduce your risk: - -- **Enable 802.11w (Protected Management Frames):** Some routers support the 802.11w standard, which can protect deauthentication and disassociation frames through encryption. - -- **Use a strong authentication method:** Enabling strong methods like WPA3 and EAP-TLS on your network can help ensure that devices are more resistant to malicious disconnections. - -- **Monitor your network for suspicious activity:** Utilize a network monitoring tool or Wi-Fi analyzer to detect anomalies and possible deauth attack attempts. - -- **Secure your access points:** Regularly update your router’s firmware and configure its settings to disable remote management access, applying strong access credentials to minimize unauthorized access. - -As an author of this guide, I advise you to stay diligent and follow the best practices in order to safeguard your network from deauth attacks and other security threats. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/107-vlan-hopping.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/107-vlan-hopping.md deleted file mode 100644 index 1e63c9320..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/107-vlan-hopping.md +++ /dev/null @@ -1,25 +0,0 @@ -# VLAN Hopping - -VLAN hopping is a common network-based attack that exploits the vulnerabilities of the VLAN trunking protocols in a local area network (LAN). The objective of this attack is to gain unauthorized access to other VLANs or to bypass the network's security protocols by hopping between VLANs. - -## How VLAN Hopping Works - -There are two primary methods of VLAN hopping: - -- **Switch Spoofing:** In this approach, an attacker configures their device to act as a switch and establish a trunk link with the actual network switch. Since trunk links are designed to carry traffic from multiple VLANs, the attacker can then access traffic from all the VLANs that are allowed on the trunk. - -- **Double Tagging:** This method involves sending frames with multiple 802.1Q VLAN tags. By adding an extra tag, an attacker can confuse the switch and cause it to forward the frame to another VLAN, providing unauthorized access to that VLAN's traffic. - -## Preventing VLAN Hopping - -To secure your network from VLAN hopping attacks, consider implementing the following best practices: - -- **Disable Unused Ports:** Shut down any unused ports on your switches and configure them as access ports instead of trunk ports. This will limit the opportunity for an attacker to establish a trunk link. - -- **Configure Allowed VLANs on Trunk Links:** Restrict the VLANs that can be carried on trunk links by explicitly specifying the allowed VLANs. This will prevent an attacker from accessing unauthorized VLANs through a trunk link. - -- **Implement VLAN Access Control Lists (VACLs):** VACLs can be used to filter traffic at the VLAN level, preventing unauthorized traffic from entering or leaving a VLAN. - -- **Enable 802.1Q Native VLAN Tagging:** By enabling native VLAN tagging and assigning a unique, unused VLAN ID as the native VLAN, you can prevent double tagging attacks. - -Remember that implementing these security practices is crucial in protecting your network from VLAN hopping and other types of network-based attacks. Always stay vigilant and keep your network's security protocols up-to-date to minimize the chances of a successful cyber attack. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/108-rogue-access-point.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/108-rogue-access-point.md deleted file mode 100644 index 8cb82b3a1..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/108-rogue-access-point.md +++ /dev/null @@ -1,29 +0,0 @@ -# Rogue Access Point - -A **Rogue Access Point (RAP)** is an unauthorized wireless access point that is installed or connected to a network without the network administrator's consent. These access points can be set up by attackers to exploit security vulnerabilities within the network or by employees for personal usage. RAPs can lead to several network-based attacks, causing severe damage to an organization's security. - -## Risks Associated with Rogue Access Points - -- **Unauthorized Access**: Attackers can use RAPs to gain unauthorized access to a victim's sensitive data. - -- **Man-in-the-Middle Attacks**: Cybercriminals can intercept or alter the communication between two parties using RAPs, performing a Man-in-the-Middle attack. - -- **Information Theft**: By monitoring the traffic passing through a RAP, attackers can steal sensitive information such as usernames, passwords, and credit card information. - -- **Network Vulnerabilities**: RAPs can create new security holes because they often bypass security measures such as firewalls, intrusion detection systems, and VPNs. - -## Detecting and Preventing Rogue Access Points - -Here are some measures to help detect and prevent rogue access points: - -- **Wireless Intrusion Detection Systems (WIDS)**: WIDS helps identify and locate unauthorized access points, clients and ad-hoc connections in an organization's wireless network. - -- **Regular Network Scans**: Perform regular network scans to detect any unauthorized devices connected to the network. - -- **Network Access Control (NAC)**: Implement Network Access Control to restrict unauthorized devices from accessing the internal network. - -- **Encryption and Authentication**: Apply strong encryption and authentication protocols such as WPA3, to reduce the chances of unauthorized devices connecting to the network. - -- **User Awareness**: Educate employees about the risks associated with rogue access points and how to avoid unintentionally installing them. - -By staying vigilant and implementing robust security measures, organizations can reduce the risks associated with rogue access points and protect their networks from potential cyberattacks. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/109-war-driving-dialing.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/109-war-driving-dialing.md deleted file mode 100644 index ea6e7091b..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/109-war-driving-dialing.md +++ /dev/null @@ -1,35 +0,0 @@ -# War-driving/dialing - -## War Driving - -War driving is a technique in which an attacker physically drives around attempting to discover open or poorly secured wireless networks. This practice allows the attacker to exploit network vulnerabilities and gain unauthorized access to sensitive information. The goal of war driving is to identify targets, typically homes, offices, or businesses, with WLANs. - -## Key elements of War Driving - -- **Detection**: War driving begins with the detection of nearby wireless access points using laptops, mobile devices, or any device with WiFi scanning capabilities. -- **Mapping**: After detecting the wireless signals, the attacker maps them using GPS or other location-based services. -- **Analysis**: Once the target is identified, the attacker analyzes the network security to find the weakness and vulnerabilities. -- **Exploitation**: Finally, the attacker exploits the discovered vulnerabilities to gain unauthorized access to the network. - -## War Dialing - -War dialing is a similar attack method but involves calling numerous phone lines in search of modems and fax machines. War dialing allows the attacker to identify insecure phone lines and unauthorized access points. - -## Key elements of War Dialing - -- **Detection**: War dialing starts by automating the process of calling a range of phone numbers using software, searching for modem or fax machine-tones. -- **Mapping**: The attacker collects the list of phone numbers that responded with an appropriate connection tone. -- **Analysis**: The attacker will analyze the phone lines to assess their security and vulnerabilities. -- **Exploitation**: The attacker exploits the discovered vulnerabilities to gain unauthorized access to the systems connected to the modems or fax machines. - -## Prevention Strategies - -To protect your network against war driving or war dialing, it's important to: - -- Implement strong security measures such as WPA3 or WPA2-Enterprise for WiFi networks. -- Employ proper firewall configurations. -- Disable broadcasting your SSID (network name) to make your WiFi network invisible to casual passersby. -- Use strong authentication methods for remote access systems. -- Regularly update your network devices with the latest security patches. -- Periodically conduct vulnerability assessments to stay ahead of potential weaknesses. -- Educate employees and users about the risks of unsecured networks and the importance of following security guidelines. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/index.md deleted file mode 100644 index 01c323047..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/index.md +++ /dev/null @@ -1 +0,0 @@ -# Common network based attacks diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/index.md deleted file mode 100644 index 5dac1a052..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/index.md +++ /dev/null @@ -1 +0,0 @@ -# Common standards diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/100-event-logs.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/100-event-logs.md deleted file mode 100644 index 8b2d5ad82..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/100-event-logs.md +++ /dev/null @@ -1,43 +0,0 @@ -# Event Logs - -Event logs are essential components of cyber security, as they provide a detailed record of activities within a computer system or network. These logs are generated by the operating system, applications, and security devices, offering important information that can help administrators identify vulnerabilities, improve security measures, and detect potential threats. - -## Key components of event logs - -Event logs typically consist of the following components: - -- **Timestamp**: The date and time when the event occurred. This information helps in correlating events and identifying patterns. -- **Event ID**: A unique identifier for the event, typically assigned by the generating system. -- **Source**: The application or service that generated the event. This can be an operating system, security software, or a third-party application. -- **User**: The user account associated with the event, if applicable. -- **Description**: A detailed message about the event, which may include the reason for the activity, its outcome, and any relevant data. - -## Types of event logs - -Event logs can be broadly categorized into the following types: - -- **System logs**: These logs contain events related to the operating system and its components. For example, system startup and shutdown events, driver load failures, and hardware issues. - -- **Application logs**: These logs contain events generated by installed applications. Application logs can provide insight into the functioning of specific programs, helping identify potential security risks or malfunctions. - -- **Security logs**: These logs include events generated by security-related components such as firewalls, antivirus software, and intrusion detection systems. Security logs are particularly useful for identifying unauthorized access attempts, policy violations, and other threats to your system. - -## How to access and analyze event logs - -Depending on your operating system, there are various tools and methods for accessing and analyzing event logs. Here are some common ways to do it: - -- **Windows**: The built-in "Event Viewer" tool allows you to view and analyze logs in a graphical interface. To access Event Viewer, simply type "eventvwr.msc" into the Run dialog or search for "Event Viewer" in the Start menu. - -- **macOS**: The "Console" application provides access to macOS event logs. To find Console, search for it using Spotlight, or navigate to the "Applications" > "Utilities" folder and open Console from there. - -- **Linux**: There are numerous tools and methods to examine event logs in Linux, with the primary log files typically stored under the `/var/log/` directory. The `dmesg`, `journalctl`, and `tail` commands are some common ways to view log data in the command-line interface. - -## Best practices for managing event logs - -To ensure optimal use of event logs in your cybersecurity efforts, consider implementing the following best practices: - -- **Monitor logs regularly**: Review event logs frequently to catch potential security issues and address them in a timely manner. -- **Configure log rotation**: Limit the size and age of log files to prevent the system from running out of storage space and ensure that older events are archived for easy retrieval. -- **Implement centralized logging**: For more complex environments, use a centralized log management system that aggregates logs from multiple sources, facilitating easier analysis and correlation of events across the entire network. -- **Protect sensitive log information**: Ensure access to log files is restricted to authorized personnel and that log data is encrypted as necessary to prevent unauthorized access and tampering. -- **Stay informed about common log entries**: Understand the common log entries for your operating system, applications, and security software to quickly identify unusual or suspicious activities in your logs. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/101-syslogs.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/101-syslogs.md deleted file mode 100644 index 0c615f98a..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/101-syslogs.md +++ /dev/null @@ -1,28 +0,0 @@ -# syslogs - -Syslogs, short for System Logs, are essential components in the world of cybersecurity as they represent a consolidated logging system that operates on a central server. It collects and stores log messages from various devices and applications within an organization's network. Syslogs provide insights into system events, errors, and activities occurring within the network, enabling administrators and security teams to monitor and analyze the data. - -## Benefits of Syslogs - -- Centralized Logging: Syslogs are centralized repositories for log data, making it easier to monitor multiple devices and applications from a single location. -- Troubleshooting & Analysis: The data from syslogs can be used to troubleshoot issues or discover potential security breaches, allowing for a faster resolution and improved overall network security. -- Regulatory Compliance: Syslogs can help organizations meet industry-specific standards and guidelines by keeping a record of system events and data. -- Efficient Storage: Centralized storage allows for efficient data management, reducing the need for manual log management across different devices. - -## Types of Syslog Messages - -Syslog messages can be categorized into three parts: - -- **Facility**: The source of the log entry, usually a system process, daemon or application. -- **Severity**: A numeric code that denotes the level of urgency of the logged event or message (0-7) where 0 is the highest (most urgent) and 7 is the lowest (least urgent). -- **Message**: The actual descriptive text of the log entry. - -## Syslog Configuration - -Setting up a syslog server usually involves installing a syslog daemon, configuring it to listen for incoming log messages, and defining the log storage location. Popular syslog server software includes `rsyslog`, `syslog-ng`, and `Windows Event Collector`. Configuring syslog clients is done by specifying the IP address or hostname of the syslog server and the protocol used for communication. Once the setup is complete, the syslog server will begin receiving and storing log messages from the configured clients. - -## Analyzing Syslog Data - -Syslog data analysis can be complicated due to the volume and variety of log messages. However, various log analysis tools, such as Graylog, Logstash, and Splunk, simplify this process by providing features like data visualization, filtering, and alerting. These syslog analysis tools extract valuable information from raw log data and help identify patterns, trends, and potential threats. - -In conclusion, syslogs are a powerful resource for monitoring, troubleshooting, and securing your organization's network. By utilizing syslog servers and analysis tools, security teams can gather and analyze valuable data to maintain compliance and ensure the overall health of their network. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/102-netflow.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/102-netflow.md deleted file mode 100644 index 5b0eeb684..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/102-netflow.md +++ /dev/null @@ -1,26 +0,0 @@ -# netflow - -NetFlow is a network protocol developed by Cisco that collects and monitors network traffic flow data. It provides valuable information about network usage, performance, and potential security threats, which can be helpful in cyber security analysis and incident response. - -## How NetFlow Works - -NetFlow-enabled devices (such as routers, switches, and firewalls) analyze the IP packets passing through them and generate flow records. A flow record is a set of key field values that characterize the traffic flow, including source and destination IP addresses, source and destination ports, protocol type, and more. These flow records are then periodically exported to a NetFlow collector, which aggregates, analyzes, and stores the data for further processing. - -## Benefits of Using NetFlow Data for Cyber Security - -- **Visibility**: NetFlow data provides greater visibility into your network traffic, allowing you to monitor who is accessing your network, what resources they are using, and when they are doing so. -- **Threat Detection**: By analyzing NetFlow data, you can uncover anomalous behaviors, detect security incidents, and identify potential insider threats. -- **Forensics**: NetFlow logs can serve as evidence for forensic investigations when a security breach occurs. -- **Optimization**: Analyzing NetFlow data can help optimize network performance by identifying bandwidth hogs, misconfigurations, or bottlenecks. -- **Compliance**: NetFlow data can be used to demonstrate compliance with regulatory requirements or internal policies by proving that specific controls are in place. - -## How to Get Started with NetFlow - -To implement NetFlow in your organization, you need to follow these steps: - -- **Enable NetFlow**: Configure NetFlow on your routers, switches, and firewalls. Most vendors support NetFlow or an equivalent flow-based protocol. -- **Set up a NetFlow Collector**: Deploy a NetFlow collector server that receives, aggregates, and stores the exported flow records. There are both open-source (such as ntopng, Flowalyzer) and commercial solutions (such as SolarWinds, Plixer) available. -- **Analyze and Monitor**: Use a NetFlow analysis tool or platform to filter, visualize, and explore your network traffic data. This can be the same tool as your NetFlow collector, or a separate solution that integrates with it. -- **Integrate with Other Security Tools**: Enhance your security posture by correlating NetFlow data with other security tools such as intrusion detection systems, security information, and event management (SIEM), threat intelligence, and more. - -By incorporating NetFlow into your cyber security strategy, you can greatly improve your network visibility, threat detection capabilities, and overall security posture. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/103-packet-captures.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/103-packet-captures.md deleted file mode 100644 index f16fd3457..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/103-packet-captures.md +++ /dev/null @@ -1,42 +0,0 @@ -# Packet Captures - -Packet captures, also known as _pcaps_, refer to the interception and logging of network traffic. In a cybersecurity context, analyzing packet captures can provide valuable insight into network activity, potential threats, and vulnerabilities. This section will introduce you to the essentials of packet captures and introduce some popular tools used for capturing and analyzing network traffic. - -## Why are Packet Captures Important? - -Analyzing packet captures allows cybersecurity professionals to: - -- Monitor network activity for unusual or malicious behavior -- Inspect and debug network performance issues -- Investigate security incidents by tracing malicious activity -- Ensure compliance with regulations by tracking sensitive data movement - -Being able to effectively analyze packet captures is a critical skill for anyone involved in network monitoring or incident response. - -## Common Packet Capture Tools - -There are several widely used packet capture tools worth familiarizing yourself with: - -- **Wireshark**: A popular, open-source network protocol analyzer that allows you to capture and interactively analyze network traffic. Wireshark supports filtering, decryption, and flexible analysis options. - -- **Tcpdump**: A powerful command-line tool for capturing network traffic. Tcpdump is lightweight, versatile, and compatible with most Unix-based operating systems. - -- **Tshark**: A command-line version of Wireshark, providing many of its powerful features in a lightweight and scriptable tool. - -- **Nmap**: A flexible network discovery and security auditing tool. Not only can Nmap perform packet captures, but also host and port scanning, OS and service detection, and vulnerability assessments. - -## Tips for Analyzing Packet Captures - -When working with packet captures, consider the following best practices: - -- **Filtering**: Use capture filters to narrow down the displayed traffic based on specific criteria, such as IP addresses, protocols, or ports. This will enable you to focus on relevant data and reduce information overload. - -- **Organizing**: Maintain an organized folder structure and clear naming conventions for your pcap files. This simplifies the retrieval and analysis of historical data during investigations. - -- **Decryption**: Encrypted network traffic might hinder your analysis. Understanding how to decrypt protocols such as SSL/TLS or WPA/WPA2 will enable you to examine packet contents in detail. - -- **Correlation**: Combine packet capture analysis with other sources of information, such as logs, alerts, or threat intelligence, to obtain a comprehensive view of network activity. - -## Conclusion - -Packet captures are a vital component of cybersecurity, allowing professionals to monitor, detect, and respond to potential threats in a timely and effective manner. By understanding the various tools and techniques related to packet captures, you'll be well-equipped to take on this crucial aspect of your cybersecurity responsibilities. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/104-firewall-logs.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/104-firewall-logs.md deleted file mode 100644 index 54792edec..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/104-firewall-logs.md +++ /dev/null @@ -1,43 +0,0 @@ -# Firewall Logs - -Firewall logs are records of events generated by a network or computer firewall, which plays a critical role in maintaining the security of your systems. These logs provide valuable insights into the traffic entering and leaving your network, allowing you to monitor and analyze potential threats, detect security breaches, and maintain compliance with various security standards. - -Below are the key components of firewall logs you should be familiar with: - -## Types of Firewall Logs - -There are two main types of firewall logs: - -- **Traffic logs:** These logs provide information about allowed and blocked connections, including details like the source and destination IP addresses, ports, protocols, and packet sizes. - -- **Event logs:** These logs provide information on the general activities of the firewall, such as system events (startup, shutdown, and configuration changes) and security incidents (attempted attacks, suspicious activity, etc.). - -## Importance of Firewall Logs - -Firewall logs are essential for a variety of reasons: - -- **Security incident detection and response:** Firewall logs help you identify security breaches and quickly respond to potential threats by providing real-time and historical data on connections. - -- **Network troubleshooting:** Firewall logs can help network administrators diagnose and troubleshoot network issues by providing insights into blocked connections, resource usage, and other network activities. - -- **Compliance and audits:** Many security standards and regulatory frameworks, such as GDPR, HIPAA, and PCI DSS, require organizations to maintain robust log management practices. Firewall logs are crucial components of your overall security logging strategy. - -- **Forensic analysis:** Firewall logs can be used during investigations to understand the timeline, source, and scope of a security incident, enabling organizations to enhance their security measures. - -- **Optimizing firewall configurations and rules:** By monitoring and analyzing firewall logs on an ongoing basis, you can fine-tune your firewall's rules and settings to ensure optimal network performance and security. - -## Analyzing Firewall Logs - -To effectively use firewall logs, it's crucial to establish a consistent and effective log analysis process. Here are some steps you can follow: - -- **Collect and aggregate logs:** Ensure logs from all your firewalls across the network are collected in a centralized location. This can be done using log management tools, SIEM solutions, or custom scripts. - -- **Monitor in real time:** Leverage realtime monitoring tools to quickly detect security incidents or suspicious activities and act promptly when required. - -- **Set alerts and notifications:** Create alerts and notifications for specific events in your firewall logs (e.g., repeated failed login attempts). This will help you to stay on top of potential security threats. - -- **Perform periodic audits and reviews:** Regularly review your firewall logs to ensure your network remains secure and identify any configuration changes or optimizations needed. - -- **Retain logs per compliance requirements:** Ensure you store and retain your firewall logs as per your organization's data retention policies and legal regulations. - -By effectively implementing firewall log management, you can greatly enhance your organization's cybersecurity posture and be better prepared to respond to potential threats. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/index.md deleted file mode 100644 index 6cc5adbb7..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/index.md +++ /dev/null @@ -1 +0,0 @@ -# Find and use logs diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/108-arp.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/108-arp.md deleted file mode 100644 index 725d3fc69..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/108-arp.md +++ /dev/null @@ -1,36 +0,0 @@ -# arp - -ARP (Address Resolution Protocol) is a crucial part of network communication which enables devices to discover and map IP addresses to their corresponding MAC addresses. This protocol is particularly important in cyber security as it helps us understand the devices on a network, and can sometimes be exploited by attackers to perform various network level attacks. - -## How ARP Works - -In a typical network, devices communicate using their IP addresses. However, the actual communication between devices is facilitated by their MAC (Media Access Control) addresses. ARP is responsible for resolving IP addresses to MAC addresses. Here's a simple example to help illustrate this process: - -- Device A wants to communicate with Device B. -- Device A knows Device B's IP address but not its MAC address. -- Device A broadcasts an ARP request on the network, asking "Who has this IP address? Please tell me your MAC address." -- When Device B receives the request and recognizes its own IP address, it sends an ARP reply to Device A, containing its MAC address. -- Device A can now use the MAC address to communicate directly with Device B. - -## Security Concerns - -While ARP is essential to the proper functioning of a network, it also introduces certain security risks. The primary reason for this vulnerability is that ARP is trust-based and does not have built-in authentication. This creates an opportunity for attackers to exploit the system using techniques such as: - -## ARP Spoofing/Poisoning - -ARP spoofing is an attack in which an attacker sends fake ARP messages to a network, causing the devices to associate the attacker's MAC address with an IP address that legitimately belongs to another device. This allows the attacker to intercept, modify, or manipulate the traffic between the target devices, potentially resulting in a man-in-the-middle (MITM) attack or denial of service (DoS). - -## ARP Cache Poisoning - -Similar to ARP spoofing, ARP cache poisoning is the process of injecting dishonest entries into an ARP cache. This can cause devices to send sensitive information to unintended recipients or facilitate attacks like MITM or DoS. - -## ARP in Incident Response and Discovery Tools - -To counter ARP-based attacks and ensure secure communication within a network, various incident response and discovery tools can be utilized, some of which include: - -- **ARP monitoring tools**: These tools monitor ARP activity to detect potential anomalies, such as multiple ARP replies from a single IP address, which could signify an ARP spoofing attack. -- **Static ARP entries**: Configuring static ARP entries on a device eliminates the need for dynamic ARP resolution and minimizes the risk of ARP cache poisoning. -- **Network traffic analyzers**: Network traffic analysis tools, like Wireshark, can help spot suspicious ARP activity and reveal inconsistencies in ARP messages. -- **Intrusion Detection Systems (IDSs)**: These systems monitor network traffic for spotting potential security threats, including ARP-based attacks. - -In conclusion, understanding the ARP protocol and its potential security risks is crucial for maintaining a secure network environment. By utilizing incident response and discovery tools, it is possible to detect, prevent, and mitigate ARP-based attacks, ensuring a safer network for all connected devices. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/112-tail.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/112-tail.md deleted file mode 100644 index 724578a55..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/112-tail.md +++ /dev/null @@ -1,74 +0,0 @@ -# tail - -## Overview - -`tail` is a command-line utility that allows you to display the last part of files. It is a highly versatile tool, commonly used in system administration and cybersecurity to monitor log files, trace errors, and observe real-time system activities. This utility is available by default on most Unix-based operating systems, such as Linux and macOS. - -## Usage - -The basic syntax for the `tail` command is: - -```bash -tail [options] [file_name] -``` - -- `options`: Flags that modify the behavior of the command. -- `file_name`: The name of the file you want to display. - -Some common options in `tail` include: - -- `-n [lines]`: Output the last `[lines]` lines, instead of the default last 10 lines. -- `-f`: Follow the file as it grows, displaying new content in real time. -- `-F`: Similar to `-f`, but also tries to keep the file open if it's removed, can't be accessed or replaced -- `-q`: Quiet mode - never output headers with file names -- `-s [seconds]`: Sleep for approximately `[seconds]` between iterations. This is applicable with `-f` flag. - -## Examples - -- Display the last 10 lines of a file: - -```bash -tail file_name -``` - -- Display the last 50 lines of a file: - -```bash -tail -n 50 file_name -``` - -- Monitor a log file in real time: - -```bash -tail -f log_file -``` - -- Monitor multiple log files in real time: - -```bash -tail -f log_file1 log_file2 log_file3 -``` - -## Use Cases in Cyber Security - -`tail` is often used by cybersecurity professionals to analyze log files, trace errors, and monitor system activities. Some common use cases include: - -- Identifying unauthorized access attempts by monitoring the contents of the `/var/log/auth.log` file in real time: - -```bash -tail -f /var/log/auth.log -``` - -- Analyzing the most recent entries in a web server log file to identify unusual requests or suspicious activities: - -```bash -tail -n 50 /var/log/apache2/access.log -``` - -- Monitoring system log files to quickly identify and respond to security incidents or anomalies: - -```bash -tail -f /var/log/syslog -``` - -In summary, `tail` is a powerful and versatile command-line utility that proves to be an invaluable resource for system administrators and cybersecurity professionals, providing real-time monitoring and analysis of log files and system activities. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/index.md deleted file mode 100644 index b8baa643a..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/index.md +++ /dev/null @@ -1 +0,0 @@ -# Incident response and discovery tools diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md deleted file mode 100644 index 0d20b5d99..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md +++ /dev/null @@ -1,33 +0,0 @@ -# Buffer Overflow - -A buffer overflow is a common type of cybersecurity vulnerability that occurs when a program writes or reads more data than the fixed-size buffer can hold, resulting in the data to overwrite other data in memory. The overflow can cause data corruption and lead to unexpected behavior, such as application crashes or even the execution of malicious code. - -## Causes of Buffer Overflow - -Buffer overflow vulnerabilities are usually caused by: - -- Insufficient input validation: The program doesn't properly validate the length of the input before writing it into the buffer. -- Off-by-one errors: The code uses an incorrect boundary condition, leading to one extra byte being written outside the buffer. -- Integer overflows: The buffer size is calculated using an integer variable that is too small to represent the required size. - -## Exploitation - -Attackers can exploit buffer overflow vulnerabilities to: - -- Crash the application, causing a denial of service (DoS). -- Overwrite critical data or control structures, causing the application to behave unexpectedly. -- Inject and execute malicious code, compromising the security of the system. - -## Prevention Techniques - -To prevent and mitigate buffer overflow vulnerabilities, the following strategies can be employed: - -- Perform thorough input validation and sanitize all inputs to the program. -- Use safe APIs and libraries that check the size of the data before copying it into the buffer. -- Apply proper boundary checks and use modern programming languages with memory protection features. -- Enable compiler protections such as stack canaries and address space layout randomization (ASLR). -- Regularly scan code for vulnerabilities and conduct security audits. - -By being aware of buffer overflow vulnerabilities and implementing these preventive strategies, you can protect your software from potential attacks and keep your systems secure. - -- [@article@Buffer Overflows (Hacksplaining)](https://www.hacksplaining.com/exercises/buffer-overflows) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/101-memory-leak.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/101-memory-leak.md deleted file mode 100644 index 863545909..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/101-memory-leak.md +++ /dev/null @@ -1,37 +0,0 @@ -# Memory Leak - -A **memory leak** occurs when a program or application allocates memory but fails to release it back to the system when it is no longer needed. This can lead to an accumulation of memory resources that are not in use, ultimately causing a system's performance to degrade or even crash as the available memory resources become exhausted. - -## Causes of Memory Leaks - -Memory leaks can occur due to various reasons such as: - -- **Programming Errors**: Memory leaks mainly result from errors in the program's source code, such as improper handling or deallocation of memory resources. -- **Library or Framework Bugs**: Sometimes, the libraries or frameworks used by an application may contain memory leaks within their implementation. -- **Operating System or Hardware Bugs**: Certain bugs in the operating system or hardware may also cause memory leaks. - -## Effects of Memory Leaks - -Memory leaks can have several negative consequences on system performance and stability, including: - -- **Performance Degradation**: As the system runs out of available memory, it may become slow and unresponsive, leading to a poor user experience. -- **System Crashes**: In extreme situations, a memory leak may cause the system to run out of memory altogether, forcing it to crash or reboot. -- **Resource Exhaustion**: Applications suffering from memory leaks may lead to a gradual depletion of system resources, which can then impact the performance of other applications running on the same system. - -## Detecting Memory Leaks - -There are several techniques to detect memory leaks: - -- **Static Code Analysis**: This method involves analyzing the source code of an application to identify any potential memory leak issues. -- **Runtime Analysis**: Runtime analysis tools, also known as memory profilers, can monitor an application's memory usage during execution and identify leaks in real-time. -- **Testing & Monitoring**: Rigorous testing and continuous monitoring of applications can help detect memory leaks as well as performance issues due to resource contention or exhaustion. - -## Preventing Memory Leaks - -To mitigate the risk of memory leaks: - -- **Follow Best Practices**: By following coding best practices and guidelines, developers can minimize the occurrence of memory leaks in their applications. -- **Code Reviews**: Regularly reviewing the code for potential memory management issues can help identify and fix memory leaks early in the development process. -- **Utilize Garbage Collection**: Choosing programming languages or frameworks that support automatic garbage collection can help manage memory resources more effectively and prevent memory leaks. - -Always remember, addressing memory leaks promptly is crucial in maintaining a secure and efficient computing environment. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/102-xss.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/102-xss.md deleted file mode 100644 index 9370f5621..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/102-xss.md +++ /dev/null @@ -1,27 +0,0 @@ -# XSS - -Cross-site scripting (XSS) is a type of cybersecurity vulnerability commonly found in web applications. It occurs when an attacker injects malicious scripts into webpages viewed by other users. These scripts can be used to steal sensitive information, such as user credentials or sensitive data. XSS vulnerabilities can lead to various consequences, like account takeover, phishing attacks, and other malicious activities. - -There are three main types of XSS attacks: - -- **Stored XSS Attacks**: In this type, the malicious script is stored on the web server, typically through user input fields like comments or posts. When other users visit the affected page, their browsers will execute the malicious script. - -- **Reflected XSS Attacks**: Here, the attacker sends a malicious URL containing the script to unsuspecting users. When they click the link, their browsers execute the malicious script, which can steal sensitive information or perform unauthorized actions. - -- **DOM-based XSS Attacks**: In these cases, the attacker manipulates the Document Object Model (DOM) of a webpage in the user's browser, causing the malicious script to be executed. This method does not involve direct interaction with the webserver. - -## Preventing XSS Attacks - -To protect your web applications from XSS attacks, consider implementing the following best practices: - -- **Input Validation**: Validate and sanitize user inputs to ensure that they only contain acceptable data. Reject any inputs that contain malicious codes or unexpected characters. - -- **Output Encoding**: Encode your application's outputs properly, so special characters are displayed in a way that prevents script execution. - -- **Content Security Policy (CSP)**: Implement a strict CSP, which serves as a layer of defense against XSS by specifying the sources of allowed scripts and other file types that can be executed by the browser. - -- **Secure HTTP Headers**: Set secure values for HTTP headers, such as X-XSS-Protection, X-Content-Type-Options, X-Frame-Options, and X-Content-Security-Policy, to prevent common XSS attack vectors. - -- **Regular Security Testing**: Perform regular security audits and penetration tests to identify and fix any vulnerabilities in your web applications. - -Remember, XSS vulnerabilities pose a significant risk to user privacy and web application security. By following these best practices, you can build a robust defense against cross-site scripting attacks and keep your users' sensitive data protected. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/103-sql-injection.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/103-sql-injection.md deleted file mode 100644 index 1cf2182c5..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/103-sql-injection.md +++ /dev/null @@ -1,41 +0,0 @@ -# SQL Injection - -SQL Injection is a type of cyber attack that targets web applications and databases. This technique takes advantage of vulnerabilities in the application's code by injecting malicious SQL statements and exploiting them to gain unauthorized access or to manipulate the data in a database. Attackers can potentially use this technique to retrieve, modify, delete, or even add data to the database without proper authorization. - -## How SQL Injection Works - -SQL Injection works by identifying input fields in a web application, such as text boxes or URL parameters, and testing whether these fields are vulnerable to SQL code injection. When an attacker identifies a vulnerable input field, they inject SQL code to manipulate the underlying SQL query or to execute additional queries on the database. - -For example, consider a web application that allows users to log in by providing a username and password. The application might use the following SQL query to authenticate the user: - -```sql -SELECT * FROM users WHERE username = '$username' AND password = '$password' -``` - -In this case, `$username` and `$password` are replaced with the values provided by the user. If an attacker enters the following input for the username field, they can manipulate the query to bypass the password check: - -``` -' OR 1=1 -- -``` - -The resulting query would look like: - -```sql -SELECT * FROM users WHERE username = '' OR 1=1 -- ' AND password = '$password' -``` - -As `1=1` is always true, the query returns a result, and the attacker gains unauthorized access. - -## Preventing SQL Injection Attacks - -To protect your web applications from SQL Injection attacks, you should: - -- **Use Parameterized Queries and Prepared Statements**: These techniques separate user input from the SQL query, making it harder for an attacker to inject malicious code. Most modern web development frameworks and database libraries support parameterized queries and prepared statements. - -- **Validate User Input**: Always validate and sanitize user input before incorporating it into a SQL query. Use strict data types and validate input against predefined patterns or value ranges. - -- **Limit Database Permissions**: Limit the privileges of the database accounts used by your web applications. This confines the potential damage if an attacker manages to perform an SQL injection attack. - -- **Keep Software Up-to-Date**: Regularly update your web application software and database management systems to ensure that you are protected against known vulnerabilities. - -By understanding SQL Injection attacks and employing the best practices to prevent them, you can safeguard your web applications and secure your sensitive data from malicious actors. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/104-csrf.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/104-csrf.md deleted file mode 100644 index 643540abe..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/104-csrf.md +++ /dev/null @@ -1,32 +0,0 @@ -# CSRF - -Cross-Site Request Forgery, or CSRF, is a type of attack that exploits the trust that a user's browser has in a web application. It tricks the user's browser into executing unwanted actions on a web application in which the user is currently authenticated. - -## How CSRF Works - -- A user logs into a vulnerable web application. -- The web application returns a cookie to the user's browser, indicating that the user is authenticated. -- The attacker creates a malicious link or embeds malicious HTML/JavaScript code on another website. -- The user, while still authenticated to the web application, visits the attacker's website, which triggers the malicious code. -- The attacker's code sends a request to the targeted web application, leveraging the user's authenticated cookie. -- The vulnerable web application performs the malicious action as if the request came from the user. - -## Impact of CSRF Attacks - -CSRF attacks can result in unauthorized actions being performed on a user's behalf, often without the user's knowledge. Consequences might include unauthorized: - -- Data modifications -- Privilege escalation -- Account takeovers - -## Prevention Measures - -Here are some techniques to help prevent CSRF attacks: - -- **Use CSRF Tokens:** Implement a unique, unpredictable token in each sensitive request (e.g., form submissions) to ensure that the request originates from the same domain. -- **Double-submit Cookies:** Generate a unique token for each session and include it as a hidden value in forms, then validate it against the corresponding session cookie. -- **SameSite Cookies:** Use the `SameSite` attribute in cookies to instruct the browser to only send the cookie when the request originates from the same domain. -- **Content Security Policy (CSP):** Implement a CSP header to mitigate cross-site scripting, which can be a vector for CSRF attacks. -- **Restrict CORS:** Limit Cross-Origin Resource Sharing (CORS) to trusted domains to prevent unauthorized communication between different origins. - -By understanding and applying these preventive measures, the risk of CSRF attacks can be significantly reduced, enhancing the overall safety and security of web applications. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/105-replay-attack.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/105-replay-attack.md deleted file mode 100644 index 1c997f7e2..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/105-replay-attack.md +++ /dev/null @@ -1,31 +0,0 @@ -# Replay Attack - -A **Replay Attack** is a malicious action where an attacker intercepts data transmitted between two parties, records the data, and retransmits it at a later time to create unauthorized access or gain some benefit. This type of attack happens when the data sent by the original sender is not altered in any way but simply replayed, making the system think that it is receiving a legitimate request. - -## How Does a Replay Attack Work? - -Replay attacks work by the following process: - -- The attacker intercepts communication between two parties (e.g., a user authenticating with a server). -- The attacker records the intercepted data, such as login credentials or session tokens. -- The attacker retransmits the recorded data to the target system at a later time, fooling the system into thinking that it is a legitimate request from the original sender. - -## Risks and Consequences - -Some potential risks and consequences of replay attacks include: - -- Unauthorized access: An attacker can gain access to the target system using replayed credentials or session tokens. -- Data theft: The attacker may steal sensitive data by impersonating a legitimate user. -- Financial fraud: In the case of online transactions, an attacker could potentially replay a transaction, causing the victim to pay for the same item or service multiple times. - -## Prevention Techniques - -To prevent replay attacks, consider the following measures: - -- **Timestamps**: Include a timestamp in the data being transmitted, and have the receiving system verify that it is receiving the request within a pre-determined time window. -- **Nonces**: Use a unique, one-time number (nonce) in each transmitted message. The receiving party should check for duplicate nonces to ensure that the message has not been replayed. -- **Session management**: Implement proper session management policies, such as setting timeouts and regularly renewing session tokens. -- **Encryption**: Use strong, end-to-end encryption for data being transmitted between parties. This prevents an attacker from intercepting and reading the data. -- **Message authentication**: Implement message authentication mechanisms, such as digital signatures or Message Authentication Codes (MAC), to ensure the integrity of the transmitted data. - -Understanding and implementing these prevention techniques will help alleviate the risks associated with replay attacks and enhance the overall security of your system. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/106-pass-the-hash.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/106-pass-the-hash.md deleted file mode 100644 index 50a688735..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/106-pass-the-hash.md +++ /dev/null @@ -1,24 +0,0 @@ -# Pass the Hash - -Pass the hash (PtH) is a type of cyber attack that enables an attacker to authenticate to remote systems by using the underlying NTLM or LanMan hash of a user's password, rather than requiring the plaintext password itself. This type of attack exploits the fact that a password hash can be used for authentication instead of the actual password, giving an attacker access to a user's account without the need to crack the password itself. - -## How does Pass the Hash work? - -- **Initial compromise**: The attacker first compromises a single workstation or user account on the target network. This can be done via social engineering, phishing, exploiting software vulnerabilities, or other methods. - -- **Hash extraction**: Once the attacker gains access to the compromised system, they are able to extract the password hashes of users stored in the system. Tools like Mimikatz, Windows Credential Editor, or PowerShell scripts can be used to obtain these hashes. - -- **Lateral movement**: The attacker then leverages the extracted password hashes to access other systems and services within the network. This is done by using the PtH technique to bypass authentication mechanisms and impersonate legitimate users. The attacker continues to search for and collect additional password hashes, looking for privileged account hashes that can grant them further access. - -- **Privilege escalation**: The attacker uses the stolen privileged account hashes to gain increased permissions on the network. This can lead to the attacker gaining control over critical systems, allowing them to exfiltrate sensitive data or even create backdoors for future attacks. - -## Mitigation Strategies - -To defend against pass the hash attacks, organizations should implement a combination of the following measures: - -- **Network segmentation**: Divide the network into separate segments, restricting access to sensitive systems and limiting unauthorized lateral movement. -- **Multi-factor authentication (MFA)**: Implement MFA for user accounts, particularly for administrator accounts, to make it more difficult for an attacker to authenticate using stolen hashes. -- **Strong password policies**: Enforce strong, unique passwords to make it harder for attackers to crack hashes or gain unauthorized access. -- **Least privilege principle**: Limit user account privileges and ensure that users only have the permissions necessary for their job roles. -- **Credential Guard**: Use Windows Credential Guard or similar security features on supported operating systems to protect stored credentials and limit the risk of hash extraction. -- **Regular monitoring and auditing**: Continuously monitor and audit user activities, access logs, and system security to detect and prevent unauthorized access or suspicious activity. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/107-directory-traversal.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/107-directory-traversal.md deleted file mode 100644 index 60acb7420..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/107-directory-traversal.md +++ /dev/null @@ -1,35 +0,0 @@ -# Directory Traversal - -Directory traversal, also known as path traversal, is a type of cyber attack that allows an attacker to access restricted files and directories on a server, usually with the goal of obtaining sensitive information. This vulnerability occurs when user input is not adequately validated and the attacker can manipulate it to traverse the server directory structure. - -## How it Works - -In a directory traversal attack, the attacker attempts to exploit an input field (e.g., a file or image upload form, URL parameters, etc.) that takes a file path as input. By supplying specially crafted input, an attacker can manipulate the server into providing access to unauthorized files and directories. - -For example, consider a web application that allows users to view the contents of a specific file by specifying its path through a URL parameter, such as: - -``` -https://www.example.com/file.php?path=/user/documents/report.pdf -``` - -In this case, an attacker could manipulate the `path` parameter to traverse the server's directories, like this: - -``` -https://www.example.com/file.php?path=../../../../etc/passwd -``` - -If the server doesn't properly validate and sanitize the input, it might reveal the contents of the `/etc/passwd` file, which contains sensitive information about system users. - -## Mitigation Techniques - -There are several methods to prevent directory traversal attacks: - -- **Input Validation:** Ensure that user input is strictly validated and sanitized. For example, one can check for the presence of special characters (e.g., '..', '/', '\'), disallowing them if found. - -- **Access Control:** Implement proper access control mechanisms to prevent unauthorized access to files and directories. For example, use a whitelist approach to establish which files and directories the user is allowed to access. - -- **Least Privilege:** Practice the principle of least privilege by ensuring that an application runs with only the necessary permissions needed for its operation. This can minimize the potential impact of a directory traversal attack. - -- **Use Chroot Jails:** Deploy applications inside chroot jails to restrict access to a certain directory, thwarting attempts to traverse outside that directory. - -By implementing these countermeasures, you can minimize the risk of directory traversal attacks and help protect your system's critical files and directories. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/index.md deleted file mode 100644 index 18a729777..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/index.md +++ /dev/null @@ -1 +0,0 @@ -# Other attacks diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/100-ftp-vs-sftp.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/100-ftp-vs-sftp.md deleted file mode 100644 index acddcb582..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/100-ftp-vs-sftp.md +++ /dev/null @@ -1,37 +0,0 @@ -# FTP vs SFTP - -## FTP (File Transfer Protocol) - -FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the Internet. It is an unsecure protocol that relies on clear-text data transmission, meaning data is sent in plain text and can be easily intercepted by malicious actors. - -**Pros of FTP:** - -- Simple and widely supported by many systems -- Easy to set up and use - -**Cons of FTP:** - -- Insecure, as it transmits data in plain-text -- Passwords and file contents can be intercepted by malicious actors -- Vulnerable to attacks like packet sniffing and man-in-the-middle - -## SFTP (SSH File Transfer Protocol) - -SFTP, also known as Secure File Transfer Protocol, is an extension of SSH (Secure Shell) protocol that allows for the encrypted transfer of files over a secure channel. Unlike FTP, SFTP encrypts both data and commands, providing privacy and integrity to the data transmission. - -**Pros of SFTP:** - -- Secure, as it uses encryption to protect data in transit -- Provides authentication, ensuring that the sender and receiver are who they claim to be -- Mitigates the risk of attacks like packet sniffing and man-in-the-middle - -**Cons of SFTP:** - -- May be slightly slower than FTP due to the encryption and decryption process -- Can be more difficult to set up and configure - -**Conclusion** - -In summary, although FTP is easier to set up and has been widely used for file transfers historically, SFTP is the more secure and recommended option. SFTP provides encryption, data integrity, and authentication, ensuring that your data is protected while in transit. - -It's essential to prioritize cybersecurity when transferring files between systems. Therefore, it is encouraged to adopt SFTP over FTP to significantly reduce the risk of data breaches and potential attacks. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/101-ssl-vs-tls.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/101-ssl-vs-tls.md deleted file mode 100644 index b2e8a5e19..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/101-ssl-vs-tls.md +++ /dev/null @@ -1,32 +0,0 @@ -# SSL vs TLS - -Secure Socket Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols designed to provide secure communication over a computer network. Both of these protocols provide data privacy, integrity, and authentication between a client and server. However, TLS is an updated and more secure version of SSL. In this section, we will discuss the differences between SSL and TLS, and why TLS should be preferred over SSL. - -## SSL (Secure Socket Layer) - -SSL was originally developed by Netscape in the mid-1990s to secure transactions over the internet. There have been three versions of SSL: - -- SSL 1.0: This version was never publicly released due to security flaws. -- SSL 2.0: Released in 1995, this version had several security vulnerabilities which led to its deprecation. -- SSL 3.0: Released in 1996, this version addressed several security issues found in SSL 2.0. However, due to the discovery of new vulnerabilities (such as POODLE attack), SSL 3.0 is also considered insecure and deprecated. - -## TLS (Transport Layer Security) - -TLS was introduced by the Internet Engineering Task Force (IETF) in 1999 as a replacement for SSL. TLS can be considered as the new version of SSL with improved security features. The TLS protocol has gone through several updates: - -- TLS 1.0: This version was also vulnerable to certain attacks and is now considered insecure. -- TLS 1.1: It addressed some of the security issues of TLS 1.0 but is also nearing end-of-life. -- TLS 1.2: Released in 2008, it improved security features significantly and is widely used today. -- TLS 1.3: Released in 2018, it offers even better security enhancements and improved performance. - -## Key Differences between SSL and TLS - -- **Security**: TLS provides better security due to the use of stronger encryption algorithms, updated cipher suites, and improved key exchange mechanisms. -- **Performance**: TLS 1.3 has reduced the number of round-trips required for the handshake process, resulting in faster connection times. -- **Backward Compatibility**: TLS is designed to be backward compatible with SSL 3.0, allowing systems using TLS to communicate with those still using SSL. However, it's strongly recommended to disable SSL 3.0 support to avoid potential attacks. - -## Recommendation - -Given the security concerns with SSL and the outdated encryption methods it uses, it is essential to use TLS for secure communication. It is recommended to use the latest version of TLS (currently, 1.3) for maximum security and performance. - -In conclusion, make sure to configure your systems and applications to use TLS and disable SSL to ensure secure communication and protection against known vulnerabilities. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/102-ipsec.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/102-ipsec.md deleted file mode 100644 index e4476351c..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/102-ipsec.md +++ /dev/null @@ -1,30 +0,0 @@ -# IPSEC - -_IPsec_ is a collection of protocols and encryption algorithms specifically designed to protect packets during data transfer within an IP network. It is particularly effective for establishing secure connections and preventing data tampering, data sniffing, and other threats in both IPv4 and IPv6 networks. IPsec provides multiple security features, including: - -- **Authentication:** IPsec verifies the identity of the sender and receiver, ensuring that the data is being transmitted to the correct destination. -- **Confidentiality:** IPsec encrypts data, which prevents unauthorized access and keeps the data confidential during transmission. -- **Data Integrity:** IPsec adds a unique digital signature to each packet to ensure that it has not been tampered with during transmission. -- **Anti-Replay Protection:** IPsec implements a mechanism to prevent attackers from replaying and injecting duplicate packets into the communication stream. - -IPsec operates at the network layer, making it suitable for protecting various applications without requiring modification to the application layer. This advantage makes it particularly useful in Virtual Private Networks (VPNs) and other secure communication setups. - -## Key Components of IPsec - -IPsec primarily consists of two main components: - -- **AH (Authentication Header):** AH provides data integrity and authentication by adding an authentication header to each IP packet. It verifies that the packet has not been altered during transit by checking the integrity of the data and the identity of the sender. - -- **ESP (Encapsulating Security Payload):** ESP provides confidentiality by encrypting the data in IP packets. This ensures that the packet's contents are safe from unauthorized access and tampering during transmission. - -IPsec also uses two primary modes of operation: - -- **Transport Mode:** In transport mode, IPsec is applied only to the payload of an IP packet. This mode is typically used for securing end-to-end communication between hosts. - -- **Tunnel Mode:** In tunnel mode, IPsec is applied to the entire IP packet, including the header. This mode is commonly used in VPNs, where the entire packet is encapsulated, providing security between two networks. - -## IPsec in Practice - -To use IPsec, an organization must first establish a security association (SA) between the communicating parties. The SA contains the necessary information, such as encryption keys and chosen encryption algorithms, for secured communication. The Internet Key Exchange (IKE) protocol is widely used to create and manage SAs. - -Overall, IPsec is a flexible and powerful tool for enhancing cybersecurity at the network layer. By incorporating IPsec into your network configurations, you can prevent various threats and provide secure communication to your users. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/103-dnssec.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/103-dnssec.md deleted file mode 100644 index 187e32bf9..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/103-dnssec.md +++ /dev/null @@ -1,35 +0,0 @@ -# DNSSEC - -DNSSEC is an important security standard designed to protect the integrity of DNS (Domain Name System) data. The DNS is responsible for translating human-readable domain names (e.g. www.example.com) into IP addresses that computers can understand. However, the traditional DNS is vulnerable to several types of attacks, such as cache poisoning or man-in-the-middle attacks. This is where DNSSEC comes in. - -## What is DNSSEC? - -DNSSEC adds an extra layer of security to the DNS by validating DNS responses using cryptographic signatures. It ensures that the information received from a DNS server has not been tampered with, guaranteeing the authenticity and integrity of the data. - -## Key Features of DNSSEC - -- **Digital Signatures**: DNSSEC adds digital signatures to DNS data, which are verified by the recipient's DNS resolver. This prevents attackers from altering or forging DNS data. - -- **Public-Key Cryptography**: DNSSEC uses public-key cryptography to generate and verify digital signatures. This allows anyone to verify the authenticity of DNS data without possessing the private key used to create the signatures. - -- **Chain of Trust**: DNSSEC establishes a chain of trust from the root of the DNS tree down to individual domain names. Each level in the hierarchy vouches for the validity of the cryptographic keys used by its subdomains, creating a reliable mechanism for verifying DNS data. - -## How Does DNSSEC Work? - -- **Zone Signing**: DNS data is organized into zones. When a zone is signed with DNSSEC, a set of public and private keys is created for the zone. The DNS data is then signed using the private key, creating a digital signature. - -- **Delegation Signing**: To establish a chain of trust, a special type of DNS record called a DS (Delegation Signer) record is created in the parent zone. This DS record contains a hash of the public key of the child zone, effectively vouching for its authenticity. - -- **DNSSEC Validation**: When a DNS resolver receives a DNSSEC-protected DNS reply, it verifies the digital signatures using the public keys obtained from the parent zone. If the signatures are valid, the resolver can confidently consider the DNS data authentic and untampered. - -## Challenges and Limitations - -While DNSSEC significantly improves DNS security, it does have some challenges and limitations: - -- **Complex Setup**: Implementing DNSSEC can be complex, requiring significant planning and technical knowledge. - -- **Key Management**: Securely managing and regularly updating cryptographic keys is crucial but can be demanding. - -- **Larger DNS Responses**: DNSSEC adds additional data to DNS responses, which can lead to larger response sizes and possible performance impacts. - -Despite these challenges, DNSSEC is a critical security measure to protect against DNS-based attacks, and its adoption is highly recommended. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/104-ldaps.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/104-ldaps.md deleted file mode 100644 index d94f356c8..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/104-ldaps.md +++ /dev/null @@ -1,33 +0,0 @@ -# LDAPS - -**LDAPS** (Lightweight Directory Access Protocol over SSL) is a secure version of LDAP, a protocol used for accessing and maintaining directory services over an IP network. LDAPS allows for secure communications between clients and servers by encrypting data transmitted over the network using Secure Sockets Layer (SSL) or Transport Layer Security (TLS). - -## Why should you use LDAPS? - -When using the plain LDAP protocol, the data transmitted between client and server is not encrypted, and therefore, it is susceptible to eavesdropping and man-in-the-middle attacks. By implementing LDAPS, you ensure that sensitive information, such as user credentials and organizational data, is protected while it is in transit. - -## How does LDAPS work? - -LDAPS uses SSL/TLS to establish an encrypted connection between client and server before any LDAP traffic is exchanged. The process involves the following steps: - -- A client initiates an SSL/TLS-protected connection to the server on the default LDAPS port (636) or the customized port defined by the server administrator. - -- The server presents its SSL/TLS certificate to the client, allowing the client to verify the server's authenticity and establish trust. - -- Following a successful certificate validation, the client and server negotiate the encryption algorithm and key length to be used during the secure session. - -- Once the secure session is established, the client and server proceed to exchange LDAP messages over the encrypted channel. - -- To close the secure session, either the client or the server sends an SSL/TLS close_notify alert. - -## Best practices for implementing LDAPS - -To ensure a secure and reliable LDAPS setup, you should consider the following best practices: - -- **Use valid and up-to-date SSL/TLS certificates:** Obtain your certificates from a trusted Certificate Authority (CA) and ensure they're renewed before expiration. -- **Configure strong encryption algorithms:** Choose the encryption algorithms and key lengths that provide strong protection and comply with your organization's security policies. -- **Validate server certificates on the client-side:** Properly configure client applications to validate server certificates to avoid trusting malicious servers. -- **Monitor and manage the LDAPS infrastructure:** Regularly review logs, analyze performance, and keep software up-to-date to maintain a secure and efficient setup. -- **Enforce a gradual transition from LDAP to LDAPS:** Before fully migrating to LDAPS, run both protocols during the transition period to ensure a smooth migration and to avoid potential downtime. - -By understanding LDAPS and implementing it correctly, you can ensure secure communication while accessing and managing your directory services, thereby enhancing your organization's overall cybersecurity. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/105-srtp.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/105-srtp.md deleted file mode 100644 index 87fbb8538..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/105-srtp.md +++ /dev/null @@ -1,21 +0,0 @@ -# SRTP - -SRTP is an extension of the Real-Time Transport Protocol (RTP) that provides enhanced security to audio and video communication. RTP is widely used for Voice over IP (VoIP) as well as audio and video streaming provided by applications such as Skype, Google Hangouts, YouTube Live, and Webex. - -While RTP allows for real-time transmission of audio and video, it lacks security measures, exposing the transmitted data to potential eavesdropping or tampering. SRTP fills in this gap by adding encryption, message authentication, and replay protection. - -## Encryption - -SRTP uses Advanced Encryption Standard (AES) with a 128-bit key length in order to encrypt the RTP payloads. This ensures that your communication data remains private and shielded from unauthorized access. - -## Message Authentication - -Message authentication, also known as data integrity, ensures that the messages you send are not tampered with during transmission. SRTP utilizes HMAC-SHA1 to detect any changes made to the original message, guaranteeing that the receiver can trust the authenticity of the message. - -## Replay Protection - -Replay protection is implemented in SRTP to prevent attackers from re-sending previously captured SRTP packets. This is achieved by checking sequence numbers and maintaining a replay list, allowing the protocol to drop packets that are recognized as duplicates. - -## Conclusion - -As a result, SRTP provides an added layer of security while maintaining the real-time capabilities of RTP. Combining these security features, SRTP has become the preferred protocol in audio and video communication for various applications that require a higher level of security and privacy. Implementing secure protocols such as SRTP is an essential step in enhancing your overall cybersecurity. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/106-s-mime.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/106-s-mime.md deleted file mode 100644 index 7552938a0..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/106-s-mime.md +++ /dev/null @@ -1,35 +0,0 @@ -# S/MIME - -S/MIME is an encryption and digital signature technology that adds a layer of security to email communications. It enhances the security of email messages by providing confidentiality, integrity, and authentication while using standard mail protocols like SMTP, IMAP, and POP3. - -S/MIME uses a public key infrastructure (PKI) to ensure the secure exchange of messages. Users must obtain a digital certificate that contains a pair of private and public keys used to encrypt and decrypt messages. - -## Features of S/MIME - -- **Encryption**: S/MIME encrypts the email content, ensuring that only the intended recipient can read the message. This protects the sensitive information from eavesdroppers and unauthorized access. - -- **Digital Signature**: S/MIME enables the sender to digitally sign the message, ensuring the recipient that the message is authentic and hasn't been tampered with during transmission. It verifies the sender's identity and integrity of the message content. - -- **Message integrity**: The digital signature of S/MIME prevents any tampering, alteration, or unauthorized modification of the email content during transmission. It ensures the recipient that the message received is exactly the same as the message sent. - -## How to use S/MIME - -To use S/MIME, both the sender and recipient must have a digital certificate issued by a trusted certificate authority, which binds their email address and public key. Once you have a digital certificate, follow these steps: - -- Configure your email client (like Outlook, Thunderbird, or Apple Mail) to use S/MIME for signing and encrypting messages. - -- Import the digital certificate into your email client or webmail application. - -- When composing an email, select the option to sign, encrypt, or both. - -## Limitations of S/MIME - -Although S/MIME provides a strong layer of security to email communications, it has some limitations: - -- **Complexity**: The use of digital certificates and the need for both sender and recipient to have a certificate may deter some users from adopting it. - -- **Compatibility**: Not all email clients support S/MIME, which may limit its usage among users or organizations. - -- **Certificate management**: Managing digital certificates can be challenging, especially for organizations or users with a large number of certificates. Regularly updating and renewing certificates is crucial to maintaining security. - -Despite these limitations, S/MIME remains an essential security measure for protecting sensitive email communications. It's highly recommended for organizations dealing with confidential data and for individuals who prioritize privacy and security. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/index.md deleted file mode 100644 index 8efcbf84a..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/index.md +++ /dev/null @@ -1 +0,0 @@ -# Secure vs unsecure protocols diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/tools-for-unintended-purposes/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/tools-for-unintended-purposes/index.md deleted file mode 100644 index 6f926bad5..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/tools-for-unintended-purposes/index.md +++ /dev/null @@ -1 +0,0 @@ -# Tools for unintended purposes diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/100-attck.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/100-attck.md deleted file mode 100644 index 858b924cd..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/100-attck.md +++ /dev/null @@ -1,29 +0,0 @@ -# ATT&CK - -The **ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework** is a valuable resource for understanding the methods and strategies that adversaries are likely to use when attacking a target system or network. Developed by MITRE Corporation, ATT&CK is a comprehensive, regularly updated repository of threat actor tactics and techniques seen in real-world attacks. - -## Key Components - -There are four main components of the ATT&CK framework: - -- **Tactics**: These represent the intentions or strategic goals of an attacker, such as gaining initial access to a target network or moving laterally within it. -- **Techniques**: These are the specific methods employed by attackers to accomplish their tactical objectives. Techniques are usually associated with multiple tactics, and can be standardized or customized by threat actors. -- **Sub-techniques**: Sub-techniques provide more granularity to specific techniques, breaking them down into smaller components that can be observed or mitigated individually. -- **Mitigations**: This component focuses on the defensive measures that organizations can take to prevent or respond to the attacker's tactics and techniques. - -## ATT&CK Matrix - -The ATT&CK Matrix is a visualization tool that organizes tactics and techniques into a table that represents the stages of an attack lifecycle. It's designed to help security practitioners understand the relationships between tactics and techniques, making it easier to use the framework effectively in threat analysis, detection, and prevention efforts. - -## Real-World Application - -By understanding the possible threats detailed in the ATT&CK framework and incorporating them into your cybersecurity strategy, you can better assess your organization's vulnerabilities, develop improved defensive procedures, and respond more effectively to incidents. The matrix could be used to: - -- Identify gaps in your security posture -- Develop more robust defensive measures tailored to specific attack scenarios -- Evaluate the effectiveness of current detection and prevention tools -- Train your team in identifying and responding to typical attack patterns - -In summary, the ATT&CK framework is an invaluable resource for understanding the techniques and methods used by adversaries in real-world cyber attacks. As an author of a cyber security guide, ensuring that you are familiar with ATT&CK can help you build a more effective, comprehensive, and robust security strategy to keep your organization safe. - -- [@article@Link to MITRE ATT&CK](https://attack.mitre.org/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/101-kill-chain.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/101-kill-chain.md deleted file mode 100644 index fb5c419f9..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/101-kill-chain.md +++ /dev/null @@ -1,21 +0,0 @@ -# Kill chain - -The **Kill Chain** is a cyber security framework that helps in understanding and identifying the steps an attacker goes through in order to carry out a successful cyber attack. Originated from military concepts, kill chain models are typically used to dissect cyber attacks, offering valuable insights to identify weak points and devise strategies for protecting systems and networks. - -In the context of cyber security, the kill chain approach has been adapted by various organizations, including Lockheed Martin's Cyber Kill Chain. Here is a brief overview of the seven stages of the Lockheed Martin Cyber Kill Chain framework: - -- **Reconnaissance:** This is the initial phase where the attacker does research, gathers information and identifies potential targets, such as email addresses, social media profiles, or specific systems and networks. - -- **Weaponization:** In this phase, the attacker creates a weapon, such as a malware or virus, and packages it with an exploit (a piece of software or script that takes advantage of a vulnerability in a system). - -- **Delivery:** The attacker transfers the weapon to the target, typically via email attachments, compromised websites or various other means. - -- **Exploitation:** Upon reaching the target, the weapon exploits the vulnerability, usually gaining unauthorized access and control. - -- **Installation:** The attacker installs the malicious software on the target system, ensuring that it can persist and remain undetected. - -- **Command and Control (C2):** The attacker now establishes a channel of communication with the compromised system to remotely control it and further carry out malicious activities. - -- **Actions on Objectives:** With full access, the attacker now achieves their intended goal, which may be data exfiltration, system disruption or other malicious outcomes. - -To protect against cyber threats, it is essential to understand these steps, identify the weak spots in your organization's security posture, and apply the necessary measures to prevent, detect or respond to potential threats in a timely manner. By utilizing the kill chain approach, you can effectively improve your organization's cyber security defenses and mitigate the risks posed by cybercriminals. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/102-diamond-model.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/102-diamond-model.md deleted file mode 100644 index 225dabfed..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/102-diamond-model.md +++ /dev/null @@ -1,14 +0,0 @@ -# Diamond Model - -The Diamond Model is a popular framework in cybersecurity that helps analysts assess, analyze, and mitigate cyber threats. This model was developed to better understand and counter advanced persistent threats (APTs) and targeted cyber-attacks. The fundamental concept of the Diamond Model is its focus on the interactions between four core elements of an intrusion event: - -- **Adversary:** This represents the individual or group responsible for conducting the cyber-attack. Understanding the adversary's motivation, resources, and capabilities helps when developing defensive strategies against their threats. -- **Capability:** The tools, tactics, and techniques employed by the adversary to infiltrate and exploit a target's systems or networks. These could include malware, exploits, social engineering, or other methods. -- **Infrastructure:** The physical or virtual systems and services, such as servers, domains, or command and control (C2) networks, used by the adversary to conduct their operations. In some cases, an adversary may leverage compromised infrastructure from other victims to hide their true origin. -- **Victim:** The targeted individual, group, or organization that is being attacked or potentially at risk. Understanding the victim's vulnerabilities, as well as the potential impact of an intrusion, allows for better prioritization of defenses and incident response efforts. - -By examining these four elements and their relationships, analysts can gain a comprehensive understanding of an intrusion event and derive actionable insights to enhance their organization's cyber defense posture. Analyzing intrusion events using the Diamond Model helps uncover patterns, identify potential weaknesses, and prioritize remediation efforts to better protect the environment from future threats. - -In addition to the core elements, the Diamond Model also considers external factors, such as social, political, and economic contexts, which could influence the adversary's behavior or choice of targets. This broader context can further refine the analysis and help develop more robust defensive strategies. - -In conclusion, the Diamond Model of Intrusion Analysis is an effective framework for better understanding and addressing the ever-evolving cybersecurity landscape. By focusing on the interactions between adversaries, their capabilities, infrastructure, and victims, organizations can effectively mitigate risks, improve their defenses, and enhance their overall cybersecurity posture. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/index.md deleted file mode 100644 index 8d9a0481e..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/index.md +++ /dev/null @@ -1 +0,0 @@ -# Uderstand frameworks diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/100-virus-total.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/100-virus-total.md deleted file mode 100644 index 16d6bd960..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/100-virus-total.md +++ /dev/null @@ -1,12 +0,0 @@ -# VirusTotal - -[VirusTotal](https://www.virustotal.com/) is a free online service that analyzes files and URLs to detect viruses, worms, trojans, and other kinds of malicious content. It uses multiple antivirus engines and website scanners to provide a comprehensive report on the security status of a file or website. - -VirusTotal is not a substitute for traditional antivirus software, but it can be used as a complementary tool to assess the security of specific files and websites. Key features of VirusTotal include: - -- **File analysis:** Users can upload a file (up to 650MB) to the VirusTotal platform, where it will be analyzed by a variety of antivirus engines. The platform then provides a report that shows if any of the antivirus engines flagged the file as suspicious or malicious. -- **URL analysis:** Users can submit a URL to VirusTotal for scanning, and the platform will analyze the website using multiple website scanners, such as blacklisting services and domain reputation tools, to determine if the site is a potential security risk. -- **APIs and integrations:** VirusTotal offers a public API that allows developers to access its resources programmatically. This means you can integrate VirusTotal's features into your own tools or applications, enhancing your security capabilities with the power of multiple antivirus engines. -- **Community and collaboration:** VirusTotal enables users to create a free account, which grants them access to a range of additional features, such as sharing comments and opinions about files and URLs with other users. This allows the community to work together to better understand and detect potential security threats. - -When encountering a suspicious file or website, consider using VirusTotal as an additional resource to better understand the potential risks associated with it. However, keep in mind that no security tool is infallible, and maintaining a layered approach to cybersecurity should always be a top priority. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/101-joe-sandbox.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/101-joe-sandbox.md deleted file mode 100644 index 82f7f3650..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/101-joe-sandbox.md +++ /dev/null @@ -1,25 +0,0 @@ -# Joe Sandbox - -Joe Sandbox is a powerful and comprehensive malware analysis platform that is designed to automatically analyze and detect various types of malicious files, such as ransomware, Trojans, and exploit documents. It helps organizations to deeply understand the behavior of potentially harmful files and provides actionable insights to improve their cyber-defense. - -## Key Features: - -- **Deep Analysis:** Joe Sandbox employs a combination of static, dynamic, and behavioral analysis techniques to uncover even the most evasive malware threats. -- **System Compatibility:** It provides support for multiple operating systems, including Windows & Android. Joe Sandbox also supports various hypervisors such as VMWare, VirtualBox, and QEMU. -- **File Formats:** The platform can work with a variety of file formats, including executable files (.exe, .dll), Java applets, PDFs, Microsoft Office documents, and URL links. -- **API Integration:** Joe Sandbox offers RESTful APIs which facilitate seamless integration with other IT security products and threat intelligence services. -- **Reporting:** Detailed and customizable reports capture valuable information about the analyzed samples, including IoCs (Indicators of Compromise), file information, network activity, and dropped artifacts. -- **Signature-Based Detection:** The platform integrates signature-based detection to facilitate rapid identification of known malware families. -- **Cloud-based or on-premises deployment:** Joe Sandbox provides users the option to choose between deploying the malware analysis in-house (on-premises) or leveraging the cloud version for added flexibility and cost savings. - -## Use Cases: - -Joe Sandbox proves to be an instrumental tool by helping organizations in performing the following tasks: - -- Detecting and categorizing new and emerging malware threats -- Analyzing suspicious files or network activities -- Enhancing threat hunting capabilities with advanced threat intelligence -- Improving incident response processes by understanding attack vectors and indicators of compromise -- Educating staff and creating awareness about the latest malware trends and attack techniques - -In summary, Joe Sandbox plays a critical role in strengthening an organization's cyber-security posture by delivering in-depth malware analysis and detection capabilities. Utilizing this tool effectively can result in a proactive and robust defense mechanism against increasingly complex and targeted cyber-threats. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/102-any-run.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/102-any-run.md deleted file mode 100644 index 99f03152b..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/102-any-run.md +++ /dev/null @@ -1,25 +0,0 @@ -# any.run - -[Any.Run](https://any.run/) is an interactive online malware analysis tool that helps researchers, analysts, and security enthusiasts investigate and understand potential malware, viruses, and other malicious files. This platform enables users to safely execute and observe file behavior in an isolated environment, known as a sandbox. By evaluating the behavior patterns of a suspicious file, Any.Run can help identify its potential threat to a user's system. - -## Key Features - -- **Interactive Online Sandbox:** Any.Run provides an online sandbox environment where users can securely upload and execute suspicious files for analysis without affecting their own computer systems. - -- **Real-time Analysis:** As the file is executed in the sandbox, Any.Run provides real-time monitoring and visualization of processes, network activity, and file system changes. This aids in understanding the potential impact of a malicious file. - -- **Integrated Threat Intelligence:** Any.Run automatically checks external threat intelligence sources like VirusTotal, which helps users see how the file has been classified by other antivirus solutions. - -- **Multiple Operating Systems Support:** Users can select different operating systems and software configurations in the sandbox environment for more realistic and relevant analysis results. - -- **Collaborative Analysis:** Any.Run allows users to share the results of their analysis with other researchers, fostering collaboration and threat intelligence sharing within the cybersecurity community. - -## Getting Started - -- Create an account on [Any.Run website](https://any.run/) -- Once logged in, click on the "New Task" button to create a new analysis task. -- Upload the file you want to analyze or provide a URL to download the file for analysis. -- Choose the operating system and other virtual environment settings. -- Start the analysis task, and monitor file behavior through the live visualization and output reports provided by Any.Run. - -By utilizing Any.Run as part of your cybersecurity toolkit, you can gain in-depth insights into the behavior and impact of potentially malicious files, leading to more effective and informed decisions about your cyber threat landscape. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/103-urlvoid.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/103-urlvoid.md deleted file mode 100644 index b8392211c..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/103-urlvoid.md +++ /dev/null @@ -1,17 +0,0 @@ -# urlvoid - -_URLVoid_ is a reputable online service designed to help webmasters, security analysts, and internet users to detect potentially harmful websites by scanning their domain names. By providing detailed reports on domains' security reputation, URLVoid empowers users with vital information about potential risks associated with a website before they access it. - -URLVoid offers the following features: - -- **Blacklist Checks**: The platform scans the provided domain using a variety of blacklists, including antivirus engines, domain and IP reputation platforms, and phishing databases. The results of these checks give users an indication if the domain is considered malicious or if it has a poor reputation. - -- **Website Analysis**: URLVoid crawls the domain and provides useful insights such as its registration date, hosting company, server location, and SSL certificates (if any). Additionally, it generates a screenshot preview of the website's landing pages. - -- **WHOIS & DNS Lookup**: Access information about the domain's registration and ownership (WHOIS) and Domain Name System (DNS) records. This data can be helpful in tracking the registrant behind a suspicious website or verifying the legitimacy of a domain. - -- **IP Address Detection**: URLVoid also lists associated IP addresses of the scanned domain, helping users check IP-based threats or evaluate the reputation of specific IP addresses. - -To use URLVoid, visit their website at [www.urlvoid.com](https://www.urlvoid.com/), input the URL or domain, and the service will generate a comprehensive report within seconds. - -Keep in mind, URLVoid serves as a starting point for investigating potentially harmful websites. A clean report does not guarantee the absolute safety of a domain; conversely, false positives occasionally occur. We recommend using URLVoid in combination with other security tools and practices to ensure your online safety. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/104-urlscan.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/104-urlscan.md deleted file mode 100644 index 210c0c51d..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/104-urlscan.md +++ /dev/null @@ -1,23 +0,0 @@ -# urlscan - -URLScan is a popular security tool that helps protect your web server from potential harmful HTTP requests. It is an effective defense against a myriad of web-based attacks such as SQL injection, cross-site scripting (XSS), and server-directory traversal. - -## Key Features - -- **Analyzing Requests**: URLScan examines incoming HTTP requests to identify potentially malicious patterns or signs of an attack. -- **Blocking URLs**: By filtering URLs with specific patterns or known bad signatures, URLScan helps protect your web server from harmful requests. -- **Customizable Rules**: You can create custom rules tailored to your specific environment to provide a comprehensive security solution. -- **Logging**: URLScan logs security-related events, allowing you to monitor and act on potential security threats. - -## Usage in Cyber Security - -Some common use-cases for URLScan in the cyber security realm are: - -- **Prevent SQL Injection**: URLScan is capable of detecting requests that contain SQL-like patterns, helping to secure your web applications from SQL injection attacks. -- **Mitigate XSS Attacks**: URLScan can be configured to deny requests with common cross-site scripting patterns or specific user-agent strings associated with known exploits. -- **Control Access to Sensitive Directories**: By configuring URLScan to block access to specific directories or file types, you can reduce the risk of unauthorized access to sensitive files on your web server. -- **Monitor Suspicious Activity**: Since URLScan provides detailed logs of security events, you can use this information to quickly identify and respond to potential security threats. - -## Conclusion - -URLScan is an essential tool for maintaining web server security in today's complex online environment. By implementing this tool, you can mitigate common web-based attacks and reduce the number of potential threats to your web server. Don’t forget to monitor the logs generated by URLScan regularly to stay on top of potential threats and ensure the ongoing security of your web application. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/105-whois.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/105-whois.md deleted file mode 100644 index 2757576fc..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/105-whois.md +++ /dev/null @@ -1,33 +0,0 @@ -# WHOIS - -**Whois** is a widely-used protocol and tool that allows you to query domain registration and ownership information. It is often useful in the cyber security field for researching and investigating the origins, hosting providers, or administrators associated with a particular domain or IP address. - -## How to Use Whois - -There are various ways you can access the Whois database, as listed below: - -- **Command Line**: Most operating systems come with a command-line version of Whois. For example, you can simply open your command prompt or terminal and type in `whois example.com` to find information about `example.com`. - -- **Websites**: Many websites offer specialized Whois lookup services, such as [ICANN's Whois Lookup](https://whois.icann.org/) and [Whois.net](https://www.whois.net/). - -- **Software Tools**: You can use specialized software tools like [Network-Tools](http://network-tools.com/) and [WebHostingHero Whois Finder](https://www.webhostinghero.com/whois-finder/) to access the Whois database. - -## Whois Information - -When performing a Whois query, you may typically find the following information: - -- **Domain registrar**: The company that registers and manages the domain. - -- **Domain owner**: The person or organization responsible for the domain, including their name, address, phone number, and email address. - -- **Domain's creation, expiration, and last update dates**: These dates can be useful to determine the age and history of a domain, as well as checking for recent changes. - -- **Domain status**: This can include `active`, `inactive`, `pending`, `locked`, or `expired`, depending on the current state of the domain. - -- **Domain's name servers**: These are the servers responsible for resolving the domain to its corresponding IP address(es). - -## Privacy & Limitations - -It is important to note that Whois information may not always be accurate, as domain owners can provide false information or use privacy protection services to mask their identity. Additionally, some registrars may limit the number of Whois queries from a single IP address, which can limit the usefulness of Whois in some scenarios. - -In conclusion, Whois is a valuable tool for understanding domain registration and ownership information. It can be used by cyber security professionals, among others, to investigate potentially malicious websites or domains, identify patterns or relationships among sites, and gain insights into a domain's history and ownership. Remember to consider the limitations of the information obtained through Whois and always verify the gathered information through various sources. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/index.md deleted file mode 100644 index 2fc6f3ef3..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/index.md +++ /dev/null @@ -1 +0,0 @@ -# Understand common tools diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/100-antivirus.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/100-antivirus.md deleted file mode 100644 index 09d2dedd3..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/100-antivirus.md +++ /dev/null @@ -1,21 +0,0 @@ -# Antivirus - -Antivirus (or anti-virus) software is a program designed to protect your computer from malicious software, also known as malware. Malware includes viruses, worms, ransomware, spyware, and trojans, among others. The main function of antivirus software is to detect, prevent, and remove malware from your computer or network. - -## Key Features of Antivirus Software - -- **Real-time scanning**: Antivirus programs continuously monitor your computer for potential threats, enabling them to identify and neutralize malware before it can cause harm. - -- **Malware detection**: Antivirus software uses a combination of signature-based detection and behavioral analysis to identify known and unknown malware. Signature-based detection relies on a database of known virus signatures while behavioral analysis examines how the software behaves on your system. - -- **Automatic updates**: Since new malware is created daily, antivirus software must be frequently updated to stay effective. Most antivirus software can automatically update their virus definitions (database of known malware signatures) and software modules to maintain maximum protection. - -- **Quarantine and removal**: Upon detecting malware, antivirus software will attempt to either remove the threat entirely or quarantine it to prevent it from causing further damage to your system. - -- **System scans**: It is essential to perform regular system scans to identify and remove any malware that may have bypassed real-time scanning. Most antivirus programs offer quick, full, and custom scanning options. - -- **External device scanning**: Antivirus software can also scan external devices, such as USB drives and CDs, for potential threats before they can infect your computer. - -- **Email protection**: Email is a common vector for malware distribution. Antivirus programs often include email scanning as a feature to detect and prevent email-borne threats. - -By installing and maintaining an up-to-date antivirus program, you can significantly reduce the risk of falling victim to cyber attacks and maintain a secure environment for your computer and personal data. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/101-antimalware.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/101-antimalware.md deleted file mode 100644 index fd1b950ef..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/101-antimalware.md +++ /dev/null @@ -1,33 +0,0 @@ -# Antimalware - -Antimalware, short for anti-malware, is a type of software designed to detect, prevent, and remove malicious software (malware) from a computer system or network. Malware can include various types of threats, such as viruses, worms, Trojans, spyware, adware, and ransomware. Antimalware software plays a critical role in maintaining the security and integrity of your system by detecting and eliminating these threats. - -## How Antimalware Works - -Antimalware software typically uses a combination of methods to identify and remove malware, including: - -- **Signature-based detection**: This method compares files on your system against a database of known malware signatures, which are unique patterns or characteristics of each malware type. If a file matches a known signature, the antimalware software quarantines or deletes it. - -- **Heuristic analysis**: Heuristic analysis is a more advanced technique that looks for suspicious behavior or previously unknown malware. Instead of relying solely on known malware signatures, heuristic analysis uses algorithms to detect new or modified malware based on the characteristics or behavior patterns of known threats. - -- **Real-time protection**: Antimalware software often provides real-time protection by continuously scanning your system and monitoring activities to identify and stop malicious activities as they occur. - -- **File quarantine and removal**: If a potential threat is detected, the antimalware software quarantines the file, preventing it from causing further damage to your system. You can then decide whether to delete the file or restore it if it's a false positive. - -- **Regular updates**: As new malware types and variants are discovered constantly, it's crucial for antimalware software to receive regular updates to its signature database and heuristic algorithms. This ensures the software can effectively protect your system against emerging threats. - -## Choosing Antimalware Software - -When selecting an antimalware solution, consider the following factors: - -- **Compatibility**: Make sure the software is compatible with your operating system and other security tools you may be using. - -- **Performance**: Ensure the software has a minimal impact on your system's performance and does not slow down your computer significantly. - -- **Usability**: Choose a solution that's easy to install, configure, and use. User-friendly software is especially important for users who are not tech-savvy. - -- **Effectiveness**: Look for an antimalware tool that has a high detection rate and a low false positive rate, as well as comprehensive real-time protection capabilities. - -- **Reputation**: Choose an antimalware product from a reputable vendor with a proven track record of successful malware detection and removal. - -In conclusion, antimalware is a crucial component of a well-rounded cybersecurity strategy. Investing in a comprehensive antimalware solution can help protect your computer systems, data, and personal information from a wide range of threats. Regularly update your antimalware software and maintain good cyber hygiene practices to minimize your risk of malware infections. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/102-edr.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/102-edr.md deleted file mode 100644 index 077104538..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/102-edr.md +++ /dev/null @@ -1,17 +0,0 @@ -# EDR - -**Endpoint Detection and Response (EDR)** is a cybersecurity technology that helps organizations to continuously monitor, detect, investigate, and remediate potential threats on endpoint devices. These devices include computers, laptops, smartphones, and other IoT devices that are connected to a network. - -EDR is particularly important in modern security strategies, as it allows security teams to gain visibility and control over a wide range of endpoints and their activities. Traditional antivirus software and firewalls may not provide sufficient protection against advanced cyber threats, making EDR a necessary addition for organizations to proactively combat cyber attacks. - -Here are the main components of EDR: - -- **Monitoring**: EDR solutions continuously monitor endpoint devices and collect vast amounts of data associated with user, file, network, and process activities. This data helps to track potential threats and their effects on devices in real-time. - -- **Detection**: EDR uses advanced analytics and machine learning to identify suspicious or malicious activities, which might indicate a breach, malware infection, or a targeted attack. It helps security teams detect threats that may have evaded prevention mechanisms, like antivirus software. - -- **Investigation**: EDR provides the necessary tools for security teams to quickly investigate incidents, identify the root cause, and the scope of the attack. It also collects evidence to understand the attacker's methods, motives, and objectives. - -- **Remediation**: After identifying a security incident, EDR solutions allow security teams to take prompt remedial actions, such as isolating affected devices, rolling back malicious changes, or blocking related network connections. - -In summary, EDR is a crucial cybersecurity technology that helps organizations protect their network and devices from advanced cyber threats by providing continuous monitoring, prompt detection, thorough investigation, and effective remediation capabilities. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/103-dlp.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/103-dlp.md deleted file mode 100644 index a55ecae5f..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/103-dlp.md +++ /dev/null @@ -1,35 +0,0 @@ -# DLP - -**Data Loss Prevention** (DLP) is a set of tools, strategies, and best practices aimed at preventing unauthorized access, use, or transfer of sensitive and confidential information. Organizations use DLP to protect their data and comply with legal and industry regulations, such as GDPR, HIPAA, and PCI-DSS. - -DLP solutions monitor and control the flow of data both within the organization's network and in transit over the internet. They help to identify potential breaches and unauthorized actions, allowing security teams to react and prevent data loss. - -## Key Components of DLP - -- **Data Identification**: DLP solutions must first identify which data is sensitive and needs to be protected. This can include personally identifiable information (PII), financial information, intellectual property, or other data critical to the organization. - -- **Data Monitoring**: The DLP system tracks and analyzes users' interactions with sensitive data. This includes data access, modification, copying, and sharing both internally and externally. - -- **Policy Enforcement**: DLP solutions apply pre-defined security policies to protect sensitive data. These policies can include access control, encryption, data masking, and data classification. - -- **Incident Response**: In case of a potential data breach or security incident, the DLP system should generate alerts and provide forensic evidence for the security teams to investigate and remediate the issue. - -- **Reporting and Audit**: DLP solutions produce reports and audit logs to demonstrate compliance with applicable regulations, measure the effectiveness of the DLP program, and make informed decisions for improvement. - -## Implementing DLP - -Effective Data Loss Prevention requires a combination of technology, policies, and user education. Some steps to consider when implementing DLP include: - -- **Set objectives**: Define what types of data are critical to your organization and establish the goals of your DLP program. - -- **Create policies**: Develop appropriate policies for handling sensitive data, such as defining who has access, where the data can be stored, and how it can be shared. - -- **Choose the right solution**: Evaluate and select the most suitable DLP tools for your organization, taking factors like scalability, ease of use, and integration capabilities into account. - -- **Implement and enforce**: Deploy the selected DLP tools and apply the defined policies across the organization, ensuring that users adhere to the security measures in place. - -- **Educate and train**: Educate employees about the importance of DLP and provide training on the policies and tools implemented, enabling users to understand their roles and responsibilities in protecting sensitive data. - -- **Monitor and adapt**: Regularly analyze the effectiveness of your DLP solution and make adjustments as needed to address new threats, regulatory changes, or shifting business requirements. - -By implementing a comprehensive Data Loss Prevention strategy, organizations can proactively protect their sensitive data and reduce the risk of data breaches, regulatory fines, and damage to their reputation. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/104-firewall-nextgen-firewall.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/104-firewall-nextgen-firewall.md deleted file mode 100644 index a676c85c0..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/104-firewall-nextgen-firewall.md +++ /dev/null @@ -1,19 +0,0 @@ -# Firewall and Nextgen Firewall - -A **Next-Generation Firewall (NGFW)** is an advanced type of firewall that goes beyond traditional network security by providing more in-depth inspection, visibility, and control over network traffic. It is designed to defend against modern-day threats and sophisticated attacks. - -## Key features of Next-Generation Firewalls: - -- **Application awareness:** NGFWs can identify and control applications running on a network, regardless of the port or protocol used. This provides more granular control over network traffic and enhances security. - -- **Integrated Intrusion Prevention System (IPS):** Next-gen firewalls come with built-in IPS capabilities, which helps in detecting and blocking potential threats and vulnerabilities in real-time. - -- **User identity awareness:** NGFWs can track and enforce security policies based on user identities (rather than just IP addresses), providing better visibility and control over user activities. - -- **Advanced threat protection:** Next-gen firewalls often include features like sandboxing and threat intelligence to detect and block advanced threats such as zero-day attacks, ransomware, and targeted attacks. - -- **SSL/TLS inspection:** NGFWs can decrypt and inspect SSL/TLS encrypted traffic, enabling the detection of threats hidden within encrypted communications. - -- **Centralized management and reporting:** These firewalls offer a centralized management console to easily manage security policies and monitor network activities. - -By combining these advanced protection features, Next-Generation Firewalls provide enhanced visibility and control, enabling organizations to effectively secure their networks in today's complex and ever-evolving cyber-threat landscape. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/105-hips.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/105-hips.md deleted file mode 100644 index 2e4540bef..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/105-hips.md +++ /dev/null @@ -1,17 +0,0 @@ -# HIPS - -HIPS, or Host-based Intrusion Prevention System, is a security software designed to protect individual devices or hosts by monitoring and analyzing system behavior in real time. Its primary goal is to detect and block suspicious activities, malicious attacks, and unauthorized access attempts. - -Unlike network-based intrusion prevention systems (NIPS), which focus on protecting the entire network, HIPS focuses on a specific device, providing a supplementary layer of security. It operates at the host level, working together with traditional antivirus and firewall solutions. - -Key features of HIPS include: - -- **Behavioral Analysis**: HIPS monitors system activities, such as network connections, file modifications, and registry changes, to identify unusual or malicious behavior patterns. - -- **Signature-based Detection**: Similar to antivirus software, HIPS uses a database of known attack signatures to detect and prevent known threats. - -- **System Hardening**: By enforcing security policies and configurations, HIPS helps prevent unauthorized access attempts and reduce system vulnerabilities. - -- **Zero-day Protection**: HIPS can identify and block previously unknown threats, providing protection against new malware and vulnerabilities that traditional signature-based solutions might miss. - -In summary, a Host-based Intrusion Prevention System (HIPS) effectively safeguards individual devices by detecting and preventing suspicious activities and known threats. By implementing HIPS alongside other cybersecurity measures, organizations can enhance their overall security posture and keep their systems protected from various cyber threats. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/106-nids.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/106-nids.md deleted file mode 100644 index 9b1d6f4df..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/106-nids.md +++ /dev/null @@ -1,23 +0,0 @@ -# NIDS - -A Network Intrusion Detection System (NIDS) is a security solution that monitors network traffic for any suspicious activity, malicious threats, or policy violations. This system primarily focuses on detecting attacks from both external and internal sources. NIDS plays a critical role in protecting valuable information assets and maintaining overall network security. - -Here are some key features of NIDS: - -## Passive Monitoring - -NIDS observes network traffic passively, without interfering or causing any performance impact. By silently monitoring network activity, NIDS detects suspicious activities in real-time without disrupting regular network operations. - -## Traffic Analysis - -NIDS inspects network packets and observes their content and behavior. Network traffic patterns are analyzed against predefined rules or signatures of known threats, which helps determine if a network intrusion is taking place. - -## Threat and Policy Violations Identification - -NIDS identifies possible attacks or intrusions by comparing network activity against known threat signatures or user-defined policies. When activities match a specific pattern or when policy violations occur, the system generates an alert, logs the incident, and may take appropriate action to mitigate the threat. - -## Alert and Response - -In the event of a detected threat or policy violation, NIDS produces alerts and reports to provide administrators with crucial information about the event. Depending on the configuration, the system may also respond by blocking the suspicious traffic, isolating the affected device, or taking other pre-defined actions. - -Implementing NIDS as a part of your cyber security strategy is an essential step for ensuring the ongoing integrity and confidentiality of your network environment. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/107-nips.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/107-nips.md deleted file mode 100644 index fc711fa68..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/107-nips.md +++ /dev/null @@ -1,17 +0,0 @@ -# NIPS - -A **Network Intrusion Prevention System (NIPS)** is a security mechanism designed to monitor and protect your network from malicious activities, such as cyberattacks, unauthorized access, and security vulnerabilities. NIPS are essential components of a robust cybersecurity strategy to ensure that your network remains secure and reliable. - -Key features of NIPS include: - -- **Traffic monitoring:** NIPS constantly analyze the traffic flowing through your network, enabling it to detect any unusual activity or patterns that may indicate a potential cyberattack or intrusion attempt. - -- **Threat detection:** By using various techniques, such as signature-based detection, anomaly-based detection, and behavior-based detection, NIPS can identify known and unknown threats and alert you to their presence in your network. - -- **Prevention and blocking:** Upon identifying a threat, NIPS can promptly take action to stop it from causing damage or compromising your network's integrity. This could include blocking malicious traffic, terminating connections, or even re-configuring your network to prevent further intrusion attempts. - -- **Reporting and alerts:** NIPS provide you with detailed reports and real-time alerts about any detected threats, enabling your security team to take appropriate action and mitigate potential risks. - -Using NIPS as part of your cybersecurity strategy can help you maintain the security and stability of your network, while also providing you with valuable insights into potential threats and vulnerabilities. By implementing a Network Intrusion Prevention System, you can stay one step ahead of cybercriminals and safeguard your company's valuable assets. - -Read on to understand other crucial cybersecurity terms and strengthen your security knowledge. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/108-host-based-firewall.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/108-host-based-firewall.md deleted file mode 100644 index 8ac4e6d6c..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/108-host-based-firewall.md +++ /dev/null @@ -1,17 +0,0 @@ -# Host Based Firewall - -A _host-based firewall_ is a software application or suite of applications that manage and control the flow of network traffic on an individual computer or host. Unlike a network firewall, which typically provides protection for multiple devices connected to a network, a host-based firewall focuses on securing and protecting only the device on which it is installed. - -**Key Features of a Host-Based Firewall:** - -- **Control Incoming and Outgoing Traffic:** Host-based firewalls can be configured to allow or deny specific types of network traffic both to and from the device. This includes blocking or allowing access to certain ports, IP addresses, or protocols. - -- **Rule-Based Management:** Users can create and customize rules for how a host-based firewall should handle network traffic. These rules can be based on various factors, such as the origin or destination of the traffic, the protocol being used, or the specific application generating or receiving the traffic. - -- **Application-Level Protection:** Some host-based firewalls offer application-level protection, where the firewall is capable of inspecting, filtering, and blocking traffic at the application layer. This feature provides more fine-grained control over network traffic and can help protect against application-specific vulnerabilities and attacks. - -- **Intrusion Detection and Prevention:** Many host-based firewalls include intrusion detection and prevention systems (IDS/IPS) that can detect and block known malicious traffic patterns or behavior, adding an extra layer of security against network-based threats. - -- **Ease of Deployment and Management:** Host-based firewalls can be easily installed and managed on individual devices, making them well-suited for scenarios where installing a network-based firewall might not be feasible or cost-effective. - -Using a host-based firewall can help strengthen a device's security posture by providing an additional layer of protection against network threats. However, it is important to remember that a host-based firewall should be just one element of a comprehensive cybersecurity strategy, which also includes updating software and operating systems, strong passwords, and regular backing up of data. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/109-sandboxing.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/109-sandboxing.md deleted file mode 100644 index 4df0e0072..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/109-sandboxing.md +++ /dev/null @@ -1,14 +0,0 @@ -# Sandboxing - -Sandboxing is a security technique used to isolate an application from the rest of the system to prevent potential security violations. In simple terms, a sandbox is like a closed environment where the program, or a part of the code, can be executed without affecting the rest of the system. - -The main purpose behind sandboxing is to protect the system, particularly from potentially malicious or untrusted applications. This way, a sandboxed application has restricted access to system resources, and its actions are closely monitored and limited to its designated environment. - -Some benefits of sandboxing include: - -- **Reduced risk of attacks:** By isolating potentially dangerous applications, sandboxing reduces the risks of malicious attacks or unintentional security breaches. -- **Error containment:** Sandboxing helps ensure that any errors or bugs in a program do not spread to other parts of the system. -- **Testing and analysis:** Sandboxed environments can be used to safely test new applications or analyze potentially malicious software without risking the integrity of the overall system. -- **Resource management:** Sandboxing can help manage the resources that an application can consume, preventing it from monopolizing system resources and negatively affecting the performance of other applications. - -It's important to note that while sandboxing is an essential tool in strengthening cybersecurity, it is not foolproof. Skilled attackers may still find ways to escape a sandboxed environment and cause harm to the system. However, using sandboxing techniques as part of a comprehensive security strategy provides a valuable layer of protection for your system. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/110-acl.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/110-acl.md deleted file mode 100644 index cbcc4c390..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/110-acl.md +++ /dev/null @@ -1,23 +0,0 @@ -# ACL - -An Access Control List (ACL) is a security feature used in computer systems, networks, and applications to define rules and restrictions for granting or denying access to specific resources. It helps organizations manage user access rights, ensuring that only authorized users can access sensitive information and resources. - -ACLs consist of entries that specify the permissions each user or group of users have for a particular resource. These permissions can include read, write, execute, and delete access. - -## Key Components of an ACL - -- **Resource:** The object or system that you want to protect, such as files, folders, applications, or network devices. - -- **User or Group:** The user account or group of users that need access to the protected resource. - -- **Permission:** A set of actions (e.g., read, write, execute) the user or group is allowed to perform on the resource. - -## Why ACLs are Important for Cyber Security: - -- **Access control:** ACLs are a fundamental tool for implementing access controls, making it an essential component of an organization's overall security strategy. - -- **Auditing and compliance:** ACLs help organizations ensure compliance with various regulations and industry standards by providing detailed information regarding user access to critical and sensitive resources. - -- **Reduced risk of unauthorized access:** Implementing ACLs minimizes the risk of unauthorized users accessing an organization's confidential information, as well as prevents unauthorized changes that can lead to data breaches or loss. - -In summary, Access Control Lists play a vital role in maintaining an organization's cyber security posture by controlling access to resources and ensuring that only authorized users can perform specific actions on those resources. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/111-eap-vs-peap.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/111-eap-vs-peap.md deleted file mode 100644 index a877bd63e..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/111-eap-vs-peap.md +++ /dev/null @@ -1,36 +0,0 @@ -# EAP vs PEAP - -## Extensible Authentication Protocol (EAP) - -EAP is an authentication framework that provides different authentication methods for various networks. It supports multiple authentication types, allowing organizations to choose the most suitable one to secure their network. EAP operates in the link layer of the OSI model and is commonly used in wireless networks and remote access connections. - -_Pros:_ - -- Highly flexible, supports multiple authentication methods -- Can be easily updated to use new authentication methods - -_Cons:_ - -- Not an authentication mechanism itself, but a framework -- Requires the use of an additional authentication server - -## Protected Extensible Authentication Protocol (PEAP) - -PEAP is a popular EAP method designed to provide secure communication within an organization's network. It creates a secure tunnel between the client and the authentication server using Transport Layer Security (TLS), which encapsulates other EAP methods within that tunnel. This process adds an extra layer of security by protecting the authentication process from eavesdropping or man-in-the-middle attacks. - -_Pros:_ - -- Encrypts authentication data, preventing unauthorized access -- Works alongside other EAP methods -- Simplifies the deployment of client certificates - -_Cons:_ - -- Requires the use of a Public Key Infrastructure (PKI) -- May not be supported by all devices and network configurations - -In summary: - -- EAP is a flexible authentication framework that supports various authentication methods, while PEAP is an EAP method that adds a layer of security by utilizing TLS. -- EAP provides an adaptable solution for organizations looking for diverse authentication options, whereas PEAP focuses on enhancing security by encrypting the authentication process. -- Choosing between EAP and PEAP will depend on your organization's security requirements, network infrastructure, and compatibility with devices or systems. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/112-wpa-vs-wpa2-vs-wpa3-vs-wep.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/112-wpa-vs-wpa2-vs-wpa3-vs-wep.md deleted file mode 100644 index 9cd44ed89..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/112-wpa-vs-wpa2-vs-wpa3-vs-wep.md +++ /dev/null @@ -1,26 +0,0 @@ -# WPA vs WPA2 vs WPA3 vs WEP - -In this section, we will discuss the differences between various wireless security protocols: WPA, WPA2, WPA3, and WEP. - -## WEP (Wired Equivalent Privacy) - -WEP was the first wireless security protocol, introduced in 1999, with the goal of providing a level of privacy and security similar to that of wired networks. However, WEP has major security flaws and can be easily compromised. It uses a weak encryption algorithm (RC4) and static encryption keys that can be easily cracked with readily available tools. - -## WPA (Wi-Fi Protected Access) - -WPA was introduced in 2003 as a temporary solution to address the security shortcomings of WEP. It improved security by implementing Temporal Key Integrity Protocol (TKIP) for encryption and using dynamic encryption keys that change with each data packet transmitted. WPA also incorporated a pre-shared key (PSK) authentication method. However, WPA still uses the RC4 encryption algorithm, which has known vulnerabilities. - -## WPA2 (Wi-Fi Protected Access 2) - -WPA2, released in 2004, is an upgraded version of WPA and is now the most widely used wireless security standard. It replaced the RC4 encryption algorithm with the much more secure Advanced Encryption Standard (AES). WPA2 offers two authentication methods: WPA2-Personal (using a pre-shared key (PSK)) and WPA2-Enterprise (using the 802.1X authentication framework). WPA2 provides a significant improvement in security over WPA, but it is still vulnerable to certain attacks, such as the KRACK attack. - -## WPA3 (Wi-Fi Protected Access 3) - -WPA3 is the latest and most secure wireless security protocol, launched in 2018. It offers several major improvements over WPA2, including: - -- Simultaneous Authentication of Equals (SAE): A more secure password-based authentication method that protects against dictionary and brute-force attacks. -- 192-bit security suite: An enhanced level of encryption for enterprise and government networks requiring higher security levels. -- Enhanced Open: Improved security for open Wi-Fi networks by encrypting data transmission without requiring a shared password. -- Easy Connect: Streamlined configuration for IoT devices with limited or no display interface. - -In summary, WPA3 addresses many of the security vulnerabilities found in WPA2 and provides a higher level of security for wireless networks. However, as it is relatively new, not all devices currently support WPA3. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/113-wps.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/113-wps.md deleted file mode 100644 index 93c69fb6a..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/113-wps.md +++ /dev/null @@ -1,13 +0,0 @@ -# WPS - -Wi-Fi Protected Setup (WPS) is a feature available in many Wi-Fi routers and access points that is designed to simplify the process of connecting devices to a wireless network. With WPS, users can easily connect to a secure Wi-Fi network without the need for manually entering the network's password. - -There are multiple methods for using WPS, some of which include: - -- **Push-button method**: This is the most common method of using WPS. The user simply pushes the WPS button on the router, and then on the device they want to connect within a certain time period. This automatically establishes a secure connection between the device and the router. -- **PIN method**: In this method, a unique Personal Identification Number (PIN) is generated by the router or access point, which the user must then enter on the device they wish to connect. -- **NFC method**: Some devices come with near-field communication (NFC) capabilities, allowing users to establish a secure connection by simply tapping their device against the router or access point. - -Though WPS can provide ease of use and quick connectivity, it has some security concerns. The main concern arises from the PIN method, as the 8-digit PINs are susceptible to brute force attacks. This vulnerability can allow an attacker to gain unauthorized access to a network. As a result, many cyber security experts recommend disabling WPS or using the push-button method only. - -In conclusion, while WPS can make connecting devices to a wireless network more convenient, its associated security risks make it essential for users to be aware of best practices to protect their networks. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/index.md deleted file mode 100644 index 506d15aa8..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/index.md +++ /dev/null @@ -1 +0,0 @@ -# Understand the following terms diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/100-siem.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/100-siem.md deleted file mode 100644 index 945ac086c..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/100-siem.md +++ /dev/null @@ -1,20 +0,0 @@ -# SIEM - -Security Information and Event Management (SIEM) is a system that consolidates, analyzes, and presents data from various network and security solutions to provide real-time monitoring, threat detection, and incident response. SIEM solutions enable users to detect, mitigate, and prevent security breaches, ensuring the organization's cyber security posture remains robust. - -## Key Components of SIEM - -- **Log Data Collection:** SIEM systems gather log data from various network devices, security appliances, software applications, and operating systems. -- **Log and Event Analysis:** SIEM solutions analyze collected logs and events to identify correlational patterns, issues, or incidents that might indicate an attack or other security threats. -- **Real-time Alerts:** Upon detection of unusual activities or threats, SIEM provides real-time alerts to security analysts, allowing them to respond effectively. -- **Threat Intelligence Integration:** SIEM systems can integrate with external threat intelligence services to enrich their analysis and better detect potential threats. -- **Forensic Investigations:** SIEM platforms enable security analysts to conduct in-depth investigations and root cause analysis for security incidents by providing historical log data, context, and visualization capabilities. - -## Importance of SIEM - -- **Improve Security Incident Detection:** SIEM helps organizations to identify potential security threats quickly by correlating events from various sources, reducing the likelihood of successful breaches. -- **Streamline Incident Response:** Utilizing real-time alerts, SIEM systems enable security teams to rapidly contain and mitigate threats, minimizing the impact of incidents. -- **Meet Compliance Requirements:** Many industries require organizations to meet specific security compliance standards, such as GDPR, HIPAA, or PCI DSS. SIEM allows companies to demonstrate that they're taking necessary precautions by monitoring and logging security events. -- **Increase Efficiency:** SIEM systems centralize security data from numerous sources, providing a single pane of glass for accurate and actionable insight. Consequently, security teams can work more efficiently and respond faster to potential issues. - -Overall, SIEM is a crucial component of an organization's cyber security strategy, helping to detect, mitigate, and prevent security breaches more effectively. Implementing SIEM solutions can ensure a more robust security posture and contribute to meeting regulatory compliance requirements. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/102-soar.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/102-soar.md deleted file mode 100644 index 69776ec8a..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/102-soar.md +++ /dev/null @@ -1,27 +0,0 @@ -# SOAR - -SOAR, or Security Orchestration, Automation, and Response, is a modern cyber security solution that empowers organizations to collect and analyze various security data and alerts from multiple sources. With its three core functions, SOAR streamlines security operations, improves incident detection, and enhances the ability to resolve cyber threats efficiently. - -## Security Orchestration - -Security Orchestration involves the integration and synchronization of various security tools and systems within the organization's environment. It aims to improve collaboration between different tools, departments, and teams while reducing manual intervention in the process. By orchestrating workflows and processes, organizations can quickly detect, investigate, and mitigate security incidents with minimal human involvement. - -## Automation - -Automation is the process of using software and other technology to carry out repetitive and mundane tasks without the need for human intervention. In the context of SOAR, automation applies to security processes such as virtual machine provisioning, alert monitoring, threat hunting, and reporting. Automation can significantly reduce the time taken to respond to threats and improve the overall efficiency of security teams. - -## Response - -Response, the third component of SOAR, focuses on managing and resolving security incidents. Here, different incident response steps are devised and executed, including containment, elimination, recovery, and adaptation. By implementing a structured response process based on security playbooks, organizations can quickly contain and eliminate threats and restore affected systems. - -## Benefits of SOAR - -Implementing a SOAR solution in your cybersecurity strategy offers numerous benefits: - -- Faster incident response: With automation and orchestration, security incidents can be quickly detected and contained, reducing the overall damage caused by threats. -- Improved efficiency: By automating repetitive tasks, security teams can focus on more critical responsibilities, leading to better resource allocation and utilization. -- Enhanced threat intelligence: SOAR solutions help aggregate and analyze data from various sources, enabling better threat intelligence and more accurate decision-making. -- Streamlined communication: A SOAR platform fosters collaboration between various teams, improving coordination and reducing response time during a security incident. -- Customizable playbooks: SOAR solutions allow organizations to develop customized playbooks tailored to their specific needs and environment, enabling more effective threat mitigation. - -In conclusion, understanding and implementing SOAR solutions in your organization can greatly improve your cybersecurity posture by streamlining security operations, automating tasks, and providing a structured approach to incident response. diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/index.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/index.md deleted file mode 100644 index e46851f83..000000000 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand/index.md +++ /dev/null @@ -1 +0,0 @@ -# Understand diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/105-concept-of-cdn.md b/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/105-concept-of-cdn.md deleted file mode 100644 index 4bc1628c7..000000000 --- a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/105-concept-of-cdn.md +++ /dev/null @@ -1,23 +0,0 @@ -# Understand the concept of CDN - -A **Content Delivery Network (CDN)** is a distributed network of servers strategically located across the globe. The primary purpose of a CDN is to increase the speed, scalability, and reliability of content delivery to users by serving the content from a server that is geographically closer to the user. CDNs are essential for websites and applications with a global user base and for those that require faster and more stable delivery of content. - -## How CDN Works - -- **Caching Content:** When a user requests a file (e.g., web page, image, or video) hosted on a CDN-enabled website, the CDN retrieves a copy of the content from the origin server and stores it in a cache on its edge servers. This cached content can then be served to multiple users, reducing the load on the origin server. - -- **Edge Server Selection:** Once the content is cached, the CDN intelligently directs user requests to the nearest edge server, based on factors such as geographical location and server health. This shortens the distance between the user and the server, reducing latency and improving access times. - -- **Load Distribution:** CDNs distribute the load of serving content among multiple edge servers, preventing any single server from becoming a bottleneck. This ensures a consistent and optimal user experience, regardless of sudden spikes in traffic or other unexpected events. - -## Benefits of Using a CDN - -- **Faster Content Delivery:** By serving content from edge servers closer to users, CDNs reduce the time it takes for data to travel between the server and the user's device, resulting in faster content delivery and reduced latency. - -- **Improved Availability and Reliability:** CDNs can intelligently route traffic around network congestion, hardware failures, or other issues, ensuring that content is always available. - -- **Scalability:** CDNs can handle sudden spikes in traffic by distributing the load among multiple edge servers, preventing any single server from becoming overwhelmed. - -- **Security Enhancements:** CDNs often include features such as DDoS protection, web application firewalls (WAF), and SSL/TLS certificate management, helping to improve the overall security of your online assets. - -In conclusion, the concept of CDN is crucial to understanding modern cybersecurity practices as it advances the speed, reliability, and security of the content delivery process, ensuring a better user experience and minimizing the risk of cyber threats. diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/106-cloud-services/index.md b/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/106-cloud-services/index.md deleted file mode 100644 index 929f32792..000000000 --- a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/106-cloud-services/index.md +++ /dev/null @@ -1,37 +0,0 @@ -# Understand Cloud Services - -Cloud services are a collection of IT resources and capabilities that are delivered via the internet to users and organizations. These services enable users to access, store, process, and manage data and applications remotely, without worrying about purchasing, maintaining, and hosting physical infrastructure. - -Cloud services can be divided into three main categories: - -- **Infrastructure as a Service (IaaS):** In this model, users have access to virtualized computing resources such as storage, networking, and virtual machines. This allows users to scale up or down as needed, only paying for the resources they use. Some notable IaaS providers include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). - -- **Platform as a Service (PaaS):** PaaS offers users an environment to develop, test, and deploy applications without worrying about infrastructure management. PaaS includes tools and services for application development, such as middleware, database management systems, and development frameworks. Examples of PaaS providers are Heroku, OpenShift, and Google App Engine. - -- **Software as a Service (SaaS):** SaaS provides users with a fully functional, ready-to-use application that runs on the cloud. In this model, the software and associated data are centrally hosted, managed by the provider, and accessed by users via a web browser. Popular SaaS offerings include Microsoft Office 365, Salesforce, and Google Workspace. - -## Benefits of Cloud Services - -- **Cost-effectiveness:** Cloud services eliminate the need for upfront investments in hardware, software, and maintenance. Users pay for what they use, and costs can be scaled up or down based on demand. - -- **Scalability and flexibility:** With cloud services, users have access to a virtually unlimited amount of resources. This enables organizations to quickly scale their infrastructure to support growth or handle changing demands. - -- **Accessibility and collaboration:** Cloud services enable users to access data and applications from anywhere, facilitating remote work and collaboration among team members. - -- **Reliability and redundancy:** Cloud providers offer high levels of redundancy, ensuring that data is backed up and can be recovered in the event of a disaster or failure. - -## Security Considerations - -While cloud services offer numerous benefits, they also present unique security challenges. It is crucial to understand the shared responsibility model, where the cloud provider is responsible for securing the infrastructure, and users must secure their data and applications. - -Some key areas to consider when evaluating the security of cloud services: - -- **Data privacy and protection:** Ensure the cloud provider has adequate security measures in place to protect sensitive data from unauthorized access. - -- **Access management:** Implement strong authentication and access control mechanisms to restrict access to cloud resources. - -- **Encryption:** Use encryption to protect data both in transit and at rest. - -- **Monitoring and alerts:** Continuously monitor for security incidents and set up alerts to identify potential issues. - -- **Compliance:** Ensure the cloud provider meets the necessary regulatory and industry compliance standards for your organization. diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/107-cloud-models/index.md b/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/107-cloud-models/index.md deleted file mode 100644 index 63cb5716b..000000000 --- a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/107-cloud-models/index.md +++ /dev/null @@ -1,49 +0,0 @@ -# Cloud Models - -Cloud computing offers various deployment models and types of services that can be tailored to the specific needs of an organization. Understanding these cloud models is vital for making well-informed decisions about adopting and managing cloud services. In this section, we’ll discuss the three primary cloud deployment models and the service models provided under each. - -## Cloud Deployment Models - -There are three main cloud deployment models: Private, Public, and Hybrid clouds. - -## Private Cloud - -A private cloud consists of computing resources used exclusively by a single organization. These resources could be physically located within the organization's data center, or they could be hosted by a third-party service provider. In any case, the infrastructure is dedicated solely to the organization and is not shared with others. - -Advantages of private clouds include greater control over privacy, security, and data governance. However, they typically require significant upfront investment and ongoing maintenance costs. - -## Public Cloud - -A public cloud is a multi-tenant environment where multiple organizations share computing resources provided by a third-party service provider. The service provider is responsible for maintaining the infrastructure and ensuring it remains secure, up-to-date, and available. - -Public clouds offer several advantages, such as cost-effectiveness, scalability, and reduced IT burden. However, organizations may have limited control over data privacy and may face potential security and compliance concerns. - -## Hybrid Cloud - -A hybrid cloud combines characteristics of both private and public clouds. Organizations can maintain sensitive data and applications in a private cloud while utilizing public cloud resources for less sensitive tasks or when additional resources are needed. - -Hybrid clouds provide improved flexibility and scalability, and they enable organizations to choose the most suitable environment for each workload. However, they may also introduce additional complexities when managing and securing data across multiple environments. - -## Cloud Service Models - -Cloud services can be categorized into three main service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). - -## Infrastructure as a Service (IaaS) - -IaaS provides virtualized computing resources over the internet. This model offers organizations raw computing resources such as virtual machines, storage, and networking. Users can deploy and manage their own applications and operating systems on these resources, but the underlying hardware maintenance is the responsibility of the service provider. - -Examples of IaaS providers include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). - -## Platform as a Service (PaaS) - -PaaS provides a cloud-based environment that allows developers to create, test, and deploy applications without worrying about managing the underlying infrastructure. This model typically includes pre-configured operating systems, runtime environments, databases, and other development tools. - -Examples of PaaS providers include Google App Engine, Microsoft Azure App Service, and AWS Elastic Beanstalk. - -## Software as a Service (SaaS) - -SaaS delivers fully functional applications over the internet. In this model, users access software applications via a web browser, and the service provider is responsible for maintaining the infrastructure, ensuring application availability, and performing software updates. - -Examples of SaaS providers include Salesforce, Microsoft Office 365, and Google Workspace. - -By understanding the different cloud models and their characteristics, you can make informed decisions about which deployment and service models best fit your organization's specific needs, ultimately enhancing your cybersecurity posture. diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/108-common-cloud-environments/index.md b/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/108-common-cloud-environments/index.md deleted file mode 100644 index f0771bbc0..000000000 --- a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/108-common-cloud-environments/index.md +++ /dev/null @@ -1,53 +0,0 @@ -# Common Cloud Environments - -In this section, we will discuss common cloud environments, along with the benefits and challenges of each. Understanding these cloud environments can help you develop a deeper understanding of cloud technologies and be better equipped to protect your organization's digital assets. - -## Public Cloud - -Public cloud providers offer services and resources in a shared environment that is accessible via the internet. Some well-known public cloud providers include Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure. - -**Benefits:** - -- Cost-effective: Pay-as-you-go model, reducing upfront investments and improving resource utilization. -- Scalability: Quickly add or remove resources as needed. -- Flexibility: Access to a wide range of services and technologies. - -**Challenges:** - -- Security: Shared environment may have some inherent security risks. -- Compliance: Data privacy and regulatory compliance may be more difficult. -- Dependency: Vendor lock-in and potential downtime reliance on a single provider. - -## Private Cloud - -A private cloud environment is exclusively used by a single organization and is typically hosted on-premises or by a managed service provider. These environments can be customized to meet an organization's specific requirements. - -**Benefits:** - -- Security: Greater control over the security and privacy of data and resources. -- Customization: Tailoring the environment to the unique needs of the organization. -- Compliance: Easier to maintain compliance with data privacy and industry regulations. - -**Challenges:** - -- Cost: Higher initial investment and ongoing management costs. -- Scalability: Limited compared to public cloud environments. -- Resource management: Requires internal IT resources and expertise to manage, maintain, and update the environment. - -## Hybrid Cloud - -A hybrid cloud environment combines the use of both public and private cloud environments. This model allows organizations to take advantage of the benefits of both worlds while using each environment for specific workloads. - -**Benefits:** - -- Flexibility: Use the best environment for each workload (e.g., public cloud for non-sensitive data, private cloud for sensitive data). -- Scalability: Leverage public cloud resources when needed. -- Cost optimization: Selectively utilize on-premises assets and minimize costs. - -**Challenges:** - -- Complexity: Managing multiple environments and ensuring seamless integration. -- Security: Ensuring proper security controls are implemented and maintained across all environments. -- Compliance: Ensuring data privacy and regulatory compliance in a hybrid environment. - -In conclusion, understanding the different types of cloud environments, their benefits, and challenges will help you navigate the cloud landscape more effectively. While security risks and challenges may differ depending on the environment, having a solid grasp of these concepts will better equip you to make informed decisions to protect your organization's data and assets in the cloud. diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/index.md b/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/index.md deleted file mode 100644 index 151acacc0..000000000 --- a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/index.md +++ /dev/null @@ -1,41 +0,0 @@ -# Common Cloud Storage - -Cloud storage is a service model that provides users with the ability to store, manage, and access their data remotely over the internet. As an essential component of cloud computing, cloud storage has gained significant popularity among individual users, small businesses, and enterprises alike due to its scalable, cost-effective, and efficient nature. The following is a brief summary of common cloud storage solutions. - -## Public Cloud Storage Providers - -Public cloud storage providers offer services to the general public on a subscription basis, with users typically only paying for the amount of storage they need. Here are some well-known public cloud storage providers: - -- **Amazon Web Services (AWS) S3**: AWS S3 (Simple Storage Service) is a widely-used object storage service offering industry-leading scalability, performance, and availability. - -- **Microsoft Azure Blob Storage**: Azure Blob Storage is another popular object storage solution designed for handling unstructured data such as text, images, and videos. - -- **Google Cloud Storage**: This service offers scalable and durable storage, perfect for storing and retrieving any amount of data, with options to choose between object storage and block storage. - -## Private Cloud Storage - -Private cloud storage is a cloud storage solution hosted within an organization's own data center, ensuring greater control over the data and infrastructure. Private cloud storage includes: - -- **VMware vSAN**: VMware vSAN is a software-defined storage solution that uses server-based storage to create a resilient, high-performance datastore for virtual machines. - -- **OpenStack Swift**: Keeping in line with the open-source nature of OpenStack, Swift is a scalable and efficient object storage system capable of storing petabytes of data. - -## Hybrid Cloud Storage - -Hybrid cloud storage combines the best of both public and private clouds, allowing organizations to leverage the scalability and cost-effectiveness of public cloud services while maintaining the security and control of on-premises infrastructure. Examples of hybrid cloud storage solutions include: - -- **NetApp Cloud Volumes ONTAP**: This service offers data management and storage for both on-premises and cloud-based environments. - -- **Dell EMC Cloud Storage Services**: Dell EMC provides a range of cloud storage services that can be tailored to an organization's specific needs, combining on-premises storage with public cloud resources. - -## Cloud Storage Services for Individuals and Small Businesses - -Apart from enterprise-level offerings, cloud storage services are available for individual users and small businesses. Examples include: - -- **Dropbox**: A popular choice for personal and professional use, Dropbox offers easy file synchronization and sharing capabilities. - -- **Google Drive**: Google Drive provides free storage, seamless integration with other Google services and applications, and support for real-time collaboration. - -- **Microsoft OneDrive**: OneDrive offers a simple and secure way to store, access, and share files, along with seamless integration into Microsoft Office applications. - -Understanding and choosing the right cloud storage solution can significantly impact the security, availability, and accessibility of your data in the cloud. To ensure a robust and reliable cybersecurity strategy, it's vital to familiarize yourself with common cloud storage options and identify the best fit for your needs. diff --git a/src/data/roadmaps/cyber-security/content/acl@35oCRzhzpVfitQPL4K9KC.md b/src/data/roadmaps/cyber-security/content/acl@35oCRzhzpVfitQPL4K9KC.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/104-acls.md b/src/data/roadmaps/cyber-security/content/acls@8JM95sonFUhZCdaynUA_M.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/104-acls.md rename to src/data/roadmaps/cyber-security/content/acls@8JM95sonFUhZCdaynUA_M.md diff --git a/src/data/roadmaps/cyber-security/content/antimalware@9QtY1hMJ7NKLFztYK-mHY.md b/src/data/roadmaps/cyber-security/content/antimalware@9QtY1hMJ7NKLFztYK-mHY.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/antivirus@3140n5prZYySsuBHjqGOJ.md b/src/data/roadmaps/cyber-security/content/antivirus@3140n5prZYySsuBHjqGOJ.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/anyrun@GZHFR43UzN0WIIxGKZOdX.md b/src/data/roadmaps/cyber-security/content/anyrun@GZHFR43UzN0WIIxGKZOdX.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/102-apt.md b/src/data/roadmaps/cyber-security/content/apt@l0BvDtwWoRSEjm6O0WDPy.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/102-apt.md rename to src/data/roadmaps/cyber-security/content/apt@l0BvDtwWoRSEjm6O0WDPy.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/102-arp.md b/src/data/roadmaps/cyber-security/content/arp@M52V7hmG4ORf4TIVw3W3J.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/102-arp.md rename to src/data/roadmaps/cyber-security/content/arp@M52V7hmG4ORf4TIVw3W3J.md diff --git a/src/data/roadmaps/cyber-security/content/arp@fzdZF-nzIL69kaA7kwOCn.md b/src/data/roadmaps/cyber-security/content/arp@fzdZF-nzIL69kaA7kwOCn.md new file mode 100644 index 000000000..ed2f0f109 --- /dev/null +++ b/src/data/roadmaps/cyber-security/content/arp@fzdZF-nzIL69kaA7kwOCn.md @@ -0,0 +1,19 @@ +# ARP + +ARP is a protocol used by the Internet Protocol (IP) to map an IP address to a physical address, also known as a Media Access Control (MAC) address. ARP is essential for routing data between devices in a Local Area Network (LAN) as it allows for the translation of IP addresses to specific hardware on the network. + +## How It Works + +When a device wants to communicate with another device on the same LAN, it needs to determine the corresponding MAC address for the target IP address. ARP helps in this process by broadcasting an ARP request containing the target IP address. All devices within the broadcast domain receive this ARP request and compare the target IP address with their own IP address. If a match is found, the device with the matching IP address sends an ARP reply which contains its MAC address. + +The device that initiated the ARP request can now update its ARP cache (a table that stores IP-to-MAC mappings) with the new information, and then proceed to send data to the target's MAC address. + +## Security Concerns + +While ARP is crucial for the functioning of most networks, it also presents certain security risks. ARP poisoning, for example, occurs when an attacker sends fake ARP messages with the goal to associate their MAC address with the IP address of a target device. This can lead to Man-in-the-Middle (MITM) attacks where the attacker can intercept, modify, or block traffic intended for the target device. + +To mitigate ARP poisoning attacks, organizations can implement security measures such as static ARP entries, dynamic ARP inspection, and ensuring that their network devices are updated with the latest security patches. + +By understanding ARP and the potential security risks it presents, you can help protect your network by incorporating appropriate security solutions and staying vigilant against potential threats. + +- [@video@ARP Explained - Address Resolution Protocol](https://www.youtube.com/watch?v=cn8Zxh9bPio) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/108-arp.md b/src/data/roadmaps/cyber-security/content/arp@hkO3Ga6KctKODr4gos6qX.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/108-arp.md rename to src/data/roadmaps/cyber-security/content/arp@hkO3Ga6KctKODr4gos6qX.md diff --git a/src/data/roadmaps/cyber-security/content/attck@auR7fNyd77W2UA-PjXeJS.md b/src/data/roadmaps/cyber-security/content/attck@auR7fNyd77W2UA-PjXeJS.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md b/src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md new file mode 100644 index 000000000..a9ac9b7a8 --- /dev/null +++ b/src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md @@ -0,0 +1,12 @@ +## Authentication vs Authorization + +**Authentication** is the process of validating the identity of a user, device, or system. It confirms that the entity attempting to access the resource is who or what they claim to be. The most common form of authentication is the use of usernames and passwords. Other methods include: + +**Authorization** comes into play after the authentication process is complete. It involves granting or denying access to a resource, based on the authenticated user's privileges. Authorization determines what actions the authenticated user or entity is allowed to perform within a system or application. + +- [@article@Two-factor authentication (2FA)](https://authy.com/what-is-2fa/) +- [@article@Biometrics (fingerprint, facial recognition, etc.)](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5428991/) +- [@article@Security tokens or certificates](https://www.comodo.com/e-commerce/ssl-certificates/certificate.php) +- [@article@Role-based access control (RBAC)](https://en.wikipedia.org/wiki/Role-based_access_control) +- [@article@Access Control Lists (ACLs)](https://en.wikipedia.org/wiki/Access-control_list) +- [@article@Attribute-based access control (ABAC)](https://en.wikipedia.org/wiki/Attribute-based_access_control) diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/118-autopsy.md b/src/data/roadmaps/cyber-security/content/autopsy@bIwpjIoxSUZloxDuQNpMu.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/118-autopsy.md rename to src/data/roadmaps/cyber-security/content/autopsy@bIwpjIoxSUZloxDuQNpMu.md index 880d0bdfa..193e9ad1a 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/118-autopsy.md +++ b/src/data/roadmaps/cyber-security/content/autopsy@bIwpjIoxSUZloxDuQNpMu.md @@ -33,4 +33,4 @@ As Autopsy completes its analysis, it will generate a comprehensive report that ## Conclusion -In conclusion, Autopsy is a valuable tool for incident response and digital forensics professionals. By mastering its functions and capabilities, you can enhance your capabilities in incident investigations, data recovery, and threat attribution. +In conclusion, Autopsy is a valuable tool for incident response and digital forensics professionals. By mastering its functions and capabilities, you can enhance your capabilities in incident investigations, data recovery, and threat attribution. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/108-common-cloud-environments/100-aws.md b/src/data/roadmaps/cyber-security/content/aws@0LztOTc3NG3OujCVwlcVU.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/108-common-cloud-environments/100-aws.md rename to src/data/roadmaps/cyber-security/content/aws@0LztOTc3NG3OujCVwlcVU.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/108-common-cloud-environments/102-azure.md b/src/data/roadmaps/cyber-security/content/azure@GklBi7Qx1akN_cS9UMrha.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/108-common-cloud-environments/102-azure.md rename to src/data/roadmaps/cyber-security/content/azure@GklBi7Qx1akN_cS9UMrha.md diff --git a/src/data/roadmaps/cyber-security/content/105-programming-knowledge/104-bash.md b/src/data/roadmaps/cyber-security/content/bash@tao0Bb_JR0Ubl62HO8plp.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/105-programming-knowledge/104-bash.md rename to src/data/roadmaps/cyber-security/content/bash@tao0Bb_JR0Ubl62HO8plp.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/123-threat-hunting.md b/src/data/roadmaps/cyber-security/content/basics-and-concepts-of-threat-hunting@_x3BgX93N-Pt1_JK7wk0p.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/123-threat-hunting.md rename to src/data/roadmaps/cyber-security/content/basics-and-concepts-of-threat-hunting@_x3BgX93N-Pt1_JK7wk0p.md diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/104-basics-of-computer-networking.md b/src/data/roadmaps/cyber-security/content/basics-of-computer-networking@T0aU8ZQGShmF9uXhWY4sD.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/104-basics-of-computer-networking.md rename to src/data/roadmaps/cyber-security/content/basics-of-computer-networking@T0aU8ZQGShmF9uXhWY4sD.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/109-basics-of-ids-ips.md b/src/data/roadmaps/cyber-security/content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/109-basics-of-ids-ips.md rename to src/data/roadmaps/cyber-security/content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/104-basics-of-nas-and-san.md b/src/data/roadmaps/cyber-security/content/basics-of-nas-and-san@umbMBQ0yYmB5PgWfY6zfO.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/104-basics-of-nas-and-san.md rename to src/data/roadmaps/cyber-security/content/basics-of-nas-and-san@umbMBQ0yYmB5PgWfY6zfO.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/121-basics-of-reverse-engineering.md b/src/data/roadmaps/cyber-security/content/basics-of-reverse-engineering@uoGA4T_-c-2ip_zfEUcJJ.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/121-basics-of-reverse-engineering.md rename to src/data/roadmaps/cyber-security/content/basics-of-reverse-engineering@uoGA4T_-c-2ip_zfEUcJJ.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/105-basics-of-subnetting.md b/src/data/roadmaps/cyber-security/content/basics-of-subnetting@E8Z7qFFW-I9ivr0HzoXCq.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/105-basics-of-subnetting.md rename to src/data/roadmaps/cyber-security/content/basics-of-subnetting@E8Z7qFFW-I9ivr0HzoXCq.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/105-threat-intel-osint.md b/src/data/roadmaps/cyber-security/content/basics-of-threat-intel-osint@wN5x5pY53B8d0yopa1z8F.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/105-threat-intel-osint.md rename to src/data/roadmaps/cyber-security/content/basics-of-threat-intel-osint@wN5x5pY53B8d0yopa1z8F.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/122-vulnerability-management.md b/src/data/roadmaps/cyber-security/content/basics-of-vulnerability-management@lcxAXtO6LoGd85nOFnLo8.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/122-vulnerability-management.md rename to src/data/roadmaps/cyber-security/content/basics-of-vulnerability-management@lcxAXtO6LoGd85nOFnLo8.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/107-blue-team-read-team-purple-team.md b/src/data/roadmaps/cyber-security/content/blue--red--purple-teams@7tDxTcKJNAUxbHLPCnPFO.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/107-blue-team-read-team-purple-team.md rename to src/data/roadmaps/cyber-security/content/blue--red--purple-teams@7tDxTcKJNAUxbHLPCnPFO.md diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/102-bluetooth.md b/src/data/roadmaps/cyber-security/content/bluetooth@DbWf5LdqiByPiJa4xHtl_.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/102-bluetooth.md rename to src/data/roadmaps/cyber-security/content/bluetooth@DbWf5LdqiByPiJa4xHtl_.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/102-box.md b/src/data/roadmaps/cyber-security/content/box@4Man3Bd-ySLFlAdxbLOHw.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/102-box.md rename to src/data/roadmaps/cyber-security/content/box@4Man3Bd-ySLFlAdxbLOHw.md diff --git a/src/data/roadmaps/cyber-security/content/brute-force-vs-password-spray@Q0i-plPQkb_NIvOQBVaDd.md b/src/data/roadmaps/cyber-security/content/brute-force-vs-password-spray@Q0i-plPQkb_NIvOQBVaDd.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/buffer-overflow@n8ZOZxNhlnw7DpzoXe_f_.md b/src/data/roadmaps/cyber-security/content/buffer-overflow@n8ZOZxNhlnw7DpzoXe_f_.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/103-bus-topology.md b/src/data/roadmaps/cyber-security/content/bus@0DWh4WmLK_ENDuqQmQcu4.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/103-bus-topology.md rename to src/data/roadmaps/cyber-security/content/bus@0DWh4WmLK_ENDuqQmQcu4.md diff --git a/src/data/roadmaps/cyber-security/content/105-programming-knowledge/103-cpp.md b/src/data/roadmaps/cyber-security/content/c@8jj9hpe9jQIgCc8Txyw3O.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/105-programming-knowledge/103-cpp.md rename to src/data/roadmaps/cyber-security/content/c@8jj9hpe9jQIgCc8Txyw3O.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/109-cat.md b/src/data/roadmaps/cyber-security/content/cat@D2ptX6ja_HvFEafMIzWOy.md similarity index 97% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/109-cat.md rename to src/data/roadmaps/cyber-security/content/cat@D2ptX6ja_HvFEafMIzWOy.md index 88e0ca9fd..ceb545bf9 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/109-cat.md +++ b/src/data/roadmaps/cyber-security/content/cat@D2ptX6ja_HvFEafMIzWOy.md @@ -48,4 +48,4 @@ Here are some of the useful features of `cat` in incident response and discovery ## Wrapping Up -In summary, `cat` is a versatile and indispensable tool in cybersecurity for simplifying the process of navigating through files, logs, and data during an incident response. Its compatibility with various other Unix utilities and commands makes it a powerful tool in the hands of cyber professionals. +In summary, `cat` is a versatile and indispensable tool in cybersecurity for simplifying the process of navigating through files, logs, and data during an incident response. Its compatibility with various other Unix utilities and commands makes it a powerful tool in the hands of cyber professionals. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/203-ccna.md b/src/data/roadmaps/cyber-security/content/ccna@4RD22UZATfL8dc71YkJwQ.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/203-ccna.md rename to src/data/roadmaps/cyber-security/content/ccna@4RD22UZATfL8dc71YkJwQ.md diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/209-ceh.md b/src/data/roadmaps/cyber-security/content/ceh@AAo7DXB7hyBzO6p05gx1i.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/209-ceh.md rename to src/data/roadmaps/cyber-security/content/ceh@AAo7DXB7hyBzO6p05gx1i.md index dc5aa9250..6c534c399 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/209-ceh.md +++ b/src/data/roadmaps/cyber-security/content/ceh@AAo7DXB7hyBzO6p05gx1i.md @@ -39,4 +39,4 @@ To prepare for the CEH exam, candidates can follow the EC-Council's official tra ## Recertification -CEH holders need to earn 120 ECE (Education Credits) within three years of obtaining their certification to retain their credentials. These credits can be obtained through training, workshops, conferences, and other continuous learning opportunities in the field of information security. +CEH holders need to earn 120 ECE (Education Credits) within three years of obtaining their certification to retain their credentials. These credits can be obtained through training, workshops, conferences, and other continuous learning opportunities in the field of information security. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/103-certificates.md b/src/data/roadmaps/cyber-security/content/certificates@WXRaVCYwuGQsjJ5wyvbea.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/103-certificates.md rename to src/data/roadmaps/cyber-security/content/certificates@WXRaVCYwuGQsjJ5wyvbea.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/103-cidr.md b/src/data/roadmaps/cyber-security/content/cidr@PPIH1oHW4_ZDyD3U3shDg.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/103-cidr.md rename to src/data/roadmaps/cyber-security/content/cidr@PPIH1oHW4_ZDyD3U3shDg.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/103-cis.md b/src/data/roadmaps/cyber-security/content/cis@sSihnptkoEqUsHjDpckhG.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/103-cis.md rename to src/data/roadmaps/cyber-security/content/cis@sSihnptkoEqUsHjDpckhG.md index 5b6434402..9b9628b2c 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/103-cis.md +++ b/src/data/roadmaps/cyber-security/content/cis@sSihnptkoEqUsHjDpckhG.md @@ -30,4 +30,4 @@ CIS Benchmarks provide the following benefits: - Enable organizations to adopt best practices in configuration management. - Facilitate audit preparation and maintaining system documentation. -In summary, the Center for Internet Security (CIS) offers valuable resources that can help organizations bolster their security posture. The CIS Critical Security Controls and CIS Benchmarks are practical tools that provide guidance on implementing security measures to mitigate cyber threats effectively. By following these guidelines, organizations can improve their resilience and better protect themselves in the rapidly evolving digital landscape. +In summary, the Center for Internet Security (CIS) offers valuable resources that can help organizations bolster their security posture. The CIS Critical Security Controls and CIS Benchmarks are practical tools that provide guidance on implementing security measures to mitigate cyber threats effectively. By following these guidelines, organizations can improve their resilience and better protect themselves in the rapidly evolving digital landscape. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/201-cisa.md b/src/data/roadmaps/cyber-security/content/cisa@lqFp4VLY_S-5tAbhNQTew.md similarity index 97% rename from src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/201-cisa.md rename to src/data/roadmaps/cyber-security/content/cisa@lqFp4VLY_S-5tAbhNQTew.md index ceebf2844..7714cacf2 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/201-cisa.md +++ b/src/data/roadmaps/cyber-security/content/cisa@lqFp4VLY_S-5tAbhNQTew.md @@ -42,4 +42,4 @@ Upon obtaining the CISA certification, some of the benefits include: - The potential for salary increase and promotions - Access to a global community of certified professionals and resources -Overall, the CISA certification can be a valuable asset for those looking to advance their careers in cybersecurity, particularly in the area of auditing and controlling information systems. +Overall, the CISA certification can be a valuable asset for those looking to advance their careers in cybersecurity, particularly in the area of auditing and controlling information systems. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/202-cism.md b/src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md similarity index 90% rename from src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/202-cism.md rename to src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md index 24f41a609..46f0bdcad 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/202-cism.md +++ b/src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md @@ -21,11 +21,11 @@ To obtain the CISM certification, candidates must: - **Study for the Exam**: Thorough exam preparation is essential for success. ISACA provides a range of study materials, including the [CISM Review Manual](https://www.isaca.org/bookstore), online question banks, and instructor-led courses. - **Take the Exam**: The CISM exam consists of 150 multiple-choice questions, and you have four hours to complete it. It covers four main domains: - - Information Security Governance - - Information Risk Management - - Information Security Program Development and Management - - Information Security Incident Management + - Information Security Governance + - Information Risk Management + - Information Security Program Development and Management + - Information Security Incident Management - **Maintain Your Certification**: Once you pass the exam and meet the experience requirements, you need to [apply for certification](https://www.isaca.org/credentialing/certified-information-security-manager/get-cism-certified). To maintain your CISM credential, you must earn Continuing Professional Education (CPE) hours and renew your certification every three years. -The CISM certification is globally recognized for its emphasis on the strategic and managerial aspects of information security. Professionals with this certification are in high demand, as they possess the knowledge and skills to develop and manage comprehensive information security programs in various organizations. +The CISM certification is globally recognized for its emphasis on the strategic and managerial aspects of information security. Professionals with this certification are in high demand, as they possess the knowledge and skills to develop and manage comprehensive information security programs in various organizations. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/200-cissp.md b/src/data/roadmaps/cyber-security/content/cissp@BqvijNoRzSGYLCMP-6hhr.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/200-cissp.md rename to src/data/roadmaps/cyber-security/content/cissp@BqvijNoRzSGYLCMP-6hhr.md index 6a6dbb59d..420c89eea 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/200-cissp.md +++ b/src/data/roadmaps/cyber-security/content/cissp@BqvijNoRzSGYLCMP-6hhr.md @@ -35,4 +35,4 @@ Obtaining the CISSP certification comes with numerous benefits, such as: - Increased job opportunities, as many organizations and government agencies require or prefer CISSP-certified professionals. - Improved knowledge and skills, as the certification covers a broad range of security topics and best practices. - Higher salary potential, as CISSP-certified professionals often command higher salaries compared to their non-certified counterparts. -- Access to a network of other CISSP-certified professionals and resources, enabling continuous learning and professional development. +- Access to a network of other CISSP-certified professionals and resources, enabling continuous learning and professional development. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/index.md b/src/data/roadmaps/cyber-security/content/cloud-skills-and-knowledge@vVaBQ5VtsE_ZeXbCOF8ux.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/index.md rename to src/data/roadmaps/cyber-security/content/cloud-skills-and-knowledge@vVaBQ5VtsE_ZeXbCOF8ux.md diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/110-common-commands.md b/src/data/roadmaps/cyber-security/content/common-commands@WDrSO7wBNn-2jB8mcyT7j.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/110-common-commands.md rename to src/data/roadmaps/cyber-security/content/common-commands@WDrSO7wBNn-2jB8mcyT7j.md index a333d6f5f..44bbbd75b 100644 --- a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/110-common-commands.md +++ b/src/data/roadmaps/cyber-security/content/common-commands@WDrSO7wBNn-2jB8mcyT7j.md @@ -80,4 +80,4 @@ These commands are useful for analyzing and troubleshooting network connections. - `Aircrack-ng`: A suite of tools for auditing wireless networks. -By familiarizing yourself with these common commands and tools, you'll have a solid foundation to build upon in your cyber security journey. As you progress, you will encounter more advanced tools and techniques, so keep learning and stay curious! +By familiarizing yourself with these common commands and tools, you'll have a solid foundation to build upon in your cyber security journey. As you progress, you will encounter more advanced tools and techniques, so keep learning and stay curious! \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/102-common-ports.md b/src/data/roadmaps/cyber-security/content/common-ports-and-their-uses@0tx2QYDYXhm85iYrCWd9U.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/102-common-ports.md rename to src/data/roadmaps/cyber-security/content/common-ports-and-their-uses@0tx2QYDYXhm85iYrCWd9U.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/index.md b/src/data/roadmaps/cyber-security/content/common-protocols-and-their-uses@ViF-mpR17MB3_KJ1rV8mS.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/index.md rename to src/data/roadmaps/cyber-security/content/common-protocols-and-their-uses@ViF-mpR17MB3_KJ1rV8mS.md diff --git a/src/data/roadmaps/cyber-security/content/compliance@05Gbgy6aawYlYIx38u8DE.md b/src/data/roadmaps/cyber-security/content/compliance@05Gbgy6aawYlYIx38u8DE.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/200-comptia-aplus.md b/src/data/roadmaps/cyber-security/content/comptia-a@lbAgU5lR1O7L_5mCbNz_D.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/200-comptia-aplus.md rename to src/data/roadmaps/cyber-security/content/comptia-a@lbAgU5lR1O7L_5mCbNz_D.md index 7faf2b1b2..dd118eb5c 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/200-comptia-aplus.md +++ b/src/data/roadmaps/cyber-security/content/comptia-a@lbAgU5lR1O7L_5mCbNz_D.md @@ -36,4 +36,4 @@ Achieving a CompTIA A+ certification can offer several benefits, such as: Overall, if you're an aspiring IT professional, the CompTIA A+ certification is a great starting point to kick off your IT career and begin acquiring the skills and knowledge needed to thrive in this ever-evolving industry. -- [@video@CompTIA A+ 220-1101 - Professor Messer](https://www.youtube.com/@professormesser/search?query=CompTIA%20220-1101%20A%2B) +- [@video@CompTIA A+ 220-1101 - Professor Messer](https://www.youtube.com/@professormesser/search?query=CompTIA%20220-1101%20A%2B) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/201-comptia-linuxplus.md b/src/data/roadmaps/cyber-security/content/comptia-linux@p34Qwlj2sjwEPR2ay1WOK.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/201-comptia-linuxplus.md rename to src/data/roadmaps/cyber-security/content/comptia-linux@p34Qwlj2sjwEPR2ay1WOK.md diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/202-comptia-networkplus.md b/src/data/roadmaps/cyber-security/content/comptia-network@4RGbNOfMPDbBcvUFWTTCV.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/202-comptia-networkplus.md rename to src/data/roadmaps/cyber-security/content/comptia-network@4RGbNOfMPDbBcvUFWTTCV.md index 58ebe1e78..4f6859d49 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/202-comptia-networkplus.md +++ b/src/data/roadmaps/cyber-security/content/comptia-network@4RGbNOfMPDbBcvUFWTTCV.md @@ -30,4 +30,4 @@ By earning the CompTIA Network+ certification, you can demonstrate your competen - **Professional growth**: Gaining the Network+ certification helps you stay up-to-date with networking technologies and sets the stage for more advanced certifications, such as [CompTIA Security+](#) or [Cisco CCNA](#). - **Vendor-neutral**: Since the Network+ certification covers a broad range of networking topics, it is applicable to many different network environments and technologies. -To get started with your CompTIA Network+ certification journey, [visit the official CompTIA website](https://www.comptia.org/certifications/network) for more information on the certification, exam preparation, and testing centers. +To get started with your CompTIA Network+ certification journey, [visit the official CompTIA website](https://www.comptia.org/certifications/network) for more information on the certification, exam preparation, and testing centers. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/204-comptia-securityplus.md b/src/data/roadmaps/cyber-security/content/comptia-security@AxeDcKK3cUtEojtHQPBw7.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/204-comptia-securityplus.md rename to src/data/roadmaps/cyber-security/content/comptia-security@AxeDcKK3cUtEojtHQPBw7.md index 5bd2e3ef8..b24a7b259 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/204-comptia-securityplus.md +++ b/src/data/roadmaps/cyber-security/content/comptia-security@AxeDcKK3cUtEojtHQPBw7.md @@ -30,4 +30,4 @@ Preparation for the CompTIA Security+ exam involves a combination of self-study, While there are no formal prerequisites to take the Security+ exam, CompTIA recommends candidates have two years of experience in IT administration, focusing on security, and a CompTIA Network+ certification. -Overall, the CompTIA Security+ certification is an excellent choice for those looking to begin their journey in cybersecurity. It provides candidates with a strong foundational knowledge, while also serving as a stepping stone for more advanced certifications in the field. +Overall, the CompTIA Security+ certification is an excellent choice for those looking to begin their journey in cybersecurity. It provides candidates with a strong foundational knowledge, while also serving as a stepping stone for more advanced certifications in the field. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/100-computer-hardware-components.md b/src/data/roadmaps/cyber-security/content/computer-hardware-components@Ih0YZt8u9vDwYo8y1t41n.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/100-computer-hardware-components.md rename to src/data/roadmaps/cyber-security/content/computer-hardware-components@Ih0YZt8u9vDwYo8y1t41n.md diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/index.md b/src/data/roadmaps/cyber-security/content/connection-types-and-their-function@F1QVCEmGkgvz-_H5lTxY2.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/index.md rename to src/data/roadmaps/cyber-security/content/connection-types-and-their-function@F1QVCEmGkgvz-_H5lTxY2.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/102-containment.md b/src/data/roadmaps/cyber-security/content/containment@l7WnKuR2HTD4Vf9U2TxkK.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/102-containment.md rename to src/data/roadmaps/cyber-security/content/containment@l7WnKuR2HTD4Vf9U2TxkK.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/118-zero-trust.md b/src/data/roadmaps/cyber-security/content/core-concepts-of-zero-trust@HavEL0u65ZxHt92TfbLzk.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/118-zero-trust.md rename to src/data/roadmaps/cyber-security/content/core-concepts-of-zero-trust@HavEL0u65ZxHt92TfbLzk.md diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/208-crest.md b/src/data/roadmaps/cyber-security/content/crest@rA1skdztev3-8VmAtIlmr.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/208-crest.md rename to src/data/roadmaps/cyber-security/content/crest@rA1skdztev3-8VmAtIlmr.md index e7320dca5..ec6aa44a0 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/208-crest.md +++ b/src/data/roadmaps/cyber-security/content/crest@rA1skdztev3-8VmAtIlmr.md @@ -23,4 +23,4 @@ Obtaining CREST certifications provides several benefits, such as: - Access to resources and support through the CREST community - Assurance for employers and clients that you're skilled and trustworthy -In the rapidly evolving field of cyber security, CREST certifications demonstrate a commitment to continuous learning, growth, and professionalism. +In the rapidly evolving field of cyber security, CREST certifications demonstrate a commitment to continuous learning, growth, and professionalism. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/104-csf.md b/src/data/roadmaps/cyber-security/content/csf@HjfgaSEZjW9BOXy_Ixzkk.md similarity index 67% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/104-csf.md rename to src/data/roadmaps/cyber-security/content/csf@HjfgaSEZjW9BOXy_Ixzkk.md index 1019f2226..35c9c2ed7 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/104-csf.md +++ b/src/data/roadmaps/cyber-security/content/csf@HjfgaSEZjW9BOXy_Ixzkk.md @@ -10,18 +10,18 @@ CSF comprises three key components: - **Core** - Consists of five functions, each representing a high-level cybersecurity activity: - - Identify: Understand the organization's cybersecurity risks. - - Protect: Implement safeguards to protect the critical infrastructure. - - Detect: Identify the occurrence of a potential cybersecurity event. - - Respond: Develop and implement appropriate actions to address detected cybersecurity events. - - Recover: Implement plans to restore systems and services after a cybersecurity incident. + - Identify: Understand the organization's cybersecurity risks. + - Protect: Implement safeguards to protect the critical infrastructure. + - Detect: Identify the occurrence of a potential cybersecurity event. + - Respond: Develop and implement appropriate actions to address detected cybersecurity events. + - Recover: Implement plans to restore systems and services after a cybersecurity incident. - **Tiers** - Provide context for organizations to consider the robustness of their cybersecurity program: - - Tier 1: Partial – Minimal cybersecurity risk management practices. - - Tier 2: Risk Informed – Risk management practices in place, but not consistently applied. - - Tier 3: Repeatable – Risk management practices are consistent across the organization. - - Tier 4: Adaptive – Proactive approach to managing cybersecurity risks. + - Tier 1: Partial – Minimal cybersecurity risk management practices. + - Tier 2: Risk Informed – Risk management practices in place, but not consistently applied. + - Tier 3: Repeatable – Risk management practices are consistent across the organization. + - Tier 4: Adaptive – Proactive approach to managing cybersecurity risks. - **Profiles** - Organizations create profiles to align their cybersecurity activities with their organizational goals, risk tolerance, and resources. A target profile represents desired outcomes, whereas a current profile reflects the current state of cybersecurity programs. @@ -32,4 +32,4 @@ CSF comprises three key components: - Strengthened communication between different departments and stakeholders regarding cybersecurity expectations and progress. - Compliance with industry standards and guidelines, including support for organizations subject to regulatory requirements. -CSF offers organizations a structured approach to improving their cybersecurity posture. By following this framework, organizations can manage their cybersecurity risks more effectively, create a stronger defense against cyberattacks, and maintain the resilience of their critical infrastructure. +CSF offers organizations a structured approach to improving their cybersecurity posture. By following this framework, organizations can manage their cybersecurity risks more effectively, create a stronger defense against cyberattacks, and maintain the resilience of their critical infrastructure. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/csrf@pK2iRArULlK-B3iSVo4-n.md b/src/data/roadmaps/cyber-security/content/csrf@pK2iRArULlK-B3iSVo4-n.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/104-curl.md b/src/data/roadmaps/cyber-security/content/curl@W7iQUCjODGYgE4PjC5TZI.md similarity index 97% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/104-curl.md rename to src/data/roadmaps/cyber-security/content/curl@W7iQUCjODGYgE4PjC5TZI.md index 0e8513d53..d0e8f82f4 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/104-curl.md +++ b/src/data/roadmaps/cyber-security/content/curl@W7iQUCjODGYgE4PjC5TZI.md @@ -60,4 +60,4 @@ Curl is a versatile command-line tool primarily used for transferring data using curl -I https://example.com ``` -Curl is a powerful tool in the arsenal of anyone working in cybersecurity. Understanding and mastering its usage can greatly enhance your capabilities when dealing with various network protocols, web services, and web applications. +Curl is a powerful tool in the arsenal of anyone working in cybersecurity. Understanding and mastering its usage can greatly enhance your capabilities when dealing with various network protocols, web services, and web applications. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/113-cyber-kill-chain.md b/src/data/roadmaps/cyber-security/content/cyber-kill-chain@H38Vb7xvuBJXVzgPBdRdT.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/113-cyber-kill-chain.md rename to src/data/roadmaps/cyber-security/content/cyber-kill-chain@H38Vb7xvuBJXVzgPBdRdT.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/110-dd.md b/src/data/roadmaps/cyber-security/content/dd@9xbU_hrEOUtMm-Q09Fe6t.md similarity index 97% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/110-dd.md rename to src/data/roadmaps/cyber-security/content/dd@9xbU_hrEOUtMm-Q09Fe6t.md index 4cc858057..4566a0d66 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/110-dd.md +++ b/src/data/roadmaps/cyber-security/content/dd@9xbU_hrEOUtMm-Q09Fe6t.md @@ -40,4 +40,4 @@ In this example, `dd` creates an exact image of the USB drive (`/dev/sdb1`) and Be cautious while using `dd` as it can overwrite and destroy data if used incorrectly. Always verify the input and output files and make sure to have backups of important data. -By mastering the `dd` utility, you'll have a powerful forensic imaging tool at your disposal which will undoubtedly enhance your cybersecurity incident response and discovery capabilities. +By mastering the `dd` utility, you'll have a powerful forensic imaging tool at your disposal which will undoubtedly enhance your cybersecurity incident response and discovery capabilities. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/deauth-attack@LfWJJaT3fv0p6fUeS8b84.md b/src/data/roadmaps/cyber-security/content/deauth-attack@LfWJJaT3fv0p6fUeS8b84.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/105-default-gateway.md b/src/data/roadmaps/cyber-security/content/default-gateway@5rKaFtjYx0n2iF8uTLs8X.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/105-default-gateway.md rename to src/data/roadmaps/cyber-security/content/default-gateway@5rKaFtjYx0n2iF8uTLs8X.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/107-dhcp.md b/src/data/roadmaps/cyber-security/content/dhcp@R5HEeh6jwpQDo27rz1KSH.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/107-dhcp.md rename to src/data/roadmaps/cyber-security/content/dhcp@R5HEeh6jwpQDo27rz1KSH.md index 2c7d86eba..84af76ccf 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/107-dhcp.md +++ b/src/data/roadmaps/cyber-security/content/dhcp@R5HEeh6jwpQDo27rz1KSH.md @@ -20,4 +20,4 @@ The DHCP process consists of four main steps: ## Importance in Cyber Security -Understanding DHCP is crucial for network professionals and cyber security experts as it can be a potential attack vector. Adversaries can exploit DHCP by setting up rogue DHCP servers on the network, conducting man-in-the-middle attacks or even conducting denial-of-service attacks. Consequently, securing DHCP servers, monitoring network traffic for anomalies, and employing strong authentication and authorization methods are essential practices for maintaining network security. +Understanding DHCP is crucial for network professionals and cyber security experts as it can be a potential attack vector. Adversaries can exploit DHCP by setting up rogue DHCP servers on the network, conducting man-in-the-middle attacks or even conducting denial-of-service attacks. Consequently, securing DHCP servers, monitoring network traffic for anomalies, and employing strong authentication and authorization methods are essential practices for maintaining network security. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/dhcp@T4312p70FqRBkzVfWKMaR.md b/src/data/roadmaps/cyber-security/content/dhcp@T4312p70FqRBkzVfWKMaR.md new file mode 100644 index 000000000..84af76ccf --- /dev/null +++ b/src/data/roadmaps/cyber-security/content/dhcp@T4312p70FqRBkzVfWKMaR.md @@ -0,0 +1,23 @@ +# DHCP + +**Dynamic Host Configuration Protocol (DHCP)** is a network protocol that enables automatic assignment of IP addresses to devices on a network. It is an essential component of IP networking and aims to simplify the process of configuring devices to communicate over an IP-based network. + +## Key Features of DHCP + +- **Automatic IP Address Assignment**: DHCP eliminates the need for manual IP address assignment by automatically providing devices with the necessary IP addresses, reducing the risk of duplicate addressing. +- **Network Configuration**: In addition to IP addresses, DHCP can also provide other essential network information such as subnet mask, default gateway, and DNS server information. +- **IP Address Reuse**: When a device leaves the network or no longer needs an IP address, DHCP allows the address to be reused and assigned to a different device. +- **Lease Duration**: DHCP assigns IP addresses for a specific period called a "lease." After a lease expires, the device must request a new IP address or get its current address renewed. + +## How DHCP Works + +The DHCP process consists of four main steps: + +- **DHCP Discover**: A device (client) looking to join a network sends a broadcast message known as a "DHCP Discover" message to locate a DHCP server. +- **DHCP Offer**: Upon receiving the "DHCP Discover" broadcast, the DHCP server responds with a unicast "DHCP Offer" message containing the necessary network configuration information (e.g., IP address) for the client. +- **DHCP Request**: The client receives the offer and sends back a "DHCP Request" message to confirm the IP address assignment and other network information. +- **DHCP Acknowledgment (ACK)**: Finally, the DHCP server sends an "ACK" message confirming the successful assignment of IP address and network settings. The client can now use the allocated IP address to communicate over the network. + +## Importance in Cyber Security + +Understanding DHCP is crucial for network professionals and cyber security experts as it can be a potential attack vector. Adversaries can exploit DHCP by setting up rogue DHCP servers on the network, conducting man-in-the-middle attacks or even conducting denial-of-service attacks. Consequently, securing DHCP servers, monitoring network traffic for anomalies, and employing strong authentication and authorization methods are essential practices for maintaining network security. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/diamond-model@AY-hoPGnAZSd1ExaYX8LR.md b/src/data/roadmaps/cyber-security/content/diamond-model@AY-hoPGnAZSd1ExaYX8LR.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/104-versions-and-differences.md b/src/data/roadmaps/cyber-security/content/different-versions-and-differences@yXOGqlufAZ69uiBzKFfh6.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/104-versions-and-differences.md rename to src/data/roadmaps/cyber-security/content/different-versions-and-differences@yXOGqlufAZ69uiBzKFfh6.md index c5596f505..6ce5895c4 100644 --- a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/104-versions-and-differences.md +++ b/src/data/roadmaps/cyber-security/content/different-versions-and-differences@yXOGqlufAZ69uiBzKFfh6.md @@ -22,4 +22,4 @@ When we talk about differences in the context of cybersecurity, they can refer t - **Threat Differences**: Various types of cyber threats exist (e.g., malware, phishing, denial-of-service attacks), and it is crucial to understand their differences in order to implement the most effective countermeasures. -To sum up, keeping up with different versions of software and understanding the differences between technologies and threats are vital steps in maintaining a strong cyber security posture. Always update your software to the latest version, and continuously educate yourself on emerging threats and technologies to stay one step ahead of potential cyber attacks. +To sum up, keeping up with different versions of software and understanding the differences between technologies and threats are vital steps in maintaining a strong cyber security posture. Always update your software to the latest version, and continuously educate yourself on emerging threats and technologies to stay one step ahead of potential cyber attacks. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/107-dig.md b/src/data/roadmaps/cyber-security/content/dig@D2YYv1iTRGken75sHO0Gt.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/107-dig.md rename to src/data/roadmaps/cyber-security/content/dig@D2YYv1iTRGken75sHO0Gt.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/103-dig.md b/src/data/roadmaps/cyber-security/content/dig@XyaWZZ45axJMKXoWwsyFj.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/103-dig.md rename to src/data/roadmaps/cyber-security/content/dig@XyaWZZ45axJMKXoWwsyFj.md index 0289d574d..13b2f2e8e 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/103-dig.md +++ b/src/data/roadmaps/cyber-security/content/dig@XyaWZZ45axJMKXoWwsyFj.md @@ -104,4 +104,4 @@ For a comprehensive list of options, consult the [dig man page](https://manpages ## Conclusion -Dig is a powerful and flexible tool for querying DNS information, making it an essential part of any cyber security professional's toolkit. Whether you're investigating a breach, monitoring domain health, or troubleshooting DNS issues, dig can help you discover critical information about domain names and their associated records. +Dig is a powerful and flexible tool for querying DNS information, making it an essential part of any cyber security professional's toolkit. Whether you're investigating a breach, monitoring domain health, or troubleshooting DNS issues, dig can help you discover critical information about domain names and their associated records. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/directory-traversal@L0ROYh2DNlkybNDO2ezJY.md b/src/data/roadmaps/cyber-security/content/directory-traversal@L0ROYh2DNlkybNDO2ezJY.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/dlp@iolsTC-63d_1wzKGul-cT.md b/src/data/roadmaps/cyber-security/content/dlp@iolsTC-63d_1wzKGul-cT.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/101-dmz.md b/src/data/roadmaps/cyber-security/content/dmz@gfpvDQz61I3zTB7tGu7vp.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/101-dmz.md rename to src/data/roadmaps/cyber-security/content/dmz@gfpvDQz61I3zTB7tGu7vp.md diff --git a/src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md b/src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/106-dns.md b/src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/106-dns.md rename to src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md index 41a7adcdd..0afedeef7 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/106-dns.md +++ b/src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md @@ -24,4 +24,4 @@ As an essential part of the internet, the security and integrity of the DNS infr - [@article@DNS in detail (TryHackMe)](https://tryhackme.com/room/dnsindetail) - [@video@DNS in 100 Seconds (YouTube)](https://www.youtube.com/watch?v=uvr9lhugayu) -- [@feed@Explore top posts about DNS](https://app.daily.dev/tags/dns?ref=roadmapsh) +- [@feed@Explore top posts about DNS](https://app.daily.dev/tags/dns?ref=roadmapsh) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/dns@r1IKvhpwg2umazLGlQZL1.md b/src/data/roadmaps/cyber-security/content/dns@r1IKvhpwg2umazLGlQZL1.md new file mode 100644 index 000000000..0afedeef7 --- /dev/null +++ b/src/data/roadmaps/cyber-security/content/dns@r1IKvhpwg2umazLGlQZL1.md @@ -0,0 +1,27 @@ +# DNS + +**DNS** is a key component in the internet infrastructure that translates human-friendly domain names (e.g., `www.example.com`) into IP addresses (e.g., `192.0.2.44`). This translation process enables us to easily connect to websites and other online resources without having to remember complex numeric IP addresses. + +The DNS operates as a distributed and hierarchical system which involves the following components: + +- **DNS Resolver**: Your device's initial contact point with the DNS infrastructure, often provided by your Internet Service Provider (ISP) or a third-party service like Google Public DNS. + +- **Root Servers**: The authoritative servers on the top of the DNS hierarchy that guide DNS queries to the appropriate Top-Level Domain (TLD) servers. + +- **TLD Servers**: These servers manage the allocation of domain names for top-level domains, such as `.com`, `.org`, etc. + +- **Authoritative Name Servers**: These are the servers responsible for storing the DNS records pertaining to a specific domain (e.g., `example.com`). + +Some common DNS record types you might encounter include: + +- **A (Address) Record**: Maps a domain name to an IPv4 address. +- **AAAA (Address) Record**: Maps a domain name to an IPv6 address. +- **CNAME (Canonical Name) Record**: Maps an alias domain name to a canonical domain name. +- **MX (Mail Exchange) Record**: Specifies the mail servers responsible for handling email for the domain. +- **TXT (Text) Record**: Contains human-readable or machine-readable text, often used for verification purposes or providing additional information about a domain. + +As an essential part of the internet, the security and integrity of the DNS infrastructure are crucial. However, it's vulnerable to various types of cyber attacks, such as DNS cache poisoning, Distributed Denial of Service (DDoS) attacks, and DNS hijacking. Proper DNS security measures, such as DNSSEC (DNS Security Extensions) and monitoring unusual DNS traffic patterns, can help mitigate risks associated with these attacks. + +- [@article@DNS in detail (TryHackMe)](https://tryhackme.com/room/dnsindetail) +- [@video@DNS in 100 Seconds (YouTube)](https://www.youtube.com/watch?v=uvr9lhugayu) +- [@feed@Explore top posts about DNS](https://app.daily.dev/tags/dns?ref=roadmapsh) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/dnssec@LLGXONul7JfZGUahnK0AZ.md b/src/data/roadmaps/cyber-security/content/dnssec@LLGXONul7JfZGUahnK0AZ.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/dos-vs-ddos@IF5H0ZJ72XnqXti3jRWYF.md b/src/data/roadmaps/cyber-security/content/dos-vs-ddos@IF5H0ZJ72XnqXti3jRWYF.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/drive-by-attack@cO70zHvHgBAH29khF-hBW.md b/src/data/roadmaps/cyber-security/content/drive-by-attack@cO70zHvHgBAH29khF-hBW.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/101-dropbox.md b/src/data/roadmaps/cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/101-dropbox.md rename to src/data/roadmaps/cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md diff --git a/src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md b/src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/eap-vs-peap@1jwtExZzR9ABKvD_S9zFG.md b/src/data/roadmaps/cyber-security/content/eap-vs-peap@1jwtExZzR9ABKvD_S9zFG.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/edr@QvHWrmMzO8IvNQ234E_wf.md b/src/data/roadmaps/cyber-security/content/edr@QvHWrmMzO8IvNQ234E_wf.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/108-endpoint-security.md b/src/data/roadmaps/cyber-security/content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/108-endpoint-security.md rename to src/data/roadmaps/cyber-security/content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/103-eradication.md b/src/data/roadmaps/cyber-security/content/eradication@N17xAIo7sgbB0nrIDMWju.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/103-eradication.md rename to src/data/roadmaps/cyber-security/content/eradication@N17xAIo7sgbB0nrIDMWju.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/102-esxi.md b/src/data/roadmaps/cyber-security/content/esxi@BisNooct1vJDKaBKsGR7_.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/102-esxi.md rename to src/data/roadmaps/cyber-security/content/esxi@BisNooct1vJDKaBKsGR7_.md diff --git a/src/data/roadmaps/cyber-security/content/event-logs@KbFwL--xF-eYjGy8PZdrM.md b/src/data/roadmaps/cyber-security/content/event-logs@KbFwL--xF-eYjGy8PZdrM.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/evil-twin@O1fY2n40yjZtJUEeoItKr.md b/src/data/roadmaps/cyber-security/content/evil-twin@O1fY2n40yjZtJUEeoItKr.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/index.md b/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/index.md deleted file mode 100644 index 4e4a922c0..000000000 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/index.md +++ /dev/null @@ -1 +0,0 @@ -# Advanced certifications diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/index.md b/src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/index.md deleted file mode 100644 index 1437f8d84..000000000 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/beginner-certifications/index.md +++ /dev/null @@ -1 +0,0 @@ -# Beginner certifications diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/index.md b/src/data/roadmaps/cyber-security/content/extras/certifications/index.md deleted file mode 100644 index 843cd64b3..000000000 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/index.md +++ /dev/null @@ -1 +0,0 @@ -# Certifications diff --git a/src/data/roadmaps/cyber-security/content/extras/ctfs/index.md b/src/data/roadmaps/cyber-security/content/extras/ctfs/index.md deleted file mode 100644 index cf3a72029..000000000 --- a/src/data/roadmaps/cyber-security/content/extras/ctfs/index.md +++ /dev/null @@ -1 +0,0 @@ -# Ctfs diff --git a/src/data/roadmaps/cyber-security/content/extras/index.md b/src/data/roadmaps/cyber-security/content/extras/index.md deleted file mode 100644 index f419a91af..000000000 --- a/src/data/roadmaps/cyber-security/content/extras/index.md +++ /dev/null @@ -1 +0,0 @@ -# Extras diff --git a/src/data/roadmaps/cyber-security/content/false-negative--false-positive@XwRCZf-yHJsXVjaRfb3R4.md b/src/data/roadmaps/cyber-security/content/false-negative--false-positive@XwRCZf-yHJsXVjaRfb3R4.md new file mode 100644 index 000000000..0718b93f6 --- /dev/null +++ b/src/data/roadmaps/cyber-security/content/false-negative--false-positive@XwRCZf-yHJsXVjaRfb3R4.md @@ -0,0 +1,7 @@ +# False Negative / False Positive + +A false positive happens when the security tool mistakenly identifies a non-threat as a threat. For example, it might raise an alarm for a legitimate user's activity, indicating a potential attack when there isn't any. A high number of false positives can cause unnecessary diverting of resources and time, investigating false alarms. Additionally, it could lead to user frustration if legitimate activities are being blocked. + +A false negative occurs when the security tool fails to detect an actual threat or attack. This could result in a real attack going unnoticed, causing damage to the system, data breaches, or other negative consequences. A high number of false negatives indicate that the security system needs to be improved to capture real threats effectively. + +To have an effective cybersecurity system, security professionals aim to maximize true positives and true negatives, while minimizing false positives and false negatives. Balancing these aspects ensures that the security tools maintain their effectiveness without causing undue disruptions to a user's experience. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/firewall-logs@np0PwKy-EvIa_f_LC6Eem.md b/src/data/roadmaps/cyber-security/content/firewall-logs@np0PwKy-EvIa_f_LC6Eem.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/firwall--nextgen-firewall@tWDo5R3KU5KOjDdtv801x.md b/src/data/roadmaps/cyber-security/content/firwall--nextgen-firewall@tWDo5R3KU5KOjDdtv801x.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/117-ftk-imager.md b/src/data/roadmaps/cyber-security/content/ftk-imager@_jJhL1RtaqHJmlcWrd-Ak.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/117-ftk-imager.md rename to src/data/roadmaps/cyber-security/content/ftk-imager@_jJhL1RtaqHJmlcWrd-Ak.md index a9da1d107..ccdbd7983 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/117-ftk-imager.md +++ b/src/data/roadmaps/cyber-security/content/ftk-imager@_jJhL1RtaqHJmlcWrd-Ak.md @@ -23,4 +23,4 @@ To use FTK Imager effectively in incident response: - Preview, examine, and export data as needed for further investigation and analysis. - Use FTK Imager along with other forensic tools and techniques to perform comprehensive digital investigations during incident response and discovery scenarios. -In summary, FTK Imager is a versatile tool that plays a critical role in incident response and discovery efforts by providing secure and forensically sound digital imaging capabilities, enabling investigators to preserve, analyze, and present digital evidence for successful cyber security investigations. +In summary, FTK Imager is a versatile tool that plays a critical role in incident response and discovery efforts by providing secure and forensically sound digital imaging capabilities, enabling investigators to preserve, analyze, and present digital evidence for successful cyber security investigations. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/ftp-vs-sftp@9Z6HPHPj4escSVDWftFEx.md b/src/data/roadmaps/cyber-security/content/ftp-vs-sftp@9Z6HPHPj4escSVDWftFEx.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/102-ftp.md b/src/data/roadmaps/cyber-security/content/ftp@ftYYMxRpVer-jgSswHLNa.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/102-ftp.md rename to src/data/roadmaps/cyber-security/content/ftp@ftYYMxRpVer-jgSswHLNa.md diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/index.md b/src/data/roadmaps/cyber-security/content/fundamental-it-skills@oimYzZYFXKjgvc7D4c-2u.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/index.md rename to src/data/roadmaps/cyber-security/content/fundamental-it-skills@oimYzZYFXKjgvc7D4c-2u.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/108-common-cloud-environments/101-gcp.md b/src/data/roadmaps/cyber-security/content/gcp@tOLA5QPKi6LHl1ljsOMwX.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/108-common-cloud-environments/101-gcp.md rename to src/data/roadmaps/cyber-security/content/gcp@tOLA5QPKi6LHl1ljsOMwX.md diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/206-giac.md b/src/data/roadmaps/cyber-security/content/giac@ZiUT-lyIBfHTzG-dwSy96.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/206-giac.md rename to src/data/roadmaps/cyber-security/content/giac@ZiUT-lyIBfHTzG-dwSy96.md index b319735b3..6f43d6dfc 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/206-giac.md +++ b/src/data/roadmaps/cyber-security/content/giac@ZiUT-lyIBfHTzG-dwSy96.md @@ -28,4 +28,4 @@ GIAC-certified professionals are highly sought after due to the rigorous assessm - Peer recognition - Demonstrated commitment to professional development -In summary, GIAC certifications are valuable and respected credentials that pave the way for a successful cybersecurity career. By completing a GIAC certification, you validate your expertise and increase your employability in the competitive field of cybersecurity. +In summary, GIAC certifications are valuable and respected credentials that pave the way for a successful cybersecurity career. By completing a GIAC certification, you validate your expertise and increase your employability in the competitive field of cybersecurity. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/105-programming-knowledge/101-go.md b/src/data/roadmaps/cyber-security/content/go@jehVvdz8BnruKjqHMKu5v.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/105-programming-knowledge/101-go.md rename to src/data/roadmaps/cyber-security/content/go@jehVvdz8BnruKjqHMKu5v.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/104-google-drive.md b/src/data/roadmaps/cyber-security/content/google-drive@fTZ4PqH-AMhYA_65w4wFO.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/104-google-drive.md rename to src/data/roadmaps/cyber-security/content/google-drive@fTZ4PqH-AMhYA_65w4wFO.md diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/101-google-suite.md b/src/data/roadmaps/cyber-security/content/google-suite@IOK_FluAv34j3Tj_NvwdO.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/101-google-suite.md rename to src/data/roadmaps/cyber-security/content/google-suite@IOK_FluAv34j3Tj_NvwdO.md diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/204-gpen.md b/src/data/roadmaps/cyber-security/content/gpen@t4h9rEKWz5Us0qJKXhxlX.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/204-gpen.md rename to src/data/roadmaps/cyber-security/content/gpen@t4h9rEKWz5Us0qJKXhxlX.md index 5fd468fee..2161f2edf 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/204-gpen.md +++ b/src/data/roadmaps/cyber-security/content/gpen@t4h9rEKWz5Us0qJKXhxlX.md @@ -29,4 +29,4 @@ To prepare for the GPEN exam, candidates are recommended to have a strong founda - **Exam Delivery:** Proctored, Online or at a testing center - **Cost:** $1,999 USD (Includes one retake) -Upon successfully passing the exam, candidates will receive the GIAC Penetration Tester certification, which is valid for four years. To maintain the certification, professionals must earn plus 36 Continuing Professional Education (CPE) credits every two years and pay a maintenance fee to keep their credentials active. +Upon successfully passing the exam, candidates will receive the GIAC Penetration Tester certification, which is valid for four years. To maintain the certification, professionals must earn plus 36 Continuing Professional Education (CPE) credits every two years and pay a maintenance fee to keep their credentials active. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/113-grep.md b/src/data/roadmaps/cyber-security/content/grep@Dfz-6aug0juUpMmOJLCJ9.md similarity index 97% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/113-grep.md rename to src/data/roadmaps/cyber-security/content/grep@Dfz-6aug0juUpMmOJLCJ9.md index e9ac5ec41..32b411c05 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/113-grep.md +++ b/src/data/roadmaps/cyber-security/content/grep@Dfz-6aug0juUpMmOJLCJ9.md @@ -48,4 +48,4 @@ grep -E -o "([0-9]{1,3}\.){3}[0-9]{1,3}" /var/log/apache2/access.log ## Conclusion -Grep is an indispensable tool for incident response and discovery tasks in cyber security. It allows you to quickly pinpoint specific patterns in large volumes of data, making it easier to identify potential threats and respond accordingly. As you become more proficient with grep and its wide array of options, you'll gain a valuable resource in your cyber security toolkit. +Grep is an indispensable tool for incident response and discovery tasks in cyber security. It allows you to quickly pinpoint specific patterns in large volumes of data, making it easier to identify potential threats and respond accordingly. As you become more proficient with grep and its wide array of options, you'll gain a valuable resource in your cyber security toolkit. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/103-group-policy.md b/src/data/roadmaps/cyber-security/content/group-policy@FxuMJmDoDkIsPFp2iocFg.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/103-group-policy.md rename to src/data/roadmaps/cyber-security/content/group-policy@FxuMJmDoDkIsPFp2iocFg.md diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/203-gsec.md b/src/data/roadmaps/cyber-security/content/gsec@nlmATCTgHoIoMcEOW8bUW.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/203-gsec.md rename to src/data/roadmaps/cyber-security/content/gsec@nlmATCTgHoIoMcEOW8bUW.md index 262a21413..4f293192a 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/203-gsec.md +++ b/src/data/roadmaps/cyber-security/content/gsec@nlmATCTgHoIoMcEOW8bUW.md @@ -29,4 +29,4 @@ To prepare for the GSEC exam, you can use the following resources: - **Online forums and study groups**: Participate in online forums and study groups related to GSEC and cybersecurity in general. These platforms can provide valuable insights, tips, and experiences from other security professionals and candidates preparing for the exam. - **GSEC Practice Exams**: GIAC offers two practice exams for the GSEC certification, which are an excellent way to assess your knowledge and identify areas that may require further attention. -By obtaining the GSEC certification, you will demonstrate your advanced knowledge and skills in cybersecurity, showcasing your ability to protect information systems and networks effectively. This certification can be a significant asset to your career and help you stand out in the competitive cybersecurity job market. +By obtaining the GSEC certification, you will demonstrate your advanced knowledge and skills in cybersecurity, showcasing your ability to protect information systems and networks effectively. This certification can be a significant asset to your career and help you stand out in the competitive cybersecurity job market. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/102-guest-os.md b/src/data/roadmaps/cyber-security/content/guestos@LocGETHz6ANYinNd5ZLsS.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/102-guest-os.md rename to src/data/roadmaps/cyber-security/content/guestos@LocGETHz6ANYinNd5ZLsS.md diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/205-gwapt.md b/src/data/roadmaps/cyber-security/content/gwapt@rwniCTWfYpKP5gi02Pa9f.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/205-gwapt.md rename to src/data/roadmaps/cyber-security/content/gwapt@rwniCTWfYpKP5gi02Pa9f.md index b07abd2f4..2cdbe6065 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/205-gwapt.md +++ b/src/data/roadmaps/cyber-security/content/gwapt@rwniCTWfYpKP5gi02Pa9f.md @@ -31,4 +31,4 @@ The GWAPT certification is aimed at professionals who are involved in web applic - Enhances your professional credibility and marketability in the cybersecurity industry. - Provides a competitive edge over non-certified individuals. - Demonstrates a commitment to staying current with industry advancements and best practices. -- Assists in advancing your career by meeting employer or client requirements for certified professionals. +- Assists in advancing your career by meeting employer or client requirements for certified professionals. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/extras/ctfs/200-hack-the-box.md b/src/data/roadmaps/cyber-security/content/hackthebox@wkuE_cChPZT2MHyGjUuU4.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/ctfs/200-hack-the-box.md rename to src/data/roadmaps/cyber-security/content/hackthebox@wkuE_cChPZT2MHyGjUuU4.md index f890513dd..76fa36cfe 100644 --- a/src/data/roadmaps/cyber-security/content/extras/ctfs/200-hack-the-box.md +++ b/src/data/roadmaps/cyber-security/content/hackthebox@wkuE_cChPZT2MHyGjUuU4.md @@ -28,4 +28,4 @@ Hack The Box is an excellent resource for anyone looking to enhance their cybers - [@official@HackTheBox website](https://www.hackthebox.com/) - [@article@HTB Academy ](https://academy.hackthebox.com/) -- [@feed@Explore top posts about Security](https://app.daily.dev/tags/security?ref=roadmapsh) +- [@feed@Explore top posts about Security](https://app.daily.dev/tags/security?ref=roadmapsh) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/101-hashing.md b/src/data/roadmaps/cyber-security/content/hashing@0UZmAECMnfioi-VeXcvg8.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/101-hashing.md rename to src/data/roadmaps/cyber-security/content/hashing@0UZmAECMnfioi-VeXcvg8.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/111-head.md b/src/data/roadmaps/cyber-security/content/head@VNmrb5Dm4UKUgL8JBfhnE.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/111-head.md rename to src/data/roadmaps/cyber-security/content/head@VNmrb5Dm4UKUgL8JBfhnE.md index 845676adb..736be2b64 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/111-head.md +++ b/src/data/roadmaps/cyber-security/content/head@VNmrb5Dm4UKUgL8JBfhnE.md @@ -58,4 +58,4 @@ head -n 5 /var/log/syslog head -n 100 /var/log/large-log-file.log ``` -In summary, the `head` command is a handy tool for preliminary analysis of log files that can save crucial time during an incident response. However, for more in-depth analysis, other tools and techniques should be employed. +In summary, the `head` command is a handy tool for preliminary analysis of log files that can save crucial time during an incident response. However, for more in-depth analysis, other tools and techniques should be employed. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md b/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/110-honeypots.md b/src/data/roadmaps/cyber-security/content/honeypots@bj5YX8zhlam0yoNckL8e4.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/110-honeypots.md rename to src/data/roadmaps/cyber-security/content/honeypots@bj5YX8zhlam0yoNckL8e4.md diff --git a/src/data/roadmaps/cyber-security/content/host-based-firwall@jWl1VWkZn3n1G2eHq6EnX.md b/src/data/roadmaps/cyber-security/content/host-based-firwall@jWl1VWkZn3n1G2eHq6EnX.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/103-host-os.md b/src/data/roadmaps/cyber-security/content/hostos@p7w3C94xjLwSMm5qA8XlL.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/103-host-os.md rename to src/data/roadmaps/cyber-security/content/hostos@p7w3C94xjLwSMm5qA8XlL.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/106-hping.md b/src/data/roadmaps/cyber-security/content/hping@Cclbt4bNfkHwFwZOvJuLK.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/106-hping.md rename to src/data/roadmaps/cyber-security/content/hping@Cclbt4bNfkHwFwZOvJuLK.md index cc0853bc4..94bacc7c5 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/106-hping.md +++ b/src/data/roadmaps/cyber-security/content/hping@Cclbt4bNfkHwFwZOvJuLK.md @@ -41,4 +41,4 @@ Here are some example commands using hping: ## Summary -In summary, hping is an invaluable tool for anyone involved in network security, administration, or auditing. Its flexibility and power make it an essential part of any cybersecurity toolkit. By understanding how to use hping effectively, you can gain valuable insights into the behavior of networks, devices, and security mechanisms, leading to a more secure and resilient infrastructure. +In summary, hping is an invaluable tool for anyone involved in network security, administration, or auditing. Its flexibility and power make it an essential part of any cybersecurity toolkit. By understanding how to use hping effectively, you can gain valuable insights into the behavior of networks, devices, and security mechanisms, leading to a more secure and resilient infrastructure. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/hr@05tH6WhToC615JTFN-TPc.md b/src/data/roadmaps/cyber-security/content/hr@05tH6WhToC615JTFN-TPc.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/104-http-https.md b/src/data/roadmaps/cyber-security/content/http--https@3Awm221OJHxXNLiL9yxfd.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/104-http-https.md rename to src/data/roadmaps/cyber-security/content/http--https@3Awm221OJHxXNLiL9yxfd.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/107-cloud-models/102-hybrid.md b/src/data/roadmaps/cyber-security/content/hybrid@ywRlTuTfh5-NHnv4ZyW1t.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/107-cloud-models/102-hybrid.md rename to src/data/roadmaps/cyber-security/content/hybrid@ywRlTuTfh5-NHnv4ZyW1t.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/100-hypervisor.md b/src/data/roadmaps/cyber-security/content/hypervisor@CIoLaRv5I3sCr9tBnZHEi.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/100-hypervisor.md rename to src/data/roadmaps/cyber-security/content/hypervisor@CIoLaRv5I3sCr9tBnZHEi.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/106-cloud-services/102-iaas.md b/src/data/roadmaps/cyber-security/content/iaas@1nPifNUm-udLChIqLC_uK.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/106-cloud-services/102-iaas.md rename to src/data/roadmaps/cyber-security/content/iaas@1nPifNUm-udLChIqLC_uK.md diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/100-icloud.md b/src/data/roadmaps/cyber-security/content/icloud@E7yfALgu9E2auOYDOTmex.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/100-icloud.md rename to src/data/roadmaps/cyber-security/content/icloud@E7yfALgu9E2auOYDOTmex.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/105-icloud.md b/src/data/roadmaps/cyber-security/content/icloud@Wqy6ki13hP5c0VhGYEhHj.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/105-icloud.md rename to src/data/roadmaps/cyber-security/content/icloud@Wqy6ki13hP5c0VhGYEhHj.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/101-identification.md b/src/data/roadmaps/cyber-security/content/identification@XsRoldaBXUSiGbvY1TjQd.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/101-identification.md rename to src/data/roadmaps/cyber-security/content/identification@XsRoldaBXUSiGbvY1TjQd.md diff --git a/src/data/roadmaps/cyber-security/content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md b/src/data/roadmaps/cyber-security/content/impersonation@ZEgxmvjWPp5NofLFz_FTJ.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/index.md b/src/data/roadmaps/cyber-security/content/index.md deleted file mode 100644 index 792d60054..000000000 --- a/src/data/roadmaps/cyber-security/content/index.md +++ /dev/null @@ -1 +0,0 @@ -# diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/103-infrared.md b/src/data/roadmaps/cyber-security/content/infrared@KsZ63c3KQLLn373c5CZnp.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/103-infrared.md rename to src/data/roadmaps/cyber-security/content/infrared@KsZ63c3KQLLn373c5CZnp.md diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/103-install-and-configure.md b/src/data/roadmaps/cyber-security/content/installation-and-configuration@02aaEP9E5tlefeGBxf_Rj.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/103-install-and-configure.md rename to src/data/roadmaps/cyber-security/content/installation-and-configuration@02aaEP9E5tlefeGBxf_Rj.md index 29377a8d7..183630014 100644 --- a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/103-install-and-configure.md +++ b/src/data/roadmaps/cyber-security/content/installation-and-configuration@02aaEP9E5tlefeGBxf_Rj.md @@ -32,4 +32,4 @@ While software configurations will vary depending on the specific application or - **Disable Unnecessary Services**: Disable any unused or unnecessary services on your systems. Unnecessary services can contribute to an increased attack surface and potential vulnerabilities. -By following these guidelines, you can establish a robust foundation for system security through proper installation and configuration. Remember that maintaining strong cybersecurity is an ongoing process that requires continuous learning and adaptation to stay ahead of evolving threats. +By following these guidelines, you can establish a robust foundation for system security through proper installation and configuration. Remember that maintaining strong cybersecurity is an ongoing process that requires continuous learning and adaptation to stay ahead of evolving threats. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/107-installing-apps.md b/src/data/roadmaps/cyber-security/content/installing-software-and-applications@Ot3LGpM-CT_nKsNqIKIye.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/107-installing-apps.md rename to src/data/roadmaps/cyber-security/content/installing-software-and-applications@Ot3LGpM-CT_nKsNqIKIye.md index 2fed603f8..fb699e8b2 100644 --- a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/107-installing-apps.md +++ b/src/data/roadmaps/cyber-security/content/installing-software-and-applications@Ot3LGpM-CT_nKsNqIKIye.md @@ -26,4 +26,4 @@ Consider installing a security app from a reputable company to protect your devi Regularly review the apps on your device and uninstall any that are no longer being used. This will not only free up storage space but also reduce potential security risks that might arise if these apps are not maintained or updated by their developers. -By following these guidelines, you can significantly increase your device's security and protect your valuable data from cyber threats. +By following these guidelines, you can significantly increase your device's security and protect your valuable data from cyber threats. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/105-ip.md b/src/data/roadmaps/cyber-security/content/ip@FdoqB2---uDAyz6xZjk_u.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/105-ip.md rename to src/data/roadmaps/cyber-security/content/ip@FdoqB2---uDAyz6xZjk_u.md index 84937345a..ac3bd7354 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/105-ip.md +++ b/src/data/roadmaps/cyber-security/content/ip@FdoqB2---uDAyz6xZjk_u.md @@ -35,4 +35,4 @@ To safeguard against IP-based threats, consider implementing the following cyber - Employ intrusion detection and prevention systems (IDPS) to monitor and counter threats. - Educate users about safe internet habits and the importance of strong, unique passwords. -Understanding IP and its associated security risks is crucial in ensuring the safe and efficient transfer of data across networks. By following best practices, you can help protect your network and devices from potential cyber threats. +Understanding IP and its associated security risks is crucial in ensuring the safe and efficient transfer of data across networks. By following best practices, you can help protect your network and devices from potential cyber threats. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/103-ipam.md b/src/data/roadmaps/cyber-security/content/ipam@hN8p5YBcSaPm-byQUIz8L.md similarity index 97% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/103-ipam.md rename to src/data/roadmaps/cyber-security/content/ipam@hN8p5YBcSaPm-byQUIz8L.md index d70396c42..cfe667b52 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/103-ipam.md +++ b/src/data/roadmaps/cyber-security/content/ipam@hN8p5YBcSaPm-byQUIz8L.md @@ -18,4 +18,4 @@ IP Address Management (IPAM) is a critical aspect of cyber security, as it helps - **Reporting and analytics:** An IPAM system can provide detailed reports on IP address usage, allocation history, and other statistics. This information can help organizations identify trends, optimize their networks, and improve overall security. -In conclusion, IPAM plays a vital role in cyber security by enabling organizations to manage and monitor their IP address spaces efficiently. Implementing a comprehensive IPAM solution can help organizations maintain secure and effective network communication, comply with policies, and prevent unauthorized access. +In conclusion, IPAM plays a vital role in cyber security by enabling organizations to manage and monitor their IP address spaces efficiently. Implementing a comprehensive IPAM solution can help organizations maintain secure and effective network communication, comply with policies, and prevent unauthorized access. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/105-ipconfig.md b/src/data/roadmaps/cyber-security/content/ipconfig@IXNGFF4sOFbQ_aND-ELK0.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/105-ipconfig.md rename to src/data/roadmaps/cyber-security/content/ipconfig@IXNGFF4sOFbQ_aND-ELK0.md index fd36c3e78..a5256fcb4 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/105-ipconfig.md +++ b/src/data/roadmaps/cyber-security/content/ipconfig@IXNGFF4sOFbQ_aND-ELK0.md @@ -28,4 +28,4 @@ To utilize `ipconfig`, open the Command Prompt (CMD) by pressing Windows Key + R - **DNS Cache Investigation:** Examine DNS cache entries as evidence of possible communication to malicious domains, or clear the DNS cache to alleviate malware behavior. - **Troubleshooting Connection Problems:** Validate network connectivity directly, from the local host or with remote hosts through tools like `ping` or `tracert`, utilizing IP addresses from `ipconfig`. -`Ipconfig` is an essential and user-friendly utility for gathering network configuration details, allowing IT professionals to respond efficiently, ensure security, and maintain the health of their computer systems during investigations or discovery tasks. +`Ipconfig` is an essential and user-friendly utility for gathering network configuration details, allowing IT professionals to respond efficiently, ensure security, and maintain the health of their computer systems during investigations or discovery tasks. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/103-ipconfig.md b/src/data/roadmaps/cyber-security/content/ipconfig@u-6xuZUyOrogh1bU4cwER.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/103-ipconfig.md rename to src/data/roadmaps/cyber-security/content/ipconfig@u-6xuZUyOrogh1bU4cwER.md diff --git a/src/data/roadmaps/cyber-security/content/ipsec@gNFVtBxSYP5Uw3o3tlJ0M.md b/src/data/roadmaps/cyber-security/content/ipsec@gNFVtBxSYP5Uw3o3tlJ0M.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/101-iptables.md b/src/data/roadmaps/cyber-security/content/iptables@jr8JlyqmN3p7Ol3_kD9AH.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/101-iptables.md rename to src/data/roadmaps/cyber-security/content/iptables@jr8JlyqmN3p7Ol3_kD9AH.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/100-iso.md b/src/data/roadmaps/cyber-security/content/iso@oRssaVG-K-JwlL6TAHhXw.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/100-iso.md rename to src/data/roadmaps/cyber-security/content/iso@oRssaVG-K-JwlL6TAHhXw.md index 1c7d2d4b7..3adf8df86 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/100-iso.md +++ b/src/data/roadmaps/cyber-security/content/iso@oRssaVG-K-JwlL6TAHhXw.md @@ -26,4 +26,4 @@ ISO/IEC 27035 is a standard for **Information Security Incident Management**. It ISO/IEC 27701 is an extension to ISO/IEC 27001 and ISO/IEC 27002 that provides a framework for managing the **privacy of personal information**. This standard helps organizations to comply with data protection laws and regulations, such as the General Data Protection Regulation (GDPR). Key elements include data minimization, data subject access, data breach notification, and third-party management. -In conclusion, the ISO has established several robust cyber security standards that organizations can adopt to protect their sensitive data and ensure business continuity. By implementing these standards, you can mitigate risks associated with cyber attacks and ensure the overall security and compliance in your organization. +In conclusion, the ISO has established several robust cyber security standards that organizations can adopt to protect their sensitive data and ensure business continuity. By implementing these standards, you can mitigate risks associated with cyber attacks and ensure the overall security and compliance in your organization. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/105-programming-knowledge/102-javascript.md b/src/data/roadmaps/cyber-security/content/javascript@2SThr6mHpX6rpW-gmsqxG.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/105-programming-knowledge/102-javascript.md rename to src/data/roadmaps/cyber-security/content/javascript@2SThr6mHpX6rpW-gmsqxG.md diff --git a/src/data/roadmaps/cyber-security/content/joe-sandbox@h__KxKa0Q74_egY7GOe-L.md b/src/data/roadmaps/cyber-security/content/joe-sandbox@h__KxKa0Q74_egY7GOe-L.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/107-jump-server.md b/src/data/roadmaps/cyber-security/content/jump-server@UF3BV1sEEOrqh5ilnfM1B.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/107-jump-server.md rename to src/data/roadmaps/cyber-security/content/jump-server@UF3BV1sEEOrqh5ilnfM1B.md diff --git a/src/data/roadmaps/cyber-security/content/kali-linux@w6wXkoLrv0_d-Ah0txUHd.md b/src/data/roadmaps/cyber-security/content/kali-linux@w6wXkoLrv0_d-Ah0txUHd.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/100-kerberos.md b/src/data/roadmaps/cyber-security/content/kerberos@lG6afUOx3jSQFxbH92otL.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/100-kerberos.md rename to src/data/roadmaps/cyber-security/content/kerberos@lG6afUOx3jSQFxbH92otL.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/102-key-exchange.md b/src/data/roadmaps/cyber-security/content/key-exchange@rmR6HJqEhHDgX55Xy5BAW.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/102-key-exchange.md rename to src/data/roadmaps/cyber-security/content/key-exchange@rmR6HJqEhHDgX55Xy5BAW.md diff --git a/src/data/roadmaps/cyber-security/content/kill-chain@7Bmp4x6gbvWMuVDdGRUGj.md b/src/data/roadmaps/cyber-security/content/kill-chain@7Bmp4x6gbvWMuVDdGRUGj.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/101-known-vs-unknown.md b/src/data/roadmaps/cyber-security/content/known-vs-unknown@HPlPGKs7NLqmBidHJkOZg.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/101-known-vs-unknown.md rename to src/data/roadmaps/cyber-security/content/known-vs-unknown@HPlPGKs7NLqmBidHJkOZg.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/101-lan.md b/src/data/roadmaps/cyber-security/content/lan@xWxusBtMEWnd-6n7oqjHz.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/101-lan.md rename to src/data/roadmaps/cyber-security/content/lan@xWxusBtMEWnd-6n7oqjHz.md index 477d0048c..445009063 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/101-lan.md +++ b/src/data/roadmaps/cyber-security/content/lan@xWxusBtMEWnd-6n7oqjHz.md @@ -36,4 +36,4 @@ Understanding LAN is crucial for maintaining a secure network environment. Since - **Regular Updates**: Keep your workstations, servers and network devices up-to-date with security patches and updates to fix vulnerabilities. - **Network Monitoring**: Use network monitoring tools to keep track of network traffic and identify potential threats or anomalies. -By understanding the components and importance of LAN, you can effectively contribute to improving your organization's cyber security posture. In the next chapter, we will discuss additional cyber security topics that you need to be familiar with. +By understanding the components and importance of LAN, you can effectively contribute to improving your organization's cyber security posture. In the next chapter, we will discuss additional cyber security topics that you need to be familiar with. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/101-ldap.md b/src/data/roadmaps/cyber-security/content/ldap@lV3swvD6QGLmD9iVfbKIF.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/101-ldap.md rename to src/data/roadmaps/cyber-security/content/ldap@lV3swvD6QGLmD9iVfbKIF.md diff --git a/src/data/roadmaps/cyber-security/content/ldaps@z_fDvTgKw51Uepo6eMQd9.md b/src/data/roadmaps/cyber-security/content/ldaps@z_fDvTgKw51Uepo6eMQd9.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-malware-and-types.md b/src/data/roadmaps/cyber-security/content/learn-how-malware-works-and-types@v7CD_sHqLWbm9ibXXESIK.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-malware-and-types.md rename to src/data/roadmaps/cyber-security/content/learn-how-malware-works-and-types@v7CD_sHqLWbm9ibXXESIK.md diff --git a/src/data/roadmaps/cyber-security/content/legal@C5bCIdPi0gGkY_r4qqoXZ.md b/src/data/roadmaps/cyber-security/content/legal@C5bCIdPi0gGkY_r4qqoXZ.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/105-lessons-learned.md b/src/data/roadmaps/cyber-security/content/lessons-learned@ErRol7AT02HTn3umsPD_0.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/105-lessons-learned.md rename to src/data/roadmaps/cyber-security/content/lessons-learned@ErRol7AT02HTn3umsPD_0.md diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/101-linux.md b/src/data/roadmaps/cyber-security/content/linux@4frVcjYI1VlVU9hQgpwcT.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/101-linux.md rename to src/data/roadmaps/cyber-security/content/linux@4frVcjYI1VlVU9hQgpwcT.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/104-local-auth.md b/src/data/roadmaps/cyber-security/content/local-auth@vYvFuz7lAJXZ1vK_4999a.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/104-local-auth.md rename to src/data/roadmaps/cyber-security/content/local-auth@vYvFuz7lAJXZ1vK_4999a.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/101-localhost.md b/src/data/roadmaps/cyber-security/content/localhost@0TWwox-4pSwuXojI8ixFO.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/101-localhost.md rename to src/data/roadmaps/cyber-security/content/localhost@0TWwox-4pSwuXojI8ixFO.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/tools-for-unintended-purposes/100-lolbas.md b/src/data/roadmaps/cyber-security/content/lolbas@10qbxX8DCrfyH7tgYexxQ.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/tools-for-unintended-purposes/100-lolbas.md rename to src/data/roadmaps/cyber-security/content/lolbas@10qbxX8DCrfyH7tgYexxQ.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/102-loopback.md b/src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/102-loopback.md rename to src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/100-mac-based.md b/src/data/roadmaps/cyber-security/content/mac-based@OAukNfV5T0KTnIF9jKYRF.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/100-mac-based.md rename to src/data/roadmaps/cyber-security/content/mac-based@OAukNfV5T0KTnIF9jKYRF.md diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/102-macos.md b/src/data/roadmaps/cyber-security/content/macos@dztwr-DSckggQbcNIi4_2.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/102-macos.md rename to src/data/roadmaps/cyber-security/content/macos@dztwr-DSckggQbcNIi4_2.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/100-man.md b/src/data/roadmaps/cyber-security/content/man@LrwTMH_1fTd8iB9wJg-0t.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/100-man.md rename to src/data/roadmaps/cyber-security/content/man@LrwTMH_1fTd8iB9wJg-0t.md index bfb68ffa6..2ae60dee4 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/100-man.md +++ b/src/data/roadmaps/cyber-security/content/man@LrwTMH_1fTd8iB9wJg-0t.md @@ -11,7 +11,7 @@ Some examples of Metropolitan Area Networks **(MANs)** include: 3. **City-Wide Wi-Fi Networks:** Some cities have established their own Wi-Fi networks to provide internet access to residents and businesses, creating a MAN that covers the entire city. 4. **Public Transportation Networks:** Some metropolitan areas have implemented MANs to provide internet connectivity on public transportation networks such as buses and trains. -## Advantages of MAN +## Advantages of MAN - **Improved Connectivity:** MANs provide a high-speed and reliable means of communication between different locations within a metropolitan area, facilitating efficient data exchange and collaboration among organizations, businesses, and individuals. @@ -29,4 +29,4 @@ Some examples of Metropolitan Area Networks **(MANs)** include: - **Limited Coverage:** MANs are typically limited to metropolitan areas, and their coverage may not extend to remote or rural areas outside the metropolitan region, which can pose connectivity challenges for organizations located in those areas. -- **Vulnerability to Single Point of Failure:** Since MANs are centralized networks, they are susceptible to a single point of failure, such as a failure in the main network node, which can disrupt the entire network and impact communication and data exchange among connected locations. +- **Vulnerability to Single Point of Failure:** Since MANs are centralized networks, they are susceptible to a single point of failure, such as a failure in the main network node, which can disrupt the entire network and impact communication and data exchange among connected locations. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/management@s9tHpzYRj2HCImwQhnjFM.md b/src/data/roadmaps/cyber-security/content/management@s9tHpzYRj2HCImwQhnjFM.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/116-memdump.md b/src/data/roadmaps/cyber-security/content/memdump@wspNQPmqWRjKoFm6x_bVw.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/116-memdump.md rename to src/data/roadmaps/cyber-security/content/memdump@wspNQPmqWRjKoFm6x_bVw.md index 9bfd34db5..490c670a2 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/116-memdump.md +++ b/src/data/roadmaps/cyber-security/content/memdump@wspNQPmqWRjKoFm6x_bVw.md @@ -23,4 +23,4 @@ Remember that Memdump should always be executed with administrator privileges so ## Conclusion -Memdump is a powerful forensic tool that can greatly assist you in conducting an incident response or discovery process. By capturing and analyzing a system's memory, you can identify threats, gather evidence, and ultimately enhance your overall cyber security posture. +Memdump is a powerful forensic tool that can greatly assist you in conducting an incident response or discovery process. By capturing and analyzing a system's memory, you can identify threats, gather evidence, and ultimately enhance your overall cyber security posture. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/memory-leak@nOND14t7ISgSH3zNpV3F8.md b/src/data/roadmaps/cyber-security/content/memory-leak@nOND14t7ISgSH3zNpV3F8.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/102-mesh-topology.md b/src/data/roadmaps/cyber-security/content/mesh@PYeF15e7iVB9seFrrO7W6.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/102-mesh-topology.md rename to src/data/roadmaps/cyber-security/content/mesh@PYeF15e7iVB9seFrrO7W6.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/114-mfa-2fa.md b/src/data/roadmaps/cyber-security/content/mfa--2fa@pnfVrOjDeG1uYAeqHxhJP.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/114-mfa-2fa.md rename to src/data/roadmaps/cyber-security/content/mfa--2fa@pnfVrOjDeG1uYAeqHxhJP.md diff --git a/src/data/roadmaps/cyber-security/content/mitm@ODlVT6MhV-RVUbRMG0mHi.md b/src/data/roadmaps/cyber-security/content/mitm@ODlVT6MhV-RVUbRMG0mHi.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/102-ms-office-suite.md b/src/data/roadmaps/cyber-security/content/ms-office-suite@-5haJATqlmj0SFSFAqN6A.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/102-ms-office-suite.md rename to src/data/roadmaps/cyber-security/content/ms-office-suite@-5haJATqlmj0SFSFAqN6A.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/101-nac-based.md b/src/data/roadmaps/cyber-security/content/nac-based@6oAzYfwsHQYNVbi7c2Tly.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/101-nac-based.md rename to src/data/roadmaps/cyber-security/content/nac-based@6oAzYfwsHQYNVbi7c2Tly.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/104-nat.md b/src/data/roadmaps/cyber-security/content/nat@Kkd3f_0OYNCdpDgrJ-_Ju.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/104-nat.md rename to src/data/roadmaps/cyber-security/content/nat@Kkd3f_0OYNCdpDgrJ-_Ju.md index b82036430..ec9529f81 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/104-nat.md +++ b/src/data/roadmaps/cyber-security/content/nat@Kkd3f_0OYNCdpDgrJ-_Ju.md @@ -22,4 +22,4 @@ NAT is implemented on a router, firewall or a similar networking device. When de - **Performance impact:** The translation process may introduce latency and reduce performance in high-traffic networks. - **End-to-End Connectivity:** NAT generally breaks the end-to-end communication model of the internet, which can cause issues in some scenarios. -In summary, NAT plays a crucial role in modern cybersecurity by conserving IP addresses, obscuring internal networks and providing a level of security against external threats. While there are some disadvantages, its benefits make it an essential component in network security. +In summary, NAT plays a crucial role in modern cybersecurity by conserving IP addresses, obscuring internal networks and providing a level of security against external threats. While there are some disadvantages, its benefits make it an essential component in network security. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/105-navigating-using-gui-and-cli.md b/src/data/roadmaps/cyber-security/content/navigating-using-gui-and-cli@MGitS_eJBoY99zOR-W3F4.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/105-navigating-using-gui-and-cli.md rename to src/data/roadmaps/cyber-security/content/navigating-using-gui-and-cli@MGitS_eJBoY99zOR-W3F4.md index a5443b7a4..eb4530083 100644 --- a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/105-navigating-using-gui-and-cli.md +++ b/src/data/roadmaps/cyber-security/content/navigating-using-gui-and-cli@MGitS_eJBoY99zOR-W3F4.md @@ -34,4 +34,4 @@ A Command Line Interface (CLI) is a text-based interface that allows users to in By understanding how to navigate and use both GUI and CLI, you will be better equipped to manage and secure your computer systems and network devices, as well as perform various cyber security tasks that may require a combination of these interfaces. It is essential to be familiar with both methods, as some tasks may require the precision and control offered by CLI, while others may be more efficiently performed using a GUI. -In the following sections, we will discuss some common CLI tools and their usage, along with how to secure and manage your computer systems and network devices using these interfaces. Stay tuned! +In the following sections, we will discuss some common CLI tools and their usage, along with how to secure and manage your computer systems and network devices using these interfaces. Stay tuned! \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/netflow@xXz-SwvXA2cLfdCd-hLtW.md b/src/data/roadmaps/cyber-security/content/netflow@xXz-SwvXA2cLfdCd-hLtW.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/104-netstat.md b/src/data/roadmaps/cyber-security/content/netstat@2M3PRbGzo14agbEPe32ww.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/104-netstat.md rename to src/data/roadmaps/cyber-security/content/netstat@2M3PRbGzo14agbEPe32ww.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/index.md b/src/data/roadmaps/cyber-security/content/networking-knowledge@gSLr-Lc119eX9Ig-kDzJ2.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/index.md rename to src/data/roadmaps/cyber-security/content/networking-knowledge@gSLr-Lc119eX9Ig-kDzJ2.md diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md b/src/data/roadmaps/cyber-security/content/nfc@hwAUFLYpc_ftCfXq95dey.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md rename to src/data/roadmaps/cyber-security/content/nfc@hwAUFLYpc_ftCfXq95dey.md diff --git a/src/data/roadmaps/cyber-security/content/nids@LIPtxl_oKZRcbvXT4EdNf.md b/src/data/roadmaps/cyber-security/content/nids@LIPtxl_oKZRcbvXT4EdNf.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/nips@7w9qj16OD4pUzq-ItdxeK.md b/src/data/roadmaps/cyber-security/content/nips@7w9qj16OD4pUzq-ItdxeK.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/101-nist.md b/src/data/roadmaps/cyber-security/content/nist@SOkJUTd1NUKSwYMIprv4m.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/101-nist.md rename to src/data/roadmaps/cyber-security/content/nist@SOkJUTd1NUKSwYMIprv4m.md index 5f96e5b97..fac96a7e6 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/101-nist.md +++ b/src/data/roadmaps/cyber-security/content/nist@SOkJUTd1NUKSwYMIprv4m.md @@ -33,4 +33,4 @@ The [NIST Risk Management Framework](https://csrc.nist.gov/projects/risk-managem - Authorize Information Systems - Monitor Security Controls -By following NIST cyber security standards, organizations can reduce their vulnerability to cyber-attacks and enhance their overall security posture. +By following NIST cyber security standards, organizations can reduce their vulnerability to cyber-attacks and enhance their overall security posture. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/100-nmap.md b/src/data/roadmaps/cyber-security/content/nmap@Hoou7kWyfB2wx_yFHug_H.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/100-nmap.md rename to src/data/roadmaps/cyber-security/content/nmap@Hoou7kWyfB2wx_yFHug_H.md index e5ab00392..3e04664df 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/100-nmap.md +++ b/src/data/roadmaps/cyber-security/content/nmap@Hoou7kWyfB2wx_yFHug_H.md @@ -34,4 +34,4 @@ Nmap is available for download on Windows, Linux, and macOS. You can download th ## Conclusion -Understanding and using Nmap is an essential skill for any cyber security professional or network administrator. With its wide range of features and capabilities, it provides invaluable information about your network infrastructure, enabling you to detect vulnerabilities and improve overall security. Regularly monitoring your network with Nmap and other incident response and discovery tools is a critical aspect of maintaining a strong cyber security posture. +Understanding and using Nmap is an essential skill for any cyber security professional or network administrator. With its wide range of features and capabilities, it provides invaluable information about your network infrastructure, enabling you to detect vulnerabilities and improve overall security. Regularly monitoring your network with Nmap and other incident response and discovery tools is a critical aspect of maintaining a strong cyber security posture. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/110-nmap.md b/src/data/roadmaps/cyber-security/content/nmap@xqwIEyGfdZFxk6QqbPswe.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/110-nmap.md rename to src/data/roadmaps/cyber-security/content/nmap@xqwIEyGfdZFxk6QqbPswe.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/102-nslookup.md b/src/data/roadmaps/cyber-security/content/nslookup@OUarb1oS1-PX_3OXNR0rV.md similarity index 97% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/102-nslookup.md rename to src/data/roadmaps/cyber-security/content/nslookup@OUarb1oS1-PX_3OXNR0rV.md index 73f4a928b..3ade829d2 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/102-nslookup.md +++ b/src/data/roadmaps/cyber-security/content/nslookup@OUarb1oS1-PX_3OXNR0rV.md @@ -41,4 +41,4 @@ Some alternatives to NSLookup include: ## Conclusion -In summary, NSLookup is a handy DNS query tool for network administrators and users alike. It offers the basic functionality for finding associated domain names, IP addresses, and other DNS data while being simple to use. However, for more advanced needs, you should consider using alternatives like dig or host. +In summary, NSLookup is a handy DNS query tool for network administrators and users alike. It offers the basic functionality for finding associated domain names, IP addresses, and other DNS data while being simple to use. However, for more advanced needs, you should consider using alternatives like dig or host. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/100-nslookup.md b/src/data/roadmaps/cyber-security/content/nslookup@tk4iG5i1Ml9w9KRO1tGJU.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/100-nslookup.md rename to src/data/roadmaps/cyber-security/content/nslookup@tk4iG5i1Ml9w9KRO1tGJU.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/102-ntp.md b/src/data/roadmaps/cyber-security/content/ntp@tf0TymdPHbplDHvuVIIh4.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/102-ntp.md rename to src/data/roadmaps/cyber-security/content/ntp@tf0TymdPHbplDHvuVIIh4.md index eaa6ca4f7..6b036b2d7 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/functions-of-each/102-ntp.md +++ b/src/data/roadmaps/cyber-security/content/ntp@tf0TymdPHbplDHvuVIIh4.md @@ -22,4 +22,4 @@ While NTP is essential for maintaining accurate time synchronization across a ne - **Time Spoofing**: An attacker can manipulate NTP traffic to alter the time on client devices, potentially causing authentication failures or allowing unauthorized access. Use authentication keys with NTP to ensure the integrity of time updates by verifying the server's identity. - **Untrusted Servers**: Obtain time from a reliable time source to prevent tampering. Always configure clients to use trusted NTP servers, like pool.ntp.org, which provides access to a global group of well-maintained NTP servers. -By understanding and implementing these crucial aspects of NTP, you can improve the overall security posture of your network by ensuring accurate time synchronization across all systems. +By understanding and implementing these crucial aspects of NTP, you can improve the overall security posture of your network by ensuring accurate time synchronization across all systems. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/105-obfuscation.md b/src/data/roadmaps/cyber-security/content/obfuscation@kxlg6rpfqqoBfmMMg3EkJ.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/105-obfuscation.md rename to src/data/roadmaps/cyber-security/content/obfuscation@kxlg6rpfqqoBfmMMg3EkJ.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/103-one-drive.md b/src/data/roadmaps/cyber-security/content/onedrive@MWqnhDKm9jXvDDjkeVNxm.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/103-one-drive.md rename to src/data/roadmaps/cyber-security/content/onedrive@MWqnhDKm9jXvDDjkeVNxm.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/112-os-hardening.md b/src/data/roadmaps/cyber-security/content/operating-system-hardening@_S25EOGS3P8647zLM5i-g.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/112-os-hardening.md rename to src/data/roadmaps/cyber-security/content/operating-system-hardening@_S25EOGS3P8647zLM5i-g.md diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/index.md b/src/data/roadmaps/cyber-security/content/operating-systems@UY6xdt_V3YMkZxZ1hZLvW.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/index.md rename to src/data/roadmaps/cyber-security/content/operating-systems@UY6xdt_V3YMkZxZ1hZLvW.md diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/102-os-independent-troubleshooting.md b/src/data/roadmaps/cyber-security/content/os-independent-troubleshooting@pJUhQin--BGMuXHPwx3JJ.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/102-os-independent-troubleshooting.md rename to src/data/roadmaps/cyber-security/content/os-independent-troubleshooting@pJUhQin--BGMuXHPwx3JJ.md diff --git a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/207-oscp.md b/src/data/roadmaps/cyber-security/content/oscp@SwVGVP2bbCFs2uNg9Qtxb.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/207-oscp.md rename to src/data/roadmaps/cyber-security/content/oscp@SwVGVP2bbCFs2uNg9Qtxb.md index f835b4864..cab9c8fb6 100644 --- a/src/data/roadmaps/cyber-security/content/extras/certifications/advanced-certifications/207-oscp.md +++ b/src/data/roadmaps/cyber-security/content/oscp@SwVGVP2bbCFs2uNg9Qtxb.md @@ -33,4 +33,4 @@ Before attempting the exam, candidates must complete the accompanying training c - **Career Advancement:** With the OSCP certification, you can demonstrate your advanced skills in offensive security techniques, making you a valuable asset to any security team and potentially opening up opportunities for career growth, higher salaries, and challenging roles in the industry. - **Continuous Learning:** Pursuing the OSCP certification will help you develop a deeper understanding of underlying vulnerabilities and attack vectors. This knowledge, combined with constantly evolving offensive security techniques, ensures that you stay ahead in the ever-changing cybersecurity landscape. -Obtaining the OSCP certification can be a challenging and rewarding journey that provides you with practical skills and industry recognition, enabling you to stand out as a cybersecurity professional and advance your career in the field. +Obtaining the OSCP certification can be a challenging and rewarding journey that provides you with practical skills and industry recognition, enabling you to stand out as a cybersecurity professional and advance your career in the field. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/106-cloud-services/101-paas.md b/src/data/roadmaps/cyber-security/content/paas@PQ_np6O-4PK2V-r5lywQg.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/106-cloud-services/101-paas.md rename to src/data/roadmaps/cyber-security/content/paas@PQ_np6O-4PK2V-r5lywQg.md diff --git a/src/data/roadmaps/cyber-security/content/packet-captures@TIxEkfBrN6EXQ3IKP1B7u.md b/src/data/roadmaps/cyber-security/content/packet-captures@TIxEkfBrN6EXQ3IKP1B7u.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/102-packet-sniffers.md b/src/data/roadmaps/cyber-security/content/packet-sniffers@k6UX0BJho5arjGD2RWPgH.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/102-packet-sniffers.md rename to src/data/roadmaps/cyber-security/content/packet-sniffers@k6UX0BJho5arjGD2RWPgH.md diff --git a/src/data/roadmaps/cyber-security/content/parrotos@zR6djXnfTSFVEfvJonQjf.md b/src/data/roadmaps/cyber-security/content/parrotos@zR6djXnfTSFVEfvJonQjf.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md b/src/data/roadmaps/cyber-security/content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/106-patching.md b/src/data/roadmaps/cyber-security/content/patching@e-MDyUR3GEv-e4Qsx_5vV.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/106-patching.md rename to src/data/roadmaps/cyber-security/content/patching@e-MDyUR3GEv-e4Qsx_5vV.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/120-penetration-rules-of-engagement.md b/src/data/roadmaps/cyber-security/content/penetration-testing-rules-of-engagement@NkAAQikwH-A6vrF8fWpuB.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/120-penetration-rules-of-engagement.md rename to src/data/roadmaps/cyber-security/content/penetration-testing-rules-of-engagement@NkAAQikwH-A6vrF8fWpuB.md diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/108-performing-crud-on-files.md b/src/data/roadmaps/cyber-security/content/performing-crud-on-files@zRXyoJMap9irOYo3AdHE8.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/108-performing-crud-on-files.md rename to src/data/roadmaps/cyber-security/content/performing-crud-on-files@zRXyoJMap9irOYo3AdHE8.md index 231b635b6..643c3dac5 100644 --- a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/108-performing-crud-on-files.md +++ b/src/data/roadmaps/cyber-security/content/performing-crud-on-files@zRXyoJMap9irOYo3AdHE8.md @@ -59,4 +59,4 @@ When working with files in any system or application, understanding and performi rm /example/example.txt ``` -By mastering these CRUD operations, you can enhance your cyber security knowledge and implement effective incident response and file management strategies. +By mastering these CRUD operations, you can enhance your cyber security knowledge and implement effective incident response and file management strategies. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/119-perimiter-dmz-segmentation.md b/src/data/roadmaps/cyber-security/content/perimiter-vs-dmz-vs-segmentation@PUgPgpKio4Npzs86qEXa7.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/119-perimiter-dmz-segmentation.md rename to src/data/roadmaps/cyber-security/content/perimiter-vs-dmz-vs-segmentation@PUgPgpKio4Npzs86qEXa7.md diff --git a/src/data/roadmaps/cyber-security/content/phishing@7obusm5UtHwWMcMMEB3lt.md b/src/data/roadmaps/cyber-security/content/phishing@7obusm5UtHwWMcMMEB3lt.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/extras/ctfs/203-pico-ctf.md b/src/data/roadmaps/cyber-security/content/picoctf@pou5xHwnz9Zsy5J6lNlKq.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/ctfs/203-pico-ctf.md rename to src/data/roadmaps/cyber-security/content/picoctf@pou5xHwnz9Zsy5J6lNlKq.md index 2b20313c5..5fa487db9 100644 --- a/src/data/roadmaps/cyber-security/content/extras/ctfs/203-pico-ctf.md +++ b/src/data/roadmaps/cyber-security/content/picoctf@pou5xHwnz9Zsy5J6lNlKq.md @@ -14,4 +14,4 @@ - **Open for All Ages**: The competition is open to individuals of all ages, with a focus on students in middle and high school in order to cultivate the next generation of cybersecurity professionals. -In conclusion, PicoCTF is an excellent platform for beginners to start learning about cybersecurity, as well as for experienced individuals looking to improve their skills and compete. By participating in PicoCTF, you can enhance your knowledge, engage with the cyber security community, and hone your skills in this ever-growing field. +In conclusion, PicoCTF is an excellent platform for beginners to start learning about cybersecurity, as well as for experienced individuals looking to improve their skills and compete. By participating in PicoCTF, you can enhance your knowledge, engage with the cyber security community, and hone your skills in this ever-growing field. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/106-ping.md b/src/data/roadmaps/cyber-security/content/ping@GuuY-Q6FZzfspB3wrH64r.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/106-ping.md rename to src/data/roadmaps/cyber-security/content/ping@GuuY-Q6FZzfspB3wrH64r.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/107-ping.md b/src/data/roadmaps/cyber-security/content/ping@yfTpp-ePuDB931FnvNB-Y.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/107-ping.md rename to src/data/roadmaps/cyber-security/content/ping@yfTpp-ePuDB931FnvNB-Y.md index ae140c8fd..b379a0bd0 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/107-ping.md +++ b/src/data/roadmaps/cyber-security/content/ping@yfTpp-ePuDB931FnvNB-Y.md @@ -18,4 +18,4 @@ When you issue a Ping command, your device sends out ICMP Echo Request packets t - **Blocking ICMP Traffic**: Some devices or firewalls may be configured to block ICMP traffic, making them unresponsive to Ping requests. - **False-Negative Results**: A poor network connection or heavy packet loss may result in a false-negative Ping result, incorrectly displaying the target device as unavailable. -Despite these limitations, Ping remains a useful tool in the cyber security world for network diagnostics and incident response. However, it is essential to use Ping in conjunction with other discovery tools and network analysis techniques for comprehensive network assessments. +Despite these limitations, Ping remains a useful tool in the cyber security world for network diagnostics and incident response. However, it is essential to use Ping in conjunction with other discovery tools and network analysis techniques for comprehensive network assessments. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/103-pki.md b/src/data/roadmaps/cyber-security/content/pki@fxyJxrf3mnFTa3wXk1MCW.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/103-pki.md rename to src/data/roadmaps/cyber-security/content/pki@fxyJxrf3mnFTa3wXk1MCW.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/102-port-blocking.md b/src/data/roadmaps/cyber-security/content/port-blocking@W7bcydXdwlubXF2PHKOuq.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/102-port-blocking.md rename to src/data/roadmaps/cyber-security/content/port-blocking@W7bcydXdwlubXF2PHKOuq.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/105-port-scanners.md b/src/data/roadmaps/cyber-security/content/port-scanners@iJRQHzh5HXADuWpCouwxv.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/105-port-scanners.md rename to src/data/roadmaps/cyber-security/content/port-scanners@iJRQHzh5HXADuWpCouwxv.md diff --git a/src/data/roadmaps/cyber-security/content/105-programming-knowledge/105-power-shell.md b/src/data/roadmaps/cyber-security/content/power-shell@paY9x2VJA98FNGBFGRXp2.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/105-programming-knowledge/105-power-shell.md rename to src/data/roadmaps/cyber-security/content/power-shell@paY9x2VJA98FNGBFGRXp2.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/100-preparation.md b/src/data/roadmaps/cyber-security/content/preparation@w6V4JOtXKCMPAkKIQxvMg.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/100-preparation.md rename to src/data/roadmaps/cyber-security/content/preparation@w6V4JOtXKCMPAkKIQxvMg.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/104-private-vs-public-key.md b/src/data/roadmaps/cyber-security/content/private-vs-public-keys@7svh9qaaPp0Hz23yinIye.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/104-private-vs-public-key.md rename to src/data/roadmaps/cyber-security/content/private-vs-public-keys@7svh9qaaPp0Hz23yinIye.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/107-cloud-models/100-private.md b/src/data/roadmaps/cyber-security/content/private@ecpMKP1cQXXsfKETDUrSf.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/107-cloud-models/100-private.md rename to src/data/roadmaps/cyber-security/content/private@ecpMKP1cQXXsfKETDUrSf.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-privilege-escalation-attacks.md b/src/data/roadmaps/cyber-security/content/privilege-escalation@cvI8-sxY5i8lpelW9iY_5.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-privilege-escalation-attacks.md rename to src/data/roadmaps/cyber-security/content/privilege-escalation@cvI8-sxY5i8lpelW9iY_5.md diff --git a/src/data/roadmaps/cyber-security/content/105-programming-knowledge/index.md b/src/data/roadmaps/cyber-security/content/programming-skills-optional-but-recommended@_RnuQ7952N8GWZfPD60sJ.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/105-programming-knowledge/index.md rename to src/data/roadmaps/cyber-security/content/programming-skills-optional-but-recommended@_RnuQ7952N8GWZfPD60sJ.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/109-protocol-analyzers.md b/src/data/roadmaps/cyber-security/content/protocol-analyzers@K05mEAsjImyPge0hDtsU0.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/109-protocol-analyzers.md rename to src/data/roadmaps/cyber-security/content/protocol-analyzers@K05mEAsjImyPge0hDtsU0.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/104-proxmox.md b/src/data/roadmaps/cyber-security/content/proxmax@jqX1A5hFF3Qznqup4lfiF.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/104-proxmox.md rename to src/data/roadmaps/cyber-security/content/proxmax@jqX1A5hFF3Qznqup4lfiF.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/100-public-vs-private-ip-addresses.md b/src/data/roadmaps/cyber-security/content/public-vs-private-ip-addresses@2nQfhnvBjJg1uDZ28aE4v.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/100-public-vs-private-ip-addresses.md rename to src/data/roadmaps/cyber-security/content/public-vs-private-ip-addresses@2nQfhnvBjJg1uDZ28aE4v.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/107-cloud-models/101-public.md b/src/data/roadmaps/cyber-security/content/public@ZDj7KBuyZsKyEMZViMoXW.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/107-cloud-models/101-public.md rename to src/data/roadmaps/cyber-security/content/public@ZDj7KBuyZsKyEMZViMoXW.md diff --git a/src/data/roadmaps/cyber-security/content/105-programming-knowledge/100-python.md b/src/data/roadmaps/cyber-security/content/python@XiHvGy--OkPFfJeKA6-LP.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/105-programming-knowledge/100-python.md rename to src/data/roadmaps/cyber-security/content/python@XiHvGy--OkPFfJeKA6-LP.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/105-radius.md b/src/data/roadmaps/cyber-security/content/radius@tH3RLnJseqOzRIbZMklHD.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/105-radius.md rename to src/data/roadmaps/cyber-security/content/radius@tH3RLnJseqOzRIbZMklHD.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/101-rdp.md b/src/data/roadmaps/cyber-security/content/rdp@Ia6M1FKPNpqLDiWx7CwDh.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/101-rdp.md rename to src/data/roadmaps/cyber-security/content/rdp@Ia6M1FKPNpqLDiWx7CwDh.md diff --git a/src/data/roadmaps/cyber-security/content/reconnaissance@UU_inxa8Y2lLP2BRhdLDT.md b/src/data/roadmaps/cyber-security/content/reconnaissance@UU_inxa8Y2lLP2BRhdLDT.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/104-recovery.md b/src/data/roadmaps/cyber-security/content/recovery@vFjbZAJq8OfLb3_tsc7oT.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/104-recovery.md rename to src/data/roadmaps/cyber-security/content/recovery@vFjbZAJq8OfLb3_tsc7oT.md diff --git a/src/data/roadmaps/cyber-security/content/replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md b/src/data/roadmaps/cyber-security/content/replay-attack@mIX8PsIGuwgPCGQZ6ok2H.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/101-ring-topology.md b/src/data/roadmaps/cyber-security/content/ring@9vEUVJ8NTh0wKyIE6-diY.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/101-ring-topology.md rename to src/data/roadmaps/cyber-security/content/ring@9vEUVJ8NTh0wKyIE6-diY.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/102-rmf.md b/src/data/roadmaps/cyber-security/content/rmf@fjEdufrZAfW4Rl6yDU8Hk.md similarity index 97% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/102-rmf.md rename to src/data/roadmaps/cyber-security/content/rmf@fjEdufrZAfW4Rl6yDU8Hk.md index 32dc87704..165077d05 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/102-rmf.md +++ b/src/data/roadmaps/cyber-security/content/rmf@fjEdufrZAfW4Rl6yDU8Hk.md @@ -21,4 +21,4 @@ The RMF consists of six steps, which are continuously repeated to ensure the con - **Accountability**: It promotes transparency and clear assignment of responsibilities for managing risks. - **Continuous improvement**: By monitoring and revisiting the risks and security controls, organizations can ensure that their cybersecurity posture remains effective and up-to-date. -In summary, the Risk Management Framework (RMF) is a vital component of an organization's cybersecurity strategy. By following the structured and continuous process outlined in the RMF, organizations can effectively manage the cybersecurity risks they face and maintain a robust and resilient cybersecurity posture. +In summary, the Risk Management Framework (RMF) is a vital component of an organization's cybersecurity strategy. By following the structured and continuous process outlined in the RMF, organizations can effectively manage the cybersecurity risks they face and maintain a robust and resilient cybersecurity posture. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md b/src/data/roadmaps/cyber-security/content/rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/117-compliance-and-auditors.md b/src/data/roadmaps/cyber-security/content/roles-of-compliance-and-auditors@kqT0FRLt9Ak9P8PhHldO-.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/117-compliance-and-auditors.md rename to src/data/roadmaps/cyber-security/content/roles-of-compliance-and-auditors@kqT0FRLt9Ak9P8PhHldO-.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/111-route.md b/src/data/roadmaps/cyber-security/content/route@xFuWk7M-Vctk_xb7bHbWs.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/111-route.md rename to src/data/roadmaps/cyber-security/content/route@xFuWk7M-Vctk_xb7bHbWs.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/108-router.md b/src/data/roadmaps/cyber-security/content/router@lwSFIbIX-xOZ0QK2sGFb1.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/108-router.md rename to src/data/roadmaps/cyber-security/content/router@lwSFIbIX-xOZ0QK2sGFb1.md index 139d956fa..90586e5fd 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/108-router.md +++ b/src/data/roadmaps/cyber-security/content/router@lwSFIbIX-xOZ0QK2sGFb1.md @@ -30,4 +30,4 @@ As routers are a critical gateway between your network and the internet, it's es - Create a guest network: If your router supports it, create a separate network for guests to use. This isolates them from your primary network, ensuring that they cannot access your devices or data. -By understanding routers and their role in cybersecurity, you can take the necessary steps to secure your network and protect your data. +By understanding routers and their role in cybersecurity, you can take the necessary steps to secure your network and protect your data. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/100-s3.md b/src/data/roadmaps/cyber-security/content/s3@2jsTgT7k8MeaDtx6RJhOP.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/109-common-cloud-storage/100-s3.md rename to src/data/roadmaps/cyber-security/content/s3@2jsTgT7k8MeaDtx6RJhOP.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/106-cloud-services/100-saas.md b/src/data/roadmaps/cyber-security/content/saas@sVw5KVNxPEatBRKb2ZbS_.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/106-cloud-services/100-saas.md rename to src/data/roadmaps/cyber-security/content/saas@sVw5KVNxPEatBRKb2ZbS_.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/100-salting.md b/src/data/roadmaps/cyber-security/content/salting@jqWhR6oTyX6yolUBv71VC.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/100-salting.md rename to src/data/roadmaps/cyber-security/content/salting@jqWhR6oTyX6yolUBv71VC.md diff --git a/src/data/roadmaps/cyber-security/content/sandboxing@SLKwuLHHpC7D1FqrpPRAe.md b/src/data/roadmaps/cyber-security/content/sandboxing@SLKwuLHHpC7D1FqrpPRAe.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/extras/ctfs/204-sans-holiday-hack-challenge.md b/src/data/roadmaps/cyber-security/content/sans-holiday-hack-challenge@WCeJrvWl837m1BIjuA1Mu.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/ctfs/204-sans-holiday-hack-challenge.md rename to src/data/roadmaps/cyber-security/content/sans-holiday-hack-challenge@WCeJrvWl837m1BIjuA1Mu.md index f631f1bc5..557382f90 100644 --- a/src/data/roadmaps/cyber-security/content/extras/ctfs/204-sans-holiday-hack-challenge.md +++ b/src/data/roadmaps/cyber-security/content/sans-holiday-hack-challenge@WCeJrvWl837m1BIjuA1Mu.md @@ -35,4 +35,4 @@ The SANs Holiday Hack Challenge is a valuable experience for people with an inte In conclusion, the SANs Holiday Hack Challenge offers a unique opportunity to develop your cybersecurity skills in a fun and challenging environment. Whether you are new to the field or an industry veteran, participating in this event will help you grow professionally and make valuable connections in the cybersecurity community. Don't miss the next SANs Holiday Hack Challenge! - [@official@SANS Holiday Hack Challenge](https://www.sans.org/holidayhack) -- [@feed@Explore top posts about Security](https://app.daily.dev/tags/security?ref=roadmapsh) +- [@feed@Explore top posts about Security](https://app.daily.dev/tags/security?ref=roadmapsh) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/index.md b/src/data/roadmaps/cyber-security/content/security-skills-and-knowledge@_hYN0gEi9BL24nptEtXWU.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/index.md rename to src/data/roadmaps/cyber-security/content/security-skills-and-knowledge@_hYN0gEi9BL24nptEtXWU.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/103-sftp.md b/src/data/roadmaps/cyber-security/content/sftp@YEy6o-clTBKZp1yOkLwNb.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/103-sftp.md rename to src/data/roadmaps/cyber-security/content/sftp@YEy6o-clTBKZp1yOkLwNb.md diff --git a/src/data/roadmaps/cyber-security/content/shoulder-surfing@FD0bkmxNpPXiUB_NevEUf.md b/src/data/roadmaps/cyber-security/content/shoulder-surfing@FD0bkmxNpPXiUB_NevEUf.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md b/src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/105-sinkholes.md b/src/data/roadmaps/cyber-security/content/sinkholes@oFgyQYL3Ws-l7B5AF-bTR.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/105-sinkholes.md rename to src/data/roadmaps/cyber-security/content/sinkholes@oFgyQYL3Ws-l7B5AF-bTR.md diff --git a/src/data/roadmaps/cyber-security/content/smime@9rmDvycXFcsGOq3v-_ziD.md b/src/data/roadmaps/cyber-security/content/smime@9rmDvycXFcsGOq3v-_ziD.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/smishing@d4U6Jq-CUB1nNN2OCFoum.md b/src/data/roadmaps/cyber-security/content/smishing@d4U6Jq-CUB1nNN2OCFoum.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/soar@i0ulrA-GJrNhIVmzdWDrn.md b/src/data/roadmaps/cyber-security/content/soar@i0ulrA-GJrNhIVmzdWDrn.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/social-engineering@O1VceThdxRlgQ6DcGyY7Y.md b/src/data/roadmaps/cyber-security/content/social-engineering@O1VceThdxRlgQ6DcGyY7Y.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/spam-vs-spim@cbEMUyg_btIPjdx-XqIM5.md b/src/data/roadmaps/cyber-security/content/spam-vs-spim@cbEMUyg_btIPjdx-XqIM5.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/spoofing@LteSouUtAj3JWWOzcjQPl.md b/src/data/roadmaps/cyber-security/content/spoofing@LteSouUtAj3JWWOzcjQPl.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/sql-injection@P-Am25WJV8cFd_KsX7cdj.md b/src/data/roadmaps/cyber-security/content/sql-injection@P-Am25WJV8cFd_KsX7cdj.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/srtp@_9lQSG6fn69Yd9rs1pQdL.md b/src/data/roadmaps/cyber-security/content/srtp@_9lQSG6fn69Yd9rs1pQdL.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/100-ssh.md b/src/data/roadmaps/cyber-security/content/ssh@8Mog890Lj-gVBpWa05EzT.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/100-ssh.md rename to src/data/roadmaps/cyber-security/content/ssh@8Mog890Lj-gVBpWa05EzT.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/105-ssl-tls.md b/src/data/roadmaps/cyber-security/content/ssl--tls@LKK1A5-xawA7yCIAWHS8P.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/108-common-protocols/105-ssl-tls.md rename to src/data/roadmaps/cyber-security/content/ssl--tls@LKK1A5-xawA7yCIAWHS8P.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/103-ssl-and-tls-basics.md b/src/data/roadmaps/cyber-security/content/ssl-and-tls-basics@dJ0NUsODFhk52W2zZxoPh.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/103-ssl-and-tls-basics.md rename to src/data/roadmaps/cyber-security/content/ssl-and-tls-basics@dJ0NUsODFhk52W2zZxoPh.md diff --git a/src/data/roadmaps/cyber-security/content/ssl-vs-tls@6ILPXeUDDmmYRiA_gNTSr.md b/src/data/roadmaps/cyber-security/content/ssl-vs-tls@6ILPXeUDDmmYRiA_gNTSr.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/102-sso.md b/src/data/roadmaps/cyber-security/content/sso@xL32OqDKm6O043TYgVV1r.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/112-auth-methodologies/102-sso.md rename to src/data/roadmaps/cyber-security/content/sso@xL32OqDKm6O043TYgVV1r.md diff --git a/src/data/roadmaps/cyber-security/content/stakeholders@lv6fI3WeJawuCbwKtMRIh.md b/src/data/roadmaps/cyber-security/content/stakeholders@lv6fI3WeJawuCbwKtMRIh.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/100-star-topology.md b/src/data/roadmaps/cyber-security/content/star@P0ZhAXd_H-mTOMr13Ag31.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/107-network-topologies/100-star-topology.md rename to src/data/roadmaps/cyber-security/content/star@P0ZhAXd_H-mTOMr13Ag31.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/104-subnet-mask.md b/src/data/roadmaps/cyber-security/content/subnet-mask@f-v8qtweWXFY_Ryo3oYUF.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/104-subnet-mask.md rename to src/data/roadmaps/cyber-security/content/subnet-mask@f-v8qtweWXFY_Ryo3oYUF.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/109-switch.md b/src/data/roadmaps/cyber-security/content/switch@r9byGV8XuBPzoqj5ZPf2W.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/109-switch.md rename to src/data/roadmaps/cyber-security/content/switch@r9byGV8XuBPzoqj5ZPf2W.md index e61db330d..e07be7851 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/109-switch.md +++ b/src/data/roadmaps/cyber-security/content/switch@r9byGV8XuBPzoqj5ZPf2W.md @@ -16,4 +16,4 @@ Switches can be categorized into two main types: - **Unmanaged Switch:** These switches are simple plug-and-play devices that require no configuration. They are best suited for small networks or places where advanced features and customized settings are not necessary. - **Managed Switch:** These switches offer a higher level of control and customization, allowing network administrators to monitor, manage, and secure network traffic. Managed switches are typically used in enterprise-level networks or environments that require advanced security features and traffic optimization. -By understanding the role and functionality of switches within computer networks, you can better navigate the complexities of cyber security and make informed decisions for optimizing network performance and security. +By understanding the role and functionality of switches within computer networks, you can better navigate the complexities of cyber security and make informed decisions for optimizing network performance and security. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/syslogs@7oFwRkmoZom8exMDtMslX.md b/src/data/roadmaps/cyber-security/content/syslogs@7oFwRkmoZom8exMDtMslX.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/tail@762Wf_Eh-3zq69CZZiIjR.md b/src/data/roadmaps/cyber-security/content/tail@762Wf_Eh-3zq69CZZiIjR.md new file mode 100644 index 000000000..736be2b64 --- /dev/null +++ b/src/data/roadmaps/cyber-security/content/tail@762Wf_Eh-3zq69CZZiIjR.md @@ -0,0 +1,61 @@ +# head + +## Summary + +`head` is a versatile command-line utility that enables users to display the first few lines of a text file, by default it shows the first 10 lines. In case of incident response and cyber security, it is a useful tool to quickly analyze logs or configuration files while investigating potential security breaches or malware infections in a system. + +## Usage + +The basic syntax of `head` command is as follows: + +``` +head [options] [file(s)] +``` + +Where `options` are flags that could be used to modify the output and `[file(s)]` are the input file(s) for which you want to display the first few lines. + +## Examples + +- Display the first 10 lines of a file: + +``` +head myfile.txt +``` + +- You can change the number of lines to display using `-n` flag: + +``` +head -n 20 myfile.txt +``` + +- To display the first 5 lines of multiple files: + +``` +head -n 5 file1.txt file2.txt +``` + +- Another helpful flag is `-q` or `--quiet`, which avoids displaying file headers when viewing multiple files: + +``` +head -q -n 5 file1.txt file2.txt +``` + +## Application in Incident Response + +During an incident response, the `head` command helps to quickly analyze logs and files to identify potential malicious activity or errors. You can use `head` to peek into logs at the early stages of an investigation, and once you have gathered enough information, you can move on to more advanced tools to analyze the data in depth. + +For example: + +- Check the first 5 lines of the system log for any potential issues: + +``` +head -n 5 /var/log/syslog +``` + +- Analyze the beginning of a large log file without loading the entire file: + +``` +head -n 100 /var/log/large-log-file.log +``` + +In summary, the `head` command is a handy tool for preliminary analysis of log files that can save crucial time during an incident response. However, for more in-depth analysis, other tools and techniques should be employed. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/tailgating@o-keJgF9hmifQ_hUD91iN.md b/src/data/roadmaps/cyber-security/content/tailgating@o-keJgF9hmifQ_hUD91iN.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/112-tcpdump.md b/src/data/roadmaps/cyber-security/content/tcpdump@y8GaUNpaCT1Ai88wPOk6d.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/112-tcpdump.md rename to src/data/roadmaps/cyber-security/content/tcpdump@y8GaUNpaCT1Ai88wPOk6d.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/113-tracert.md b/src/data/roadmaps/cyber-security/content/tracert@cSz9Qx3PGwmhq3SSKYKfg.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/111-troubleshooting-tools/113-tracert.md rename to src/data/roadmaps/cyber-security/content/tracert@cSz9Qx3PGwmhq3SSKYKfg.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/101-tracert.md b/src/data/roadmaps/cyber-security/content/tracert@jJtS0mgCYc0wbjuXssDRO.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/101-tracert.md rename to src/data/roadmaps/cyber-security/content/tracert@jJtS0mgCYc0wbjuXssDRO.md index 1731c2e67..8d07db6e4 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/101-tracert.md +++ b/src/data/roadmaps/cyber-security/content/tracert@jJtS0mgCYc0wbjuXssDRO.md @@ -39,4 +39,4 @@ Some limitations and considerations to keep in mind when using `tracert`: - `tracert` might not be able to discover every hop in certain network configurations. - On Linux/macOS systems, the equivalent command is called `traceroute`. -Using `tracert` in incident response and discovery helps security teams analyze network path issues, locate potential bottlenecks or problematic hops, and understand network infrastructure performance. +Using `tracert` in incident response and discovery helps security teams analyze network path issues, locate potential bottlenecks or problematic hops, and understand network infrastructure performance. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/109-troubleshooting.md b/src/data/roadmaps/cyber-security/content/troubleshooting@xeRWOX1fWQDLNLWMAFTEe.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/109-troubleshooting.md rename to src/data/roadmaps/cyber-security/content/troubleshooting@xeRWOX1fWQDLNLWMAFTEe.md index 4bc83adc6..198177bc3 100644 --- a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/109-troubleshooting.md +++ b/src/data/roadmaps/cyber-security/content/troubleshooting@xeRWOX1fWQDLNLWMAFTEe.md @@ -37,4 +37,4 @@ Mastering the art of troubleshooting is essential for successful cyber security I hope this brief summary on troubleshooting has been informative and helps you further enhance your understanding of cyber security. Keep learning and good luck in your cyber security journey! -_[Your Name Here], The Cyber Security Guide Author_ +_[Your Name Here], The Cyber Security Guide Author_ \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/true-negative--true-positive@M6uwyD4ibguxytf1od-og.md b/src/data/roadmaps/cyber-security/content/true-negative--true-positive@M6uwyD4ibguxytf1od-og.md new file mode 100644 index 000000000..8ae14ed8d --- /dev/null +++ b/src/data/roadmaps/cyber-security/content/true-negative--true-positive@M6uwyD4ibguxytf1od-og.md @@ -0,0 +1,5 @@ +## True Negative / True Positive + +A true positive is an instance when security tools correctly detect and identify a threat, such as a malware or intrusion attempt. A high number of true positives indicates that a security tool is working effectively and catching potential threats as required. + +A true negative occurs when the security tool correctly identifies that there is no threat or attack in a given situation. In other words, the system does not raise an alarm when there is no attack happening. A high number of true negatives show that the security tool is not overly sensitive, generating unnecessary alerts. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/extras/ctfs/201-try-hack-me.md b/src/data/roadmaps/cyber-security/content/tryhackme@kht-L7_v-DbglMYUHuchp.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/ctfs/201-try-hack-me.md rename to src/data/roadmaps/cyber-security/content/tryhackme@kht-L7_v-DbglMYUHuchp.md index 76f5a99a1..60a95bf65 100644 --- a/src/data/roadmaps/cyber-security/content/extras/ctfs/201-try-hack-me.md +++ b/src/data/roadmaps/cyber-security/content/tryhackme@kht-L7_v-DbglMYUHuchp.md @@ -23,4 +23,4 @@ To get started with TryHackMe, follow these steps: - Follow the instructions and resources provided in the room to learn new concepts and complete the challenges. - Progress through various rooms and pathways to enhance your cybersecurity skills and knowledge. -By using TryHackMe, you'll have access to a constantly growing repository of cybersecurity challenges, tools, and resources, ensuring that you stay up-to-date with the latest developments in the field. +By using TryHackMe, you'll have access to a constantly growing repository of cybersecurity challenges, tools, and resources, ensuring that you stay up-to-date with the latest developments in the field. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/typo-squatting@0LeDwj_tMaXjQBBOUJ5CL.md b/src/data/roadmaps/cyber-security/content/typo-squatting@0LeDwj_tMaXjQBBOUJ5CL.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/115-backups-and-resiliency.md b/src/data/roadmaps/cyber-security/content/understand-backups-and-resiliency@9asy3STW4oTYYHcUazaRj.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/115-backups-and-resiliency.md rename to src/data/roadmaps/cyber-security/content/understand-backups-and-resiliency@9asy3STW4oTYYHcUazaRj.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/124-forensics.md b/src/data/roadmaps/cyber-security/content/understand-basics-of-forensics@7KLGFfco-hw7a62kXtS3d.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/124-forensics.md rename to src/data/roadmaps/cyber-security/content/understand-basics-of-forensics@7KLGFfco-hw7a62kXtS3d.md diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/index.md b/src/data/roadmaps/cyber-security/content/understand-basics-of-popular-suites@_7RjH4Goi0x6Noy6za0rP.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/index.md rename to src/data/roadmaps/cyber-security/content/understand-basics-of-popular-suites@_7RjH4Goi0x6Noy6za0rP.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-cia-triad.md b/src/data/roadmaps/cyber-security/content/understand-cia-triad@uz6ELaLEu9U4fHVfnQiOa.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-cia-triad.md rename to src/data/roadmaps/cyber-security/content/understand-cia-triad@uz6ELaLEu9U4fHVfnQiOa.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/127-common-exploit-frameworks.md b/src/data/roadmaps/cyber-security/content/understand-common-exploit-frameworks@Lg7mz4zeCToEzZBFxYuaU.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/127-common-exploit-frameworks.md rename to src/data/roadmaps/cyber-security/content/understand-common-exploit-frameworks@Lg7mz4zeCToEzZBFxYuaU.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/128-common-hacking-tools.md b/src/data/roadmaps/cyber-security/content/understand-common-hacking-tools@rzY_QsvnC1shDTPQ-til0.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/128-common-hacking-tools.md rename to src/data/roadmaps/cyber-security/content/understand-common-hacking-tools@rzY_QsvnC1shDTPQ-til0.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/126-defense-in-depth.md b/src/data/roadmaps/cyber-security/content/understand-concept-of-defense-in-depth@Rae-f9DHDZuwIwW6eRtKF.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/126-defense-in-depth.md rename to src/data/roadmaps/cyber-security/content/understand-concept-of-defense-in-depth@Rae-f9DHDZuwIwW6eRtKF.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/111-concept-of-isolation.md b/src/data/roadmaps/cyber-security/content/understand-concept-of-isolation@aDF7ZcOX9uR8l0W4aqhYn.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/111-concept-of-isolation.md rename to src/data/roadmaps/cyber-security/content/understand-concept-of-isolation@aDF7ZcOX9uR8l0W4aqhYn.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/125-runbooks.md b/src/data/roadmaps/cyber-security/content/understand-concept-of-runbooks@Ec6EairjFJLCHc7b-1xxe.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/125-runbooks.md rename to src/data/roadmaps/cyber-security/content/understand-concept-of-runbooks@Ec6EairjFJLCHc7b-1xxe.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/104-handshakes.md b/src/data/roadmaps/cyber-security/content/understand-handshakes@zQx_VUS1zRmF4zCGjJD5-.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/104-handshakes.md rename to src/data/roadmaps/cyber-security/content/understand-handshakes@zQx_VUS1zRmF4zCGjJD5-.md diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/106-understand-permissions.md b/src/data/roadmaps/cyber-security/content/understand-permissions@bTfL7cPOmBBFl-eHxUJI6.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/106-understand-permissions.md rename to src/data/roadmaps/cyber-security/content/understand-permissions@bTfL7cPOmBBFl-eHxUJI6.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/101-cloud-deployment-flow.md b/src/data/roadmaps/cyber-security/content/understand-the-basics-and-general-flow-of-deploying-in-the-cloud@XL3FVeGFDhAl_gSol6Tjt.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/101-cloud-deployment-flow.md rename to src/data/roadmaps/cyber-security/content/understand-the-basics-and-general-flow-of-deploying-in-the-cloud@XL3FVeGFDhAl_gSol6Tjt.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/103-infra-as-code.md b/src/data/roadmaps/cyber-security/content/understand-the-concept-of-infrastructure-as-cloud@RJctUpvlUJGAdwBNtDSXw.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/103-infra-as-code.md rename to src/data/roadmaps/cyber-security/content/understand-the-concept-of-infrastructure-as-cloud@RJctUpvlUJGAdwBNtDSXw.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/100-security-concept-in-the-cloud.md b/src/data/roadmaps/cyber-security/content/understand-the-concept-of-security-in-the-cloud@ThLsXkqLw--uddHz0spCH.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/100-security-concept-in-the-cloud.md rename to src/data/roadmaps/cyber-security/content/understand-the-concept-of-security-in-the-cloud@ThLsXkqLw--uddHz0spCH.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/104-concept-of-serverless.md b/src/data/roadmaps/cyber-security/content/understand-the-concept-of-serverless@-83ltMEl3le3yD68OFnTM.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/104-concept-of-serverless.md rename to src/data/roadmaps/cyber-security/content/understand-the-concept-of-serverless@-83ltMEl3le3yD68OFnTM.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/116-definition-of-risk.md b/src/data/roadmaps/cyber-security/content/understand-the-definition-of-risk@ggAja18sBUUdCfVsT0vCv.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/116-definition-of-risk.md rename to src/data/roadmaps/cyber-security/content/understand-the-definition-of-risk@ggAja18sBUUdCfVsT0vCv.md diff --git a/src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/102-cloud-vs-onpremises.md b/src/data/roadmaps/cyber-security/content/understand-the-differences-between-cloud-and-on-premises@KGjYM4Onr5GQf1Yv9IabI.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/104-cloud-skills-and-knowledge/102-cloud-vs-onpremises.md rename to src/data/roadmaps/cyber-security/content/understand-the-differences-between-cloud-and-on-premises@KGjYM4Onr5GQf1Yv9IabI.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/100-osi-model.md b/src/data/roadmaps/cyber-security/content/understand-the-osi-model@OXUd1UPPsBhNoUGLKZJGV.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/100-osi-model.md rename to src/data/roadmaps/cyber-security/content/understand-the-osi-model@OXUd1UPPsBhNoUGLKZJGV.md diff --git a/src/data/roadmaps/cyber-security/content/urlscan@lMiW2q-b72KUl-2S7M6Vb.md b/src/data/roadmaps/cyber-security/content/urlscan@lMiW2q-b72KUl-2S7M6Vb.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/urlvoid@lFt1k1Q-NlWWqyDA3gWD1.md b/src/data/roadmaps/cyber-security/content/urlvoid@lFt1k1Q-NlWWqyDA3gWD1.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/101-virtualbox.md b/src/data/roadmaps/cyber-security/content/virtualbox@vGVFhZXYOZOy4qFpLLbxp.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/101-virtualbox.md rename to src/data/roadmaps/cyber-security/content/virtualbox@vGVFhZXYOZOy4qFpLLbxp.md diff --git a/src/data/roadmaps/cyber-security/content/virustotal@rxzcAzHjzIc9lkWSw0fef.md b/src/data/roadmaps/cyber-security/content/virustotal@rxzcAzHjzIc9lkWSw0fef.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/vlan-hopping@u4hySof6if5hiONSaW-Uf.md b/src/data/roadmaps/cyber-security/content/vlan-hopping@u4hySof6if5hiONSaW-Uf.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/100-vlan.md b/src/data/roadmaps/cyber-security/content/vlan@d5Cv3EXf6OXW19yPJ4x6e.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/100-vlan.md rename to src/data/roadmaps/cyber-security/content/vlan@d5Cv3EXf6OXW19yPJ4x6e.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/101-vm.md b/src/data/roadmaps/cyber-security/content/vm@251sxqoHggQ4sZ676iX5w.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/101-vm.md rename to src/data/roadmaps/cyber-security/content/vm@251sxqoHggQ4sZ676iX5w.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/103-vm.md b/src/data/roadmaps/cyber-security/content/vm@ZTC5bLWEIQcdmowc7sk_E.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/103-vm.md rename to src/data/roadmaps/cyber-security/content/vm@ZTC5bLWEIQcdmowc7sk_E.md index 3a64b2e1b..b3677c946 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/103-vm.md +++ b/src/data/roadmaps/cyber-security/content/vm@ZTC5bLWEIQcdmowc7sk_E.md @@ -23,4 +23,4 @@ Key terminologies associated with VMs include: Understanding and effectively utilizing virtual machines plays a significant role in enhancing the security posture of an organization, allowing for agile incident response and proactive threat analysis. - [@video@Virtualization Explained](https://www.youtube.com/watch?v=UBVVq-xz5i0) -- [@feed@Explore top posts about Infrastructure](https://app.daily.dev/tags/infrastructure?ref=roadmapsh) +- [@feed@Explore top posts about Infrastructure](https://app.daily.dev/tags/infrastructure?ref=roadmapsh) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/100-vmware.md b/src/data/roadmaps/cyber-security/content/vmware@AjywuCZdBi9atGUbetlUL.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/109-virtualization-technologies/100-vmware.md rename to src/data/roadmaps/cyber-security/content/vmware@AjywuCZdBi9atGUbetlUL.md diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/110-vpn.md b/src/data/roadmaps/cyber-security/content/vpn@gTozEpxJeG1NTkVBHH-05.md similarity index 95% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/110-vpn.md rename to src/data/roadmaps/cyber-security/content/vpn@gTozEpxJeG1NTkVBHH-05.md index ca34c453b..57e9cde8d 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/110-vpn.md +++ b/src/data/roadmaps/cyber-security/content/vpn@gTozEpxJeG1NTkVBHH-05.md @@ -12,4 +12,4 @@ When you connect to a VPN, your device's IP address is replaced with the VPN ser Using a reliable VPN service is an essential part of maintaining good cyber security, especially when using public Wi-Fi networks or accessing sensitive information online. -Keep in mind, however, that not all VPNs are created equal. Make sure to do your research and choose a reputable VPN provider with a strong focus on privacy and security. Some popular and trusted VPN services include ExpressVPN, NordVPN, and CyberGhost. +Keep in mind, however, that not all VPNs are created equal. Make sure to do your research and choose a reputable VPN provider with a strong focus on privacy and security. Some popular and trusted VPN services include ExpressVPN, NordVPN, and CyberGhost. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/extras/ctfs/202-vuln-hub.md b/src/data/roadmaps/cyber-security/content/vulnhub@W94wY_otBuvVW_-EFlKA6.md similarity index 99% rename from src/data/roadmaps/cyber-security/content/extras/ctfs/202-vuln-hub.md rename to src/data/roadmaps/cyber-security/content/vulnhub@W94wY_otBuvVW_-EFlKA6.md index d9a610ccd..98cd0c883 100644 --- a/src/data/roadmaps/cyber-security/content/extras/ctfs/202-vuln-hub.md +++ b/src/data/roadmaps/cyber-security/content/vulnhub@W94wY_otBuvVW_-EFlKA6.md @@ -16,4 +16,4 @@ VulnHub also provides learning resources like walkthroughs and hints from its co VulnHub can also be a great resource to practice for Capture The Flag (CTF) challenges. Many of the virtual machines and challenges available on VulnHub mirror the type of challenges you might encounter in a CTF competition. By practicing with these VMs, you will gain valuable experience that can be applied in a competitive CTF environment. -In summary, VulnHub is an excellent platform for anyone looking to improve their cybersecurity skills and gain hands-on experience by exploiting vulnerabilities in a safe and legal environment. The range of challenge difficulty ensures that both beginners and experienced security professionals can benefit from the platform while preparing for real-world scenarios and CTF competitions. +In summary, VulnHub is an excellent platform for anyone looking to improve their cybersecurity skills and gain hands-on experience by exploiting vulnerabilities in a safe and legal environment. The range of challenge difficulty ensures that both beginners and experienced security professionals can benefit from the platform while preparing for real-world scenarios and CTF competitions. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/102-wan.md b/src/data/roadmaps/cyber-security/content/wan@vCkTJMkDXcQmwsmeNUAX5.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/102-wan.md rename to src/data/roadmaps/cyber-security/content/wan@vCkTJMkDXcQmwsmeNUAX5.md diff --git a/src/data/roadmaps/cyber-security/content/watering-hole-attack@dcvuKHq0nHgHLcLwtl4IJ.md b/src/data/roadmaps/cyber-security/content/watering-hole-attack@dcvuKHq0nHgHLcLwtl4IJ.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-owasp-top-10.md b/src/data/roadmaps/cyber-security/content/web-based-attacks-and-owasp10@fyOYVqiBqyKC4aqc6-y0q.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-owasp-top-10.md rename to src/data/roadmaps/cyber-security/content/web-based-attacks-and-owasp10@fyOYVqiBqyKC4aqc6-y0q.md diff --git a/src/data/roadmaps/cyber-security/content/whaling@KSwl6sX2W47vUmytpm8LH.md b/src/data/roadmaps/cyber-security/content/whaling@KSwl6sX2W47vUmytpm8LH.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/whishing@M65fCl72qlF0VTbGNT6du.md b/src/data/roadmaps/cyber-security/content/whishing@M65fCl72qlF0VTbGNT6du.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/whois@-RnlvUltJ9IDtH0HEnMbN.md b/src/data/roadmaps/cyber-security/content/whois@-RnlvUltJ9IDtH0HEnMbN.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/101-wifi.md b/src/data/roadmaps/cyber-security/content/wifi@fUBNKHNPXbemRYrnzH3VT.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/101-wifi.md rename to src/data/roadmaps/cyber-security/content/wifi@fUBNKHNPXbemRYrnzH3VT.md diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/100-windows.md b/src/data/roadmaps/cyber-security/content/windows@BNUKEQ4YpZmIhSPQdkHgU.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/101-operating-systems/100-windows.md rename to src/data/roadmaps/cyber-security/content/windows@BNUKEQ4YpZmIhSPQdkHgU.md diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/115-winhex.md b/src/data/roadmaps/cyber-security/content/winhex@gNan93Mg9Ym2AF3Q2gqoi.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/115-winhex.md rename to src/data/roadmaps/cyber-security/content/winhex@gNan93Mg9Ym2AF3Q2gqoi.md index ad876fce9..a7cc03de1 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/115-winhex.md +++ b/src/data/roadmaps/cyber-security/content/winhex@gNan93Mg9Ym2AF3Q2gqoi.md @@ -30,4 +30,4 @@ Armed with the knowledge of its essential features, you can utilize WinHex in se - Examining memory for traces of malware or remnants of an attacker's activities. - Crafting custom scripts to automate repetitive tasks, ensuring a more efficient and systematic investigation. -In conclusion, WinHex is an indispensable and powerful utility for incident responders. Its diverse set of features makes it suitable for various tasks, from initial triage to in-depth forensic investigations. By incorporating WinHex into your incident response toolkit, you can enhance your ability to analyze, understand, and respond to security incidents effectively. +In conclusion, WinHex is an indispensable and powerful utility for incident responders. Its diverse set of features makes it suitable for various tasks, from initial triage to in-depth forensic investigations. By incorporating WinHex into your incident response toolkit, you can enhance your ability to analyze, understand, and respond to security incidents effectively. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/114-wireshark.md b/src/data/roadmaps/cyber-security/content/wireshark@Sm9bxKUElINHND8FdZ5f2.md similarity index 97% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/114-wireshark.md rename to src/data/roadmaps/cyber-security/content/wireshark@Sm9bxKUElINHND8FdZ5f2.md index daff1aaed..7f39d0624 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/114-wireshark.md +++ b/src/data/roadmaps/cyber-security/content/wireshark@Sm9bxKUElINHND8FdZ5f2.md @@ -24,4 +24,4 @@ Wireshark is an open-source network protocol analyzer that allows you to monitor - **Stop and Save Capture:** When you're done analyzing network traffic, click the "Stop" button to cease capturing packets. You may save the captured data for future analysis by selecting "File" > "Save As" and choosing a suitable file format. -Wireshark's capabilities make it an invaluable tool in incident response and discovery for cyber security professionals. Familiarize yourself with this tool to gain a deeper understanding of your network's security and prevent potential cyber threats. +Wireshark's capabilities make it an invaluable tool in incident response and discovery for cyber security professionals. Familiarize yourself with this tool to gain a deeper understanding of your network's security and prevent potential cyber threats. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/103-wlan.md b/src/data/roadmaps/cyber-security/content/wlan@QCVYF1rmPsMVtklBNDNaB.md similarity index 98% rename from src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/103-wlan.md rename to src/data/roadmaps/cyber-security/content/wlan@QCVYF1rmPsMVtklBNDNaB.md index 71f5bdf16..5ba101464 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-these/103-wlan.md +++ b/src/data/roadmaps/cyber-security/content/wlan@QCVYF1rmPsMVtklBNDNaB.md @@ -31,4 +31,4 @@ As WLANs use wireless signals to transmit data, they can be susceptible to vario - **Wi-Fi Protected Access 3 (WPA3)**: WPA3 is the latest security standard with enhanced encryption and authentication features. It addresses the vulnerabilities in WPA2 and provides even stronger security for WLANs. -To maintain a secure WLAN, it's essential to use the appropriate security standard, change default settings, and regularly update firmware to address any security vulnerabilities. +To maintain a secure WLAN, it's essential to use the appropriate security standard, change default settings, and regularly update firmware to address any security vulnerabilities. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/wpa-vs-wpa2-vs-wpa3-vs-wep@MBnDE0VyVh2u2p-r90jVk.md b/src/data/roadmaps/cyber-security/content/wpa-vs-wpa2-vs-wpa3-vs-wep@MBnDE0VyVh2u2p-r90jVk.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/wps@HSCGbM2-aTnJWUX6jGaDP.md b/src/data/roadmaps/cyber-security/content/wps@HSCGbM2-aTnJWUX6jGaDP.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/xss@2jo1r9O_rCnDwRv1_4Wo-.md b/src/data/roadmaps/cyber-security/content/xss@2jo1r9O_rCnDwRv1_4Wo-.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/zero-day@v9njgIxZyabJZ5iND3JGc.md b/src/data/roadmaps/cyber-security/content/zero-day@v9njgIxZyabJZ5iND3JGc.md new file mode 100644 index 000000000..e69de29bb diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/100-zero-day.md b/src/data/roadmaps/cyber-security/content/zero-day@zqRaMmqcLfx400kJ-h0LO.md similarity index 100% rename from src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/100-zero-day.md rename to src/data/roadmaps/cyber-security/content/zero-day@zqRaMmqcLfx400kJ-h0LO.md diff --git a/src/data/roadmaps/cyber-security/cyber-security.json b/src/data/roadmaps/cyber-security/cyber-security.json index c4754a571..610233c92 100644 --- a/src/data/roadmaps/cyber-security/cyber-security.json +++ b/src/data/roadmaps/cyber-security/cyber-security.json @@ -1,16351 +1,11936 @@ { - "mockup": { - "controls": { - "control": [ - { - "ID": "4990", - "typeID": "Arrow", - "zOrder": "0", - "w": "1", - "h": "178", - "measuredW": "150", - "measuredH": "100", - "x": "843", - "y": "5568", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.18934813107512127, - "y": 178 - }, - "p1": { - "x": 0.46417733117103044, - "y": -0.003611133130633743 - }, - "p2": { - "x": -0.18934813107512127, - "y": -0.1921212121210374 - } - } - }, - { - "ID": "4991", - "typeID": "Arrow", - "zOrder": "1", - "w": "298", - "h": "282", - "measuredW": "150", - "measuredH": "100", - "x": "976", - "y": "5574", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 298, - "y": 282 - }, - "p1": { - "x": 0.493543452361458, - "y": -0.07837385220074486 - }, - "p2": { - "x": 0, - "y": 0 - } - } - }, - { - "ID": "4992", - "typeID": "Arrow", - "zOrder": "2", - "w": "267", - "h": "220", - "measuredW": "150", - "measuredH": "100", - "x": "1008", - "y": "5576", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 267, - "y": 220 - }, - "p1": { - "x": 0.4934836197338219, - "y": -0.05672763148349574 - }, - "p2": { - "x": 0, - "y": 0 - } - } - }, - { - "ID": "4993", - "typeID": "Arrow", - "zOrder": "3", - "w": "251", - "h": "168", - "measuredW": "150", - "measuredH": "100", - "x": "1024", - "y": "5578", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 251, - "y": 168 - }, - "p1": { - "x": 0.493483619733822, - "y": -0.056727631483495716 - }, - "p2": { - "x": 0, - "y": 0 - } - } - }, - { - "ID": "4994", - "typeID": "Arrow", - "zOrder": "4", - "w": "228", - "h": "104", - "measuredW": "150", - "measuredH": "100", - "x": "1054", - "y": "5584", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 228, - "y": 104 - }, - "p1": { - "x": 0.49348361973382204, - "y": -0.05672763148349569 - }, - "p2": { - "x": 0, - "y": 0 - } - } - }, - { - "ID": "4995", - "typeID": "Arrow", - "zOrder": "5", - "w": "270", - "h": "49", - "measuredW": "150", - "measuredH": "100", - "x": "1022", - "y": "5579", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 270, - "y": 49 - }, - "p1": { - "x": 0.49348361973382215, - "y": -0.05672763148349566 - }, - "p2": { - "x": 0, - "y": 1 - } - } - }, - { - "ID": "4996", - "typeID": "Arrow", - "zOrder": "6", - "w": "282", - "h": "9", - "measuredW": "150", - "measuredH": "100", - "x": "1026", - "y": "5560", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 282, - "y": 8.807878787878508 - }, - "p1": { - "x": 0.46417733117103066, - "y": -0.003611133130633745 - }, - "p2": { - "x": 0, - "y": 0 - } - } - }, - { - "ID": "4997", - "typeID": "Arrow", - "zOrder": "7", - "w": "450", - "h": "2", - "measuredW": "150", - "measuredH": "100", - "x": "770", - "y": "5273", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 450, - "y": 1.8078787878789626 - }, - "p1": { - "x": 0.4641773311710305, - "y": -0.0036111331306337437 - }, - "p2": { - "x": -0.18934813107512127, - "y": 1.8078787878789626 - } - } - }, - { - "ID": "4998", - "typeID": "Arrow", - "zOrder": "8", - "w": "450", - "h": "2", - "measuredW": "150", - "measuredH": "100", - "x": "770", - "y": "5123", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 450, - "y": 1.8078787878789626 - }, - "p1": { - "x": 0.4641773311710305, - "y": -0.0036111331306337437 - }, - "p2": { - "x": -0.18934813107512127, - "y": 1.8078787878789626 - } - } - }, - { - "ID": "4999", - "typeID": "Arrow", - "zOrder": "9", - "w": "1", - "h": "335", - "measuredW": "150", - "measuredH": "100", - "x": "745", - "y": "4958", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": -0.18934813107512127, - "y": 334.7990909090913 - }, - "p1": { - "x": 0.4641773311710303, - "y": -0.0036111331306337433 - }, - "p2": { - "x": -0.18934813107512127, - "y": -0.1921212121210374 - } - } - }, - { - "ID": "5000", - "typeID": "Arrow", - "zOrder": "10", - "w": "705", - "h": "3", - "measuredW": "150", - "measuredH": "100", - "x": "150", - "y": "4965", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.4566527136892091, - "y": 0 - }, - "p1": { - "x": 0.4641773311710299, - "y": -0.003611133130633742 - }, - "p2": { - "x": 705, - "y": 0 - } - } - }, - { - "ID": "5001", - "typeID": "TextArea", - "zOrder": "11", - "w": "601", - "h": "367", - "measuredW": "200", - "measuredH": "140", - "x": "201", - "y": "5056" - }, - { - "ID": "5002", - "typeID": "Arrow", - "zOrder": "12", - "w": "655", - "h": "133", - "measuredW": "150", - "measuredH": "100", - "x": "386", - "y": "3578", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 655.4545454545456, - "y": -0.003939393939162983 - }, - "p1": { - "x": 0.5660201284435775, - "y": -0.052336545502854624 - }, - "p2": { - "x": 0.021212121212158763, - "y": 132.78515151515194 - } - } - }, - { - "ID": "5003", - "typeID": "Arrow", - "zOrder": "13", - "w": "275", - "h": "101", - "measuredW": "150", - "measuredH": "100", - "x": "777", - "y": "3584", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 274.669090909091, - "y": -0.1942424242420202 - }, - "p1": { - "x": 0.5298643654138616, - "y": -0.0940726086298502 - }, - "p2": { - "x": -0.18934813107512127, - "y": 100.80787878787896 - } - } - }, - { - "ID": "5004", - "typeID": "Arrow", - "zOrder": "14", - "w": "625", - "h": "116", - "measuredW": "150", - "measuredH": "100", - "x": "412", - "y": "3453", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 624.5618181818184, - "y": 115.07909090909106 - }, - "p1": { - "x": 0.5917990976071391, - "y": 0.07162058764360585 - }, - "p2": { - "x": -0.4424242424241811, - "y": -0.47121212121192 - } - } - }, - { - "ID": "5005", - "typeID": "Arrow", - "zOrder": "15", - "w": "271", - "h": "111", - "measuredW": "150", - "measuredH": "100", - "x": "776", - "y": "3448", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": 270.56181818181835, - "y": 110.07909090909106 - }, - "p1": { - "x": 0.5193344477104499, - "y": 0.1297727517569083 - }, - "p2": { - "x": -0.18934813107512127, - "y": -0.1921212121210374 - } - } - }, - { - "ID": "5006", - "typeID": "Arrow", - "zOrder": "16", - "w": "1", - "h": "335", - "measuredW": "150", - "measuredH": "100", - "x": "1199", - "y": "3456", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": -0.18934813107512127, - "y": 334.7990909090913 - }, - "p1": { - "x": 0.4641773311710303, - "y": -0.0036111331306337433 - }, - "p2": { - "x": -0.18934813107512127, - "y": -0.1921212121210374 - } - } - }, - { - "ID": "5007", - "typeID": "TextArea", - "zOrder": "17", - "w": "850", - "h": "149", - "measuredW": "200", - "measuredH": "140", - "x": "532", - "y": "4718" - }, - { - "ID": "5008", - "typeID": "TextArea", - "zOrder": "18", - "w": "432", - "h": "184", - "measuredW": "200", - "measuredH": "140", - "x": "950", - "y": "4613" - }, - { - "ID": "5009", - "typeID": "__group__", - "zOrder": "19", - "measuredW": "414", - "measuredH": "138", - "w": "414", - "h": "138", - "x": "539", - "y": "4603", - "properties": { - "controlName": "102-security-skills-and-knowledge:threat-classification" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "414", - "h": "138", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "266", - "measuredH": "26", - "x": "79", - "y": "31", - "properties": { - "size": "18", - "text": "Understand Threat Classification" - } - } - ] - } - } - }, - { - "ID": "5010", - "typeID": "TextArea", - "zOrder": "20", - "w": "424", - "h": "195", - "measuredW": "200", - "measuredH": "140", - "x": "120", - "y": "4422" - }, - { - "ID": "5011", - "typeID": "Label", - "zOrder": "21", - "measuredW": "298", - "measuredH": "26", - "x": "183", - "y": "4448", - "properties": { - "size": "18", - "text": "Learn how to find and use these logs" - } - }, - { - "ID": "5012", - "typeID": "TextArea", - "zOrder": "22", - "w": "424", - "h": "125", - "measuredW": "200", - "measuredH": "140", - "x": "120", - "y": "4305" - }, - { - "ID": "5013", - "typeID": "Label", - "zOrder": "23", - "measuredW": "295", - "measuredH": "26", - "x": "184", - "y": "4324", - "properties": { - "size": "18", - "text": "Using tools for unintended purposes" - } - }, - { - "ID": "5014", - "typeID": "TextArea", - "zOrder": "24", - "w": "272", - "h": "125", - "measuredW": "200", - "measuredH": "140", - "x": "275", - "y": "4185" - }, - { - "ID": "5015", - "typeID": "TextArea", - "zOrder": "25", - "w": "167", - "h": "125", - "measuredW": "200", - "measuredH": "140", - "x": "120", - "y": "4185" - }, - { - "ID": "5016", - "typeID": "TextArea", - "zOrder": "26", - "w": "424", - "h": "125", - "measuredW": "200", - "measuredH": "140", - "x": "120", - "y": "4067" - }, - { - "ID": "5017", - "typeID": "Label", - "zOrder": "27", - "measuredW": "261", - "measuredH": "26", - "x": "201", - "y": "4086", - "properties": { - "size": "18", - "text": "Understand Common Standards" - } - }, - { - "ID": "5018", - "typeID": "TextArea", - "zOrder": "28", - "w": "424", - "h": "125", - "measuredW": "200", - "measuredH": "140", - "x": "120", - "y": "3946" - }, - { - "ID": "5019", - "typeID": "Label", - "zOrder": "29", - "measuredW": "200", - "measuredH": "26", - "x": "232", - "y": "3965", - "properties": { - "size": "18", - "text": "Understand Frameworks" - } - }, - { - "ID": "5020", - "typeID": "TextArea", - "zOrder": "30", - "w": "424", - "h": "292", - "measuredW": "200", - "measuredH": "140", - "x": "120", - "y": "3659" - }, - { - "ID": "5021", - "typeID": "Label", - "zOrder": "31", - "measuredW": "348", - "measuredH": "26", - "x": "159", - "y": "3678", - "properties": { - "size": "18", - "text": "Tools for Incident Response and Discovery" - } - }, - { - "ID": "5022", - "typeID": "__group__", - "zOrder": "32", - "measuredW": "414", - "measuredH": "258", - "w": "414", - "h": "258", - "x": "538", - "y": "4359", - "properties": { - "controlName": "101-security-skills-and-knowledge:incident-response-process" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "414", - "h": "258", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "357", - "measuredH": "26", - "x": "28", - "y": "24", - "properties": { - "size": "18", - "text": "Understand the Incident Response Process" - } - } - ] - } - } - }, - { - "ID": "5023", - "typeID": "TextArea", - "zOrder": "33", - "w": "414", - "h": "346", - "measuredW": "200", - "measuredH": "140", - "x": "539", - "y": "4018" - }, - { - "ID": "5024", - "typeID": "Label", - "zOrder": "34", - "measuredW": "256", - "measuredH": "26", - "x": "618", - "y": "4037", - "properties": { - "size": "18", - "text": "Understand the following Terms" - } - }, - { - "ID": "5025", - "typeID": "TextArea", - "zOrder": "35", - "w": "414", - "h": "183", - "measuredW": "200", - "measuredH": "140", - "x": "539", - "y": "3839" - }, - { - "ID": "5026", - "typeID": "Label", - "zOrder": "36", - "measuredW": "346", - "measuredH": "26", - "x": "573", - "y": "3858", - "properties": { - "size": "18", - "text": "Understand Secure vs Unsecure Protocols" - } - }, - { - "ID": "5027", - "typeID": "__group__", - "zOrder": "37", - "measuredW": "414", - "measuredH": "183", - "w": "414", - "h": "183", - "x": "539", - "y": "3660", - "properties": { - "controlName": "100-security-skills-and-knowledge:cryptography" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "414", - "h": "183", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "189", - "measuredH": "26", - "x": "112", - "y": "18", - "properties": { - "size": "18", - "text": "Basics of Cryptography" - } - } - ] - } - } - }, - { - "ID": "5028", - "typeID": "__group__", - "zOrder": "38", - "measuredW": "98", - "measuredH": "50", - "w": "98", - "h": "50", - "x": "555", - "y": "3716", - "properties": { - "controlName": "100-security-skills-and-knowledge:cryptography:salting" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "98", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "56", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "Salting" - } - } - ] - } - } - }, - { - "ID": "5029", - "typeID": "__group__", - "zOrder": "39", - "measuredW": "102", - "measuredH": "50", - "w": "102", - "h": "50", - "x": "660", - "y": "3716", - "properties": { - "controlName": "101-security-skills-and-knowledge:cryptography:hashing" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "102", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "67", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "Hashing" - } - } - ] - } - } - }, - { - "ID": "5030", - "typeID": "__group__", - "zOrder": "40", - "measuredW": "156", - "measuredH": "50", - "w": "156", - "h": "50", - "x": "772", - "y": "3716", - "properties": { - "controlName": "102-security-skills-and-knowledge:cryptography:key-exchange" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "156", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "115", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "Key Exchange" - } - } - ] - } - } - }, - { - "ID": "5031", - "typeID": "__group__", - "zOrder": "41", - "measuredW": "54", - "measuredH": "50", - "w": "54", - "h": "50", - "x": "555", - "y": "3773", - "properties": { - "controlName": "103-security-skills-and-knowledge:cryptography:pki" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "54", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "29", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "PKI" - } - } - ] - } - } - }, - { - "ID": "5032", - "typeID": "__group__", - "zOrder": "42", - "measuredW": "185", - "measuredH": "50", - "w": "185", - "h": "50", - "x": "616", - "y": "3773", - "properties": { - "controlName": "104-security-skills-and-knowledge:cryptography:private-vs-public-key" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "185", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "153", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "Pvt Key vs Pub Key" - } - } - ] - } - } - }, - { - "ID": "5033", - "typeID": "__group__", - "zOrder": "43", - "measuredW": "120", - "measuredH": "50", - "w": "120", - "h": "50", - "x": "808", - "y": "3773", - "properties": { - "controlName": "105-security-skills-and-knowledge:cryptography:obfuscation" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "120", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "98", - "measuredH": "26", - "x": "11", - "y": "12", - "properties": { - "size": "18", - "text": "Obfuscation" - } - } - ] - } - } - }, - { - "ID": "5034", - "typeID": "__group__", - "zOrder": "44", - "measuredW": "132", - "measuredH": "50", - "w": "132", - "h": "50", - "x": "555", - "y": "3896", - "properties": { - "controlName": "100-security-skills-and-knowledge:secure-vs-unsecure-protocols:ftp-vs-sftp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "132", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "104", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "FTP vs SFTP" - } - } - ] - } - } - }, - { - "ID": "5035", - "typeID": "__group__", - "zOrder": "45", - "measuredW": "119", - "measuredH": "50", - "w": "119", - "h": "50", - "x": "696", - "y": "3896", - "properties": { - "controlName": "101-security-skills-and-knowledge:secure-vs-unsecure-protocols:ssl-vs-tls" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "119", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "91", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "SSL vs TLS" - } - } - ] - } - } - }, - { - "ID": "5036", - "typeID": "__group__", - "zOrder": "46", - "measuredW": "102", - "measuredH": "50", - "w": "102", - "h": "50", - "x": "825", - "y": "3896", - "properties": { - "controlName": "102-security-skills-and-knowledge:secure-vs-unsecure-protocols:ipsec" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "102", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "53", - "measuredH": "26", - "x": "24", - "y": "12", - "properties": { - "size": "18", - "text": "IPSEC" - } - } - ] - } - } - }, - { - "ID": "5037", - "typeID": "__group__", - "zOrder": "47", - "measuredW": "104", - "measuredH": "50", - "w": "104", - "h": "50", - "x": "555", - "y": "3952", - "properties": { - "controlName": "103-security-skills-and-knowledge:secure-vs-unsecure-protocols:dnssec" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "104", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "73", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "DNSSEC" - } - } - ] - } - } - }, - { - "ID": "5038", - "typeID": "__group__", - "zOrder": "48", - "measuredW": "83", - "measuredH": "50", - "w": "83", - "h": "50", - "x": "665", - "y": "3952", - "properties": { - "controlName": "104-security-skills-and-knowledge:secure-vs-unsecure-protocols:ldaps" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "83", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "57", - "measuredH": "26", - "x": "13", - "y": "12", - "properties": { - "size": "18", - "text": "LDAPS" - } - } - ] - } - } - }, - { - "ID": "5039", - "typeID": "__group__", - "zOrder": "49", - "measuredW": "73", - "measuredH": "50", - "w": "73", - "h": "50", - "x": "754", - "y": "3952", - "properties": { - "controlName": "105-security-skills-and-knowledge:secure-vs-unsecure-protocols:srtp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "73", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "46", - "measuredH": "26", - "x": "13", - "y": "12", - "properties": { - "size": "18", - "text": "SRTP" - } - } - ] - } - } - }, - { - "ID": "5040", - "typeID": "__group__", - "zOrder": "50", - "measuredW": "93", - "measuredH": "50", - "w": "93", - "h": "50", - "x": "834", - "y": "3952", - "properties": { - "controlName": "106-security-skills-and-knowledge:secure-vs-unsecure-protocols:s-mime" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "93", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "68", - "measuredH": "26", - "x": "13", - "y": "12", - "properties": { - "size": "18", - "text": "S/MIME" - } - } - ] - } - } - }, - { - "ID": "5041", - "typeID": "Arrow", - "zOrder": "51", - "w": "309", - "h": "1", - "measuredW": "150", - "measuredH": "100", - "x": "1146", - "y": "3570", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.4566527136892091, - "y": 0 - }, - "p1": { - "x": 0.46417733117103, - "y": -0.003611133130633742 - }, - "p2": { - "x": 308.29242424242443, - "y": 0 - } - } - }, - { - "ID": "5042", - "typeID": "Arrow", - "zOrder": "52", - "w": "1", - "h": "181", - "measuredW": "150", - "measuredH": "100", - "x": "1333", - "y": "1796", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": -0.18934813107512127, - "y": 180.4691895344713 - }, - "p1": { - "x": 0.46417733117103027, - "y": -0.003611133130633743 - }, - "p2": { - "x": -0.18934813107512127, - "y": -0.1921212121210374 - } - } - }, - { - "ID": "5043", - "typeID": "Arrow", - "zOrder": "53", - "w": "1", - "h": "181", - "measuredW": "150", - "measuredH": "100", - "x": "1214", - "y": "1796", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": -0.18934813107512127, - "y": 180.4691895344713 - }, - "p1": { - "x": 0.46417733117103027, - "y": -0.003611133130633743 - }, - "p2": { - "x": -0.18934813107512127, - "y": -0.1921212121210374 - } - } - }, - { - "ID": "5044", - "typeID": "Arrow", - "zOrder": "54", - "w": "1", - "h": "181", - "measuredW": "150", - "measuredH": "100", - "x": "1084", - "y": "1796", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": -0.18934813107512127, - "y": 180.4691895344713 - }, - "p1": { - "x": 0.46417733117103027, - "y": -0.003611133130633743 - }, - "p2": { - "x": -0.18934813107512127, - "y": -0.1921212121210374 - } - } - }, - { - "ID": "5045", - "typeID": "__group__", - "zOrder": "55", - "measuredW": "433", - "measuredH": "195", - "w": "433", - "h": "195", - "x": "120", - "y": "2720", - "properties": { - "controlName": "112-networking-knowledge:auth-methodologies" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "433", - "h": "195", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "243", - "measuredH": "26", - "x": "95", - "y": "24", - "properties": { - "size": "18", - "text": "Authentication Methodologies" - } - } - ] - } - } - }, - { - "ID": "5046", - "typeID": "__group__", - "zOrder": "56", - "measuredW": "433", - "measuredH": "119", - "w": "433", - "h": "119", - "x": "120", - "y": "2318", - "properties": { - "controlName": "110-networking-knowledge:virutalization-basics" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "433", - "h": "119", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "282", - "measuredH": "26", - "x": "77", - "y": "77", - "properties": { - "size": "18", - "text": "Understand basics of Virtualization" - } - } - ] - } - } - }, - { - "ID": "5047", - "typeID": "Arrow", - "zOrder": "57", - "w": "1", - "h": "181", - "measuredW": "150", - "measuredH": "100", - "x": "1201", - "y": "2556", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "stroke": "dotted", - "p0": { - "x": -0.18934813107512127, - "y": 180.4691895344713 - }, - "p1": { - "x": 0.46417733117103027, - "y": -0.003611133130633743 - }, - "p2": { - "x": -0.18934813107512127, - "y": -0.1921212121210374 - } - } - }, - { - "ID": "5048", - "typeID": "Arrow", - "zOrder": "58", - "w": "309", - "h": "1", - "measuredW": "150", - "measuredH": "100", - "x": "1144", - "y": "2641", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.4566527136892091, - "y": 0 - }, - "p1": { - "x": 0.46417733117102994, - "y": -0.003611133130633742 - }, - "p2": { - "x": 308.9948484848487, - "y": 0 - } - } - }, - { - "ID": "5049", - "typeID": "Arrow", - "zOrder": "59", - "w": "768", - "h": "3", - "measuredW": "150", - "measuredH": "100", - "x": "530", - "y": "2639", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.46802666908911306, - "y": 0 - }, - "p1": { - "x": 0.46417733117103016, - "y": -0.003611133130633742 - }, - "p2": { - "x": 767.8106518689249, - "y": 0 - }, - "stroke": "dotted" - } - }, - { - "ID": "5050", - "typeID": "Arrow", - "zOrder": "60", - "w": "144", - "h": "1", - "measuredW": "150", - "measuredH": "100", - "x": "1130", - "y": "2625", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": 0.33333333333337123, - "y": 0 - }, - "p1": { - "x": 0.4641773311710304, - "y": -0.0036111331306337437 - }, - "p2": { - "x": 144, - "y": 0 - } - } - }, - { - "ID": "5051", - "typeID": "Canvas", - "zOrder": "61", - "w": "361", - "h": "508", - "measuredW": "100", - "measuredH": "70", - "x": "1022", - "y": "1951" - }, - { - "ID": "5052", - "typeID": "Arrow", - "zOrder": "62", - "w": "579", - "h": "2", - "measuredW": "150", - "measuredH": "100", - "x": "863", - "y": "1454", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.3783855341235949, - "y": -0.09587076153292173 - }, - "p1": { - "x": 0.46428571428571436, - "y": -0.003992113361953177 - }, - "p2": { - "x": 578.2121212121212, - "y": -0.09587076153292173 - } - } - }, - { - "ID": "5053", - "typeID": "Arrow", - "zOrder": "63", - "w": "176", - "h": "1", - "measuredW": "150", - "measuredH": "100", - "x": "844", - "y": "1678", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": 176.060606060606, - "y": 0.5151515151515014 - }, - "p1": { - "x": 0.46428571428571436, - "y": -0.003992113361953179 - }, - "p2": { - "x": -0.3783855341235949, - "y": 0.5151515151515014 - }, - "stroke": "dotted" - } - }, - { - "ID": "5054", - "typeID": "Arrow", - "zOrder": "64", - "w": "176", - "h": "1", - "measuredW": "150", - "measuredH": "100", - "x": "834", - "y": "1566", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": 176.060606060606, - "y": 0.5151515151515014 - }, - "p1": { - "x": 0.46428571428571436, - "y": -0.003992113361953179 - }, - "p2": { - "x": -0.3783855341235949, - "y": 0.5151515151515014 - }, - "stroke": "dotted" - } - }, - { - "ID": "5055", - "typeID": "__group__", - "zOrder": "65", - "measuredW": "106", - "measuredH": "47", - "w": "106", - "h": "47", - "x": "1298", - "y": "1543", - "properties": { - "controlName": "103-basic-it-skills:connection-types:infrared" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "106", - "h": "47", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457", - "textColor": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "62", - "measuredH": "25", - "x": "22", - "y": "11", - "properties": { - "size": "17", - "text": "Infrared" - } - } - ] - } - } - }, - { - "ID": "5056", - "typeID": "__group__", - "zOrder": "66", - "measuredW": "115", - "measuredH": "47", - "w": "115", - "h": "47", - "x": "1176", - "y": "1543", - "properties": { - "controlName": "102-basic-it-skills:connection-types:bluetooth" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "115", - "h": "47", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457", - "textColor": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "74", - "measuredH": "25", - "x": "21", - "y": "11", - "properties": { - "size": "17", - "text": "Bluetooth" - } - } - ] - } - } - }, - { - "ID": "5057", - "typeID": "__group__", - "zOrder": "67", - "measuredW": "114", - "measuredH": "47", - "w": "114", - "h": "47", - "x": "952", - "y": "1543", - "properties": { - "controlName": "100-basic-it-skills:connection-types:nfc" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "114", - "h": "47", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457", - "textColor": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "36", - "measuredH": "25", - "x": "39", - "y": "11", - "properties": { - "size": "17", - "text": "NFC" - } - } - ] - } - } - }, - { - "ID": "5058", - "typeID": "__group__", - "zOrder": "68", - "measuredW": "184", - "measuredH": "50", - "w": "184", - "h": "50", - "x": "284", - "y": "1657", - "properties": { - "controlName": "201-extras:certifications:beginner-certifications:comptia-linuxplus" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "184", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "134", - "measuredH": "26", - "x": "25", - "y": "12", - "properties": { - "size": "18", - "text": "CompTIA Linux+" - } - } - ] - } - } - }, - { - "ID": "5063", - "typeID": "__group__", - "zOrder": "70", - "measuredW": "345", - "measuredH": "50", - "w": "345", - "h": "50", - "x": "122", - "y": "1256", - "properties": { - "controlName": "200-extras:ctfs:hack-the-box" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "345", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "104", - "measuredH": "26", - "x": "121", - "y": "12", - "properties": { - "size": "18", - "text": "HackTheBox" - } - } - ] - } - } - }, - { - "ID": "5064", - "typeID": "__group__", - "zOrder": "71", - "measuredW": "345", - "measuredH": "50", - "w": "345", - "h": "50", - "x": "122", - "y": "1311", - "properties": { - "controlName": "201-extras:ctfs:try-hack-me" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "345", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "93", - "measuredH": "26", - "x": "126", - "y": "12", - "properties": { - "size": "18", - "text": "TryHackMe" - } - } - ] - } - } - }, - { - "ID": "5065", - "typeID": "__group__", - "zOrder": "72", - "measuredW": "345", - "measuredH": "50", - "w": "345", - "h": "50", - "x": "122", - "y": "1365", - "properties": { - "controlName": "202-extras:ctfs:vuln-hub" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "345", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "68", - "measuredH": "26", - "x": "139", - "y": "12", - "properties": { - "size": "18", - "text": "VulnHub" - } - } - ] - } - } - }, - { - "ID": "5066", - "typeID": "__group__", - "zOrder": "73", - "measuredW": "345", - "measuredH": "50", - "w": "345", - "h": "50", - "x": "122", - "y": "1420", - "properties": { - "controlName": "203-extras:ctfs:pico-ctf" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "345", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "69", - "measuredH": "26", - "x": "138", - "y": "12", - "properties": { - "size": "18", - "text": "picoCTF" - } - } - ] - } - } - }, - { - "ID": "5067", - "typeID": "__group__", - "zOrder": "74", - "measuredW": "345", - "measuredH": "50", - "w": "345", - "h": "50", - "x": "122", - "y": "1475", - "properties": { - "controlName": "204-extras:ctfs:sans-holiday-hack-challenge" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "345", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "245", - "measuredH": "26", - "x": "50", - "y": "12", - "properties": { - "size": "18", - "text": "SANS Holiday Hack Challenge" - } - } - ] - } - } - }, - { - "ID": "5068", - "typeID": "TextArea", - "zOrder": "75", - "w": "346", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "122", - "y": "1601", - "properties": { - "color": "15325437" - } - }, - { - "ID": "5069", - "typeID": "Label", - "zOrder": "76", - "measuredW": "188", - "measuredH": "26", - "x": "200", - "y": "1613", - "properties": { - "size": "18", - "text": "Beginner Certifications" - } - }, - { - "ID": "5070", - "typeID": "Label", - "zOrder": "77", - "measuredW": "264", - "measuredH": "32", - "x": "163", - "y": "1209", - "properties": { - "size": "24", - "text": "CTFs (Capture the Flag)" - } - }, - { - "ID": "5071", - "typeID": "Label", - "zOrder": "78", - "measuredW": "144", - "measuredH": "32", - "x": "221", - "y": "1559", - "properties": { - "size": "24", - "text": "Certifications" - } - }, - { - "ID": "5072", - "typeID": "__group__", - "zOrder": "79", - "measuredW": "155", - "measuredH": "50", - "w": "155", - "h": "50", - "x": "122", - "y": "1657", - "properties": { - "controlName": "200-extras:certifications:beginner-certifications:comptia-aplus" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "155", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "102", - "measuredH": "26", - "x": "27", - "y": "12", - "properties": { - "size": "18", - "text": "CompTIA A+" - } - } - ] - } - } - }, - { - "ID": "5073", - "typeID": "__group__", - "zOrder": "80", - "measuredW": "216", - "measuredH": "50", - "w": "216", - "h": "50", - "x": "122", - "y": "1713", - "properties": { - "controlName": "202-extras:certifications:beginner-certifications:comptia-networkplus" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "216", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "158", - "measuredH": "26", - "x": "29", - "y": "12", - "properties": { - "size": "18", - "text": "CompTIA Network+" - } - } - ] - } - } - }, - { - "ID": "5074", - "typeID": "__group__", - "zOrder": "81", - "measuredW": "346", - "measuredH": "50", - "w": "346", - "h": "50", - "x": "122", - "y": "1769", - "properties": { - "controlName": "204-extras:certifications:beginner-certifications:comptia-securityplus" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "346", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "156", - "measuredH": "26", - "x": "95", - "y": "12", - "properties": { - "size": "18", - "text": "CompTIA Security+" - } - } - ] - } - } - }, - { - "ID": "5075", - "typeID": "TextArea", - "zOrder": "82", - "w": "346", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "122", - "y": "1827", - "properties": { - "color": "15325437" - } - }, - { - "ID": "5076", - "typeID": "Label", - "zOrder": "83", - "measuredW": "193", - "measuredH": "26", - "x": "199", - "y": "1839", - "properties": { - "size": "18", - "text": "Advanced Certifications" - } - }, - { - "ID": "5077", - "typeID": "__group__", - "zOrder": "84", - "measuredW": "118", - "measuredH": "50", - "w": "118", - "h": "50", - "x": "122", - "y": "1883", - "properties": { - "controlName": "200-extras:certifications:advanced-certifications:cissp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "118", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "52", - "measuredH": "26", - "x": "33", - "y": "12", - "properties": { - "size": "18", - "text": "CISSP" - } - } - ] - } - } - }, - { - "ID": "5078", - "typeID": "__group__", - "zOrder": "85", - "measuredW": "100", - "measuredH": "50", - "w": "100", - "h": "50", - "x": "246", - "y": "1883", - "properties": { - "controlName": "201-extras:certifications:advanced-certifications:cisa" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "100", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "41", - "measuredH": "26", - "x": "29", - "y": "12", - "properties": { - "size": "18", - "text": "CISA" - } - } - ] - } - } - }, - { - "ID": "5079", - "typeID": "__group__", - "zOrder": "86", - "measuredW": "116", - "measuredH": "50", - "w": "116", - "h": "50", - "x": "352", - "y": "1883", - "properties": { - "controlName": "202-extras:certifications:advanced-certifications:cism" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "116", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "45", - "measuredH": "26", - "x": "35", - "y": "12", - "properties": { - "size": "18", - "text": "CISM" - } - } - ] - } - } - }, - { - "ID": "5080", - "typeID": "__group__", - "zOrder": "87", - "measuredW": "118", - "measuredH": "50", - "w": "118", - "h": "50", - "x": "122", - "y": "1938", - "properties": { - "controlName": "203-extras:certifications:advanced-certifications:gsec" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "118", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "w": "53", - "measuredW": "49", - "measuredH": "26", - "x": "32", - "y": "12", - "properties": { - "text": "GSEC", - "size": "18" - } - } - ] - } - } - }, - { - "ID": "5081", - "typeID": "__group__", - "zOrder": "88", - "measuredW": "100", - "measuredH": "50", - "w": "100", - "h": "50", - "x": "246", - "y": "1938", - "properties": { - "controlName": "204-extras:certifications:advanced-certifications:gpen" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "100", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "w": "54", - "measuredW": "51", - "measuredH": "26", - "x": "23", - "y": "12", - "properties": { - "size": "18", - "text": "GPEN" - } - } - ] - } - } - }, - { - "ID": "5082", - "typeID": "__group__", - "zOrder": "89", - "measuredW": "116", - "measuredH": "50", - "w": "116", - "h": "50", - "x": "352", - "y": "1938", - "properties": { - "controlName": "205-extras:certifications:advanced-certifications:gwapt" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "116", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "62", - "measuredH": "26", - "x": "27", - "y": "12", - "properties": { - "text": "GWAPT", - "size": "18" - } - } - ] - } - } - }, - { - "ID": "5083", - "typeID": "__group__", - "zOrder": "90", - "measuredW": "100", - "measuredH": "50", - "w": "100", - "h": "50", - "x": "246", - "y": "1993", - "properties": { - "controlName": "207-extras:certifications:advanced-certifications:oscp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "100", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "49", - "measuredH": "26", - "x": "25", - "y": "12", - "properties": { - "size": "18", - "text": "OSCP" - } - } - ] - } - } - }, - { - "ID": "5084", - "typeID": "__group__", - "zOrder": "91", - "measuredW": "118", - "measuredH": "50", - "w": "118", - "h": "50", - "x": "122", - "y": "1993", - "properties": { - "controlName": "206-extras:certifications:advanced-certifications:giac" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "118", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "43", - "measuredH": "26", - "x": "37", - "y": "12", - "properties": { - "size": "18", - "text": "GIAC" - } - } - ] - } - } - }, - { - "ID": "5085", - "typeID": "__group__", - "zOrder": "92", - "measuredW": "116", - "measuredH": "50", - "w": "116", - "h": "50", - "x": "352", - "y": "1993", - "properties": { - "controlName": "208-extras:certifications:advanced-certifications:crest" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "116", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "59", - "measuredH": "26", - "x": "28", - "y": "12", - "properties": { - "size": "18", - "text": "CREST" - } - } - ] - } - } - }, - { - "ID": "5086", - "typeID": "__group__", - "zOrder": "93", - "measuredW": "346", - "measuredH": "50", - "w": "346", - "h": "50", - "x": "122", - "y": "2048", - "properties": { - "controlName": "209-extras:certifications:advanced-certifications:ceh" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "346", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "38", - "measuredH": "26", - "x": "155", - "y": "12", - "properties": { - "size": "18", - "text": "CEH" - } - } - ] - } - } - }, - { - "ID": "5087", - "typeID": "__group__", - "zOrder": "94", - "measuredW": "124", - "measuredH": "50", - "w": "124", - "h": "50", - "x": "344", - "y": "1713", - "properties": { - "controlName": "203-extras:certifications:beginner-certifications:ccna" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "124", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16710847" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "51", - "measuredH": "26", - "x": "36", - "y": "12", - "properties": { - "size": "18", - "text": "CCNA" - } - } - ] - } - } - }, - { - "ID": "5088", - "typeID": "Arrow", - "zOrder": "95", - "w": "1", - "h": "101", - "measuredW": "150", - "measuredH": "100", - "x": "717", - "y": "1359", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": 0.6216144658764051, - "y": -0.09587076153292173 - }, - "p1": { - "x": 0.4642857142857143, - "y": -0.003992113361953179 - }, - "p2": { - "x": 0.6216144658764051, - "y": 100.5151515151515 - } - } - }, - { - "ID": "5089", - "typeID": "Label", - "zOrder": "96", - "measuredW": "184", - "measuredH": "36", - "x": "626", - "y": "1300", - "properties": { - "size": "28", - "text": "Cyber Security" - } - }, - { - "ID": "5090", - "typeID": "Arrow", - "zOrder": "97", - "w": "1", - "h": "64", - "measuredW": "150", - "measuredH": "100", - "x": "717", - "y": "1216", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.3586399639038973, - "y": 0 - }, - "p1": { - "x": 0.32941176470588224, - "y": 0 - }, - "p2": { - "x": -0.3586399639038973, - "y": 64 - }, - "stroke": "dotted" - } - }, - { - "ID": "5091", - "typeID": "__group__", - "zOrder": "98", - "measuredW": "356", - "measuredH": "50", - "w": "356", - "h": "50", - "x": "540", - "y": "1486", - "properties": { - "controlName": "100-basic-it-skills:computer-hardware-components" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "356", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "273", - "measuredH": "26", - "x": "41", - "y": "12", - "properties": { - "size": "18", - "text": "Computer Hardware Components" - } - } - ] - } - } - }, - { - "ID": "5092", - "typeID": "__group__", - "zOrder": "99", - "measuredW": "356", - "measuredH": "50", - "w": "356", - "h": "50", - "x": "540", - "y": "1599", - "properties": { - "controlName": "102-basic-it-skills:os-independent-troubleshooting" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "356", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "271", - "measuredH": "26", - "x": "42", - "y": "12", - "properties": { - "size": "18", - "text": "OS-Independent Troubleshooting" - } - } - ] - } - } - }, - { - "ID": "5093", - "typeID": "__group__", - "zOrder": "100", - "measuredW": "356", - "measuredH": "50", - "w": "356", - "h": "50", - "x": "540", - "y": "1542", - "properties": { - "controlName": "101-basic-it-skills:connection-types" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "356", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "293", - "measuredH": "26", - "x": "31", - "y": "12", - "properties": { - "size": "18", - "text": "Connection Types and their function" - } - } - ] - } - } - }, - { - "ID": "5094", - "typeID": "__group__", - "zOrder": "101", - "measuredW": "356", - "measuredH": "50", - "w": "356", - "h": "50", - "x": "540", - "y": "1430", - "properties": { - "controlName": "100-basic-it-skills" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "Canvas", - "zOrder": "0", - "w": "356", - "h": "50", - "measuredW": "100", - "measuredH": "70", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "174", - "measuredH": "26", - "x": "91", - "y": "12", - "properties": { - "text": "Fundamental IT Skills", - "size": "18" - } - } - ] - } - } - }, - { - "ID": "5095", - "typeID": "__group__", - "zOrder": "102", - "measuredW": "98", - "measuredH": "47", - "w": "98", - "h": "47", - "x": "1073", - "y": "1543", - "properties": { - "controlName": "101-basic-it-skills:connection-types:wifi" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "98", - "h": "47", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457", - "textColor": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "33", - "measuredH": "25", - "x": "32", - "y": "11", - "properties": { - "size": "17", - "text": "WiFi" - } - } - ] - } - } - }, - { - "ID": "5096", - "typeID": "__group__", - "zOrder": "103", - "measuredW": "356", - "measuredH": "50", - "w": "356", - "h": "50", - "x": "540", - "y": "1654", - "properties": { - "controlName": "103-basic-it-skills:popular-suites" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "356", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "297", - "measuredH": "26", - "x": "29", - "y": "12", - "properties": { - "size": "18", - "text": "Understand Basics of Popular Suites" - } - } - ] - } - } - }, - { - "ID": "5097", - "typeID": "__group__", - "zOrder": "104", - "measuredW": "115", - "measuredH": "47", - "w": "115", - "h": "47", - "x": "952", - "y": "1655", - "properties": { - "controlName": "100-basic-it-skills:popular-suites:icloud" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "115", - "h": "47", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457", - "textColor": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "49", - "measuredH": "25", - "x": "33", - "y": "11", - "properties": { - "size": "17", - "text": "iCloud" - } - } - ] - } - } - }, - { - "ID": "5098", - "typeID": "__group__", - "zOrder": "105", - "measuredW": "127", - "measuredH": "47", - "w": "127", - "h": "47", - "x": "1076", - "y": "1655", - "properties": { - "controlName": "101-basic-it-skills:popular-suites:google-suite" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "127", - "h": "47", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457", - "textColor": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "99", - "measuredH": "25", - "x": "14", - "y": "11", - "properties": { - "size": "17", - "text": "Google Suite" - } - } - ] - } - } - }, - { - "ID": "5099", - "typeID": "__group__", - "zOrder": "106", - "measuredW": "194", - "measuredH": "47", - "w": "194", - "h": "47", - "x": "1210", - "y": "1655", - "properties": { - "controlName": "102-basic-it-skills:popular-suites:ms-office-suite" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "194", - "h": "47", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457", - "textColor": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "164", - "measuredH": "25", - "x": "15", - "y": "11", - "properties": { - "size": "17", - "text": "Microsoft Office Suite" - } - } - ] - } - } - }, - { - "ID": "5100", - "typeID": "__group__", - "zOrder": "107", - "measuredW": "356", - "measuredH": "50", - "w": "356", - "h": "50", - "x": "540", - "y": "1709", - "properties": { - "controlName": "104-basic-it-skills:basics-of-computer-networking" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "356", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "258", - "measuredH": "26", - "x": "49", - "y": "12", - "properties": { - "size": "18", - "text": "Basics of Computer Networking" - } - } - ] - } - } - }, - { - "ID": "5101", - "typeID": "Arrow", - "zOrder": "108", - "w": "14", - "h": "3509", - "measuredW": "150", - "measuredH": "100", - "x": "1442", - "y": "1454", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": 0.21212121212124657, - "y": 3508.9181818181823 - }, - "p1": { - "x": 0.4642857142857156, - "y": -0.003992113361953176 - }, - "p2": { - "x": 0.21212121212124657, - "y": -0.09587076153292173 - } - } - }, - { - "ID": "5102", - "typeID": "Arrow", - "zOrder": "109", - "w": "276", - "h": "1", - "measuredW": "150", - "measuredH": "100", - "x": "1167", - "y": "1886", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": 0.2430837028791757, - "y": 0 - }, - "p1": { - "x": 0.4641773311710303, - "y": -0.003611133130633743 - }, - "p2": { - "x": 276, - "y": 0 - } - } - }, - { - "ID": "5103", - "typeID": "__group__", - "zOrder": "110", - "measuredW": "362", - "measuredH": "50", - "w": "362", - "h": "50", - "x": "1020", - "y": "1862", - "properties": { - "controlName": "101-operating-systems" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "Canvas", - "zOrder": "0", - "w": "362", - "h": "50", - "measuredW": "100", - "measuredH": "70", - "x": "0", - "y": "0", - "properties": { - "color": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "154", - "measuredH": "26", - "x": "122", - "y": "12", - "properties": { - "size": "18", - "text": "Operating Systems" - } - } - ] - } - } - }, - { - "ID": "5104", - "typeID": "__group__", - "zOrder": "111", - "measuredW": "128", - "measuredH": "50", - "w": "128", - "h": "50", - "x": "1021", - "y": "1773", - "properties": { - "controlName": "100-operating-systems:windows" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "128", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "72", - "measuredH": "26", - "x": "28", - "y": "12", - "properties": { - "size": "18", - "text": "Windows" - } - } - ] - } - } - }, - { - "ID": "5105", - "typeID": "__group__", - "zOrder": "112", - "measuredW": "326", - "measuredH": "50", - "w": "326", - "h": "50", - "x": "1040", - "y": "2004", - "properties": { - "controlName": "103-operating-systems:learn-for-each:install-and-configure" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "326", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "238", - "measuredH": "26", - "x": "44", - "y": "12", - "properties": { - "size": "18", - "text": "Installation and Configuration" - } - } - ] - } - } - }, - { - "ID": "5106", - "typeID": "__group__", - "zOrder": "113", - "measuredW": "326", - "measuredH": "50", - "w": "326", - "h": "50", - "x": "1040", - "y": "2060", - "properties": { - "controlName": "104-operating-systems:learn-for-each:versions-and-differences" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "326", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "277", - "measuredH": "26", - "x": "24", - "y": "12", - "properties": { - "size": "18", - "text": "Different Versions and Differences" - } - } - ] - } - } - }, - { - "ID": "5107", - "typeID": "__group__", - "zOrder": "114", - "measuredW": "326", - "measuredH": "50", - "w": "326", - "h": "50", - "x": "1040", - "y": "2172", - "properties": { - "controlName": "106-operating-systems:learn-for-each:understand-permissions" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "326", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "199", - "measuredH": "26", - "x": "63", - "y": "12", - "properties": { - "size": "18", - "text": "Understand Permissions" - } - } - ] - } - } - }, - { - "ID": "5108", - "typeID": "__group__", - "zOrder": "115", - "measuredW": "326", - "measuredH": "50", - "w": "326", - "h": "50", - "x": "1040", - "y": "2227", - "properties": { - "controlName": "107-operating-systems:learn-for-each:installing-apps" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "326", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "288", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "Installing Software and Applications" - } - } - ] - } - } - }, - { - "ID": "5109", - "typeID": "__group__", - "zOrder": "116", - "measuredW": "326", - "measuredH": "50", - "w": "326", - "h": "50", - "x": "1040", - "y": "2282", - "properties": { - "controlName": "108-operating-systems:learn-for-each:performing-crud-on-files" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "326", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "215", - "measuredH": "26", - "x": "55", - "y": "12", - "properties": { - "size": "18", - "text": "Performing CRUD on Files" - } - } - ] - } - } - }, - { - "ID": "5110", - "typeID": "__group__", - "zOrder": "117", - "measuredW": "326", - "measuredH": "50", - "w": "326", - "h": "50", - "x": "1040", - "y": "2116", - "properties": { - "controlName": "105-operating-systems:learn-for-each:navigating-using-gui-and-cli" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "326", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "243", - "measuredH": "26", - "x": "41", - "y": "12", - "properties": { - "size": "18", - "text": "Navigating using GUI and CLI" - } - } - ] - } - } - }, - { - "ID": "5111", - "typeID": "__group__", - "zOrder": "118", - "measuredW": "326", - "measuredH": "50", - "w": "326", - "h": "50", - "x": "1040", - "y": "2336", - "properties": { - "controlName": "109-operating-systems:learn-for-each:troubleshooting" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "326", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "131", - "measuredH": "26", - "x": "97", - "y": "12", - "properties": { - "size": "18", - "text": "Troubleshooting" - } - } - ] - } - } - }, - { - "ID": "5112", - "typeID": "__group__", - "zOrder": "119", - "measuredW": "326", - "measuredH": "50", - "w": "326", - "h": "50", - "x": "1040", - "y": "2392", - "properties": { - "controlName": "110-operating-systems:learn-for-each:common-commands" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "326", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "171", - "measuredH": "26", - "x": "77", - "y": "12", - "properties": { - "size": "18", - "text": "Common Commands" - } - } - ] - } - } - }, - { - "ID": "5113", - "typeID": "__group__", - "zOrder": "120", - "measuredW": "119", - "measuredH": "50", - "w": "119", - "h": "50", - "x": "1156", - "y": "1772", - "properties": { - "controlName": "101-operating-systems:linux" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "119", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "44", - "measuredH": "26", - "x": "38", - "y": "12", - "properties": { - "size": "18", - "text": "Linux" - } - } - ] - } - } - }, - { - "ID": "5114", - "typeID": "__group__", - "zOrder": "121", - "measuredW": "102", - "measuredH": "50", - "w": "102", - "h": "50", - "x": "1281", - "y": "1772", - "properties": { - "controlName": "102-operating-systems:macos" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "102", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "60", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "MacOS" - } - } - ] - } - } - }, - { - "ID": "5115", - "typeID": "Label", - "zOrder": "122", - "measuredW": "196", - "measuredH": "26", - "x": "1105", - "y": "1967", - "properties": { - "size": "18", - "text": "Learn following for Each" - } - }, - { - "ID": "5116", - "typeID": "__group__", - "zOrder": "123", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1021", - "y": "2617", - "properties": { - "controlName": "102-networking-knowledge" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "Canvas", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "100", - "measuredH": "70", - "x": "0", - "y": "0", - "properties": { - "color": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "187", - "measuredH": "26", - "x": "87", - "y": "12", - "properties": { - "size": "18", - "text": "Networking Knowledge" - } - } - ] - } - } - }, - { - "ID": "5117", - "typeID": "__group__", - "zOrder": "124", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1021", - "y": "2531", - "properties": { - "controlName": "100-networking-knowledge:osi-model" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "217", - "measuredH": "26", - "x": "72", - "y": "12", - "properties": { - "size": "18", - "text": "Understand the OSI model" - } - } - ] - } - } - }, - { - "ID": "5118", - "typeID": "__group__", - "zOrder": "125", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1021", - "y": "2756", - "properties": { - "controlName": "102-networking-knowledge:common-ports" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "244", - "measuredH": "26", - "x": "59", - "y": "12", - "properties": { - "size": "18", - "text": "Common Ports and their Uses" - } - } - ] - } - } - }, - { - "ID": "5119", - "typeID": "__group__", - "zOrder": "126", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1021", - "y": "2701", - "properties": { - "controlName": "101-networking-knowledge:common-protocols" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "278", - "measuredH": "26", - "x": "42", - "y": "12", - "properties": { - "size": "18", - "text": "Common Protocols and their Uses" - } - } - ] - } - } - }, - { - "ID": "5120", - "typeID": "TextArea", - "zOrder": "127", - "w": "353", - "h": "236", - "measuredW": "200", - "measuredH": "140", - "x": "611", - "y": "2160" - }, - { - "ID": "5121", - "typeID": "Label", - "zOrder": "128", - "measuredW": "230", - "measuredH": "26", - "x": "673", - "y": "2180", - "properties": { - "size": "18", - "text": "Understand the Terminology" - } - }, - { - "ID": "5122", - "typeID": "__group__", - "zOrder": "129", - "measuredW": "76", - "measuredH": "50", - "w": "76", - "h": "50", - "x": "637", - "y": "2219", - "properties": { - "controlName": "100-networking-knowledge:understand-the-terminology:vlan" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "76", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "47", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "VLAN" - } - } - ] - } - } - }, - { - "ID": "5123", - "typeID": "__group__", - "zOrder": "130", - "measuredW": "73", - "measuredH": "50", - "w": "73", - "h": "50", - "x": "720", - "y": "2219", - "properties": { - "controlName": "101-networking-knowledge:understand-the-terminology:dmz" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "73", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "40", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "DMZ" - } - } - ] - } - } - }, - { - "ID": "5124", - "typeID": "__group__", - "zOrder": "131", - "measuredW": "68", - "measuredH": "50", - "w": "68", - "h": "50", - "x": "801", - "y": "2219", - "properties": { - "controlName": "102-networking-knowledge:understand-the-terminology:arp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "68", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "36", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "ARP" - } - } - ] - } - } - }, - { - "ID": "5125", - "typeID": "__group__", - "zOrder": "132", - "measuredW": "60", - "measuredH": "50", - "w": "60", - "h": "50", - "x": "877", - "y": "2219", - "properties": { - "controlName": "103-networking-knowledge:understand-the-terminology:vm" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "60", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "27", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "VM" - } - } - ] - } - } - }, - { - "ID": "5126", - "typeID": "__group__", - "zOrder": "133", - "measuredW": "76", - "measuredH": "50", - "w": "76", - "h": "50", - "x": "637", - "y": "2274", - "properties": { - "controlName": "104-networking-knowledge:understand-the-terminology:nat" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "76", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "34", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "NAT" - } - } - ] - } - } - }, - { - "ID": "5127", - "typeID": "__group__", - "zOrder": "134", - "measuredW": "54", - "measuredH": "50", - "w": "54", - "h": "50", - "x": "721", - "y": "2274", - "properties": { - "controlName": "105-networking-knowledge:understand-the-terminology:ip" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "54", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "17", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "IP" - } - } - ] - } - } - }, - { - "ID": "5128", - "typeID": "__group__", - "zOrder": "135", - "measuredW": "66", - "measuredH": "50", - "w": "66", - "h": "50", - "x": "781", - "y": "2274", - "properties": { - "controlName": "106-networking-knowledge:understand-the-terminology:dns" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "66", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "38", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "DNS" - } - } - ] - } - } - }, - { - "ID": "5129", - "typeID": "__group__", - "zOrder": "136", - "measuredW": "83", - "measuredH": "50", - "w": "83", - "h": "50", - "x": "854", - "y": "2274", - "properties": { - "controlName": "107-networking-knowledge:understand-the-terminology:dhcp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "83", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "51", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "DHCP" - } - } - ] - } - } - }, - { - "ID": "5130", - "typeID": "__group__", - "zOrder": "137", - "measuredW": "91", - "measuredH": "50", - "w": "91", - "h": "50", - "x": "637", - "y": "2330", - "properties": { - "controlName": "108-networking-knowledge:understand-the-terminology:router" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "91", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "56", - "measuredH": "26", - "x": "18", - "y": "12", - "properties": { - "size": "18", - "text": "Router" - } - } - ] - } - } - }, - { - "ID": "5131", - "typeID": "__group__", - "zOrder": "138", - "measuredW": "111", - "measuredH": "50", - "w": "111", - "h": "50", - "x": "734", - "y": "2330", - "properties": { - "controlName": "109-networking-knowledge:understand-the-terminology:switch" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "111", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "53", - "measuredH": "26", - "x": "29", - "y": "12", - "properties": { - "size": "18", - "text": "Switch" - } - } - ] - } - } - }, - { - "ID": "5132", - "typeID": "__group__", - "zOrder": "139", - "measuredW": "88", - "measuredH": "50", - "w": "88", - "h": "50", - "x": "850", - "y": "2330", - "properties": { - "controlName": "110-networking-knowledge:understand-the-terminology:vpn" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "88", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "36", - "measuredH": "26", - "x": "25", - "y": "12", - "properties": { - "size": "18", - "text": "VPN" - } - } - ] - } - } - }, - { - "ID": "5133", - "typeID": "__group__", - "zOrder": "140", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1021", - "y": "2810", - "properties": { - "controlName": "103-networking-knowledge:ssl-and-tls-basics" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "164", - "measuredH": "26", - "x": "99", - "y": "12", - "properties": { - "size": "18", - "text": "SSL and TLS Basics" - } - } - ] - } - } - }, - { - "ID": "5134", - "typeID": "__group__", - "zOrder": "141", - "measuredW": "353", - "measuredH": "237", - "w": "353", - "h": "237", - "x": "611", - "y": "1929", - "properties": { - "controlName": "106-networking-knowledge:ip-terminology" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "353", - "h": "237", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "w": "120", - "measuredW": "120", - "measuredH": "26", - "x": "117", - "y": "80", - "properties": { - "text": "IP Terminology", - "size": "18" - } - } - ] - } - } - }, - { - "ID": "5135", - "typeID": "__group__", - "zOrder": "142", - "measuredW": "320", - "measuredH": "50", - "w": "320", - "h": "50", - "x": "628", - "y": "1946", - "properties": { - "controlName": "100-networking-knowledge:ip-terminology:public-vs-private-ip-addresses" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "320", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "245", - "measuredH": "26", - "x": "37", - "y": "12", - "properties": { - "size": "18", - "text": "Public vs Private IP Addresses" - } - } - ] - } - } - }, - { - "ID": "5136", - "typeID": "__group__", - "zOrder": "143", - "measuredW": "116", - "measuredH": "50", - "w": "116", - "h": "50", - "x": "632", - "y": "2046", - "properties": { - "controlName": "101-networking-knowledge:ip-terminology:localhost" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "116", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "73", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "localhost" - } - } - ] - } - } - }, - { - "ID": "5137", - "typeID": "__group__", - "zOrder": "144", - "measuredW": "106", - "measuredH": "50", - "w": "106", - "h": "50", - "x": "757", - "y": "2046", - "properties": { - "controlName": "102-networking-knowledge:ip-terminology:loopback" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "106", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "74", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "loopback" - } - } - ] - } - } - }, - { - "ID": "5138", - "typeID": "__group__", - "zOrder": "145", - "measuredW": "141", - "measuredH": "50", - "w": "141", - "h": "50", - "x": "632", - "y": "2102", - "properties": { - "controlName": "104-networking-knowledge:ip-terminology:subnet-mask" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "141", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "104", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "subnet mask" - } - } - ] - } - } - }, - { - "ID": "5139", - "typeID": "__group__", - "zOrder": "146", - "measuredW": "166", - "measuredH": "50", - "w": "166", - "h": "50", - "x": "781", - "y": "2102", - "properties": { - "controlName": "105-networking-knowledge:ip-terminology:default-gateway" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "166", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "128", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "default gateway" - } - } - ] - } - } - }, - { - "ID": "5140", - "typeID": "__group__", - "zOrder": "147", - "measuredW": "76", - "measuredH": "50", - "w": "76", - "h": "50", - "x": "871", - "y": "2046", - "properties": { - "controlName": "103-networking-knowledge:ip-terminology:cidr" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "76", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "45", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "CIDR" - } - } - ] - } - } - }, - { - "ID": "5141", - "typeID": "TextArea", - "zOrder": "148", - "w": "353", - "h": "114", - "measuredW": "200", - "measuredH": "140", - "x": "611", - "y": "2393" - }, - { - "ID": "5142", - "typeID": "Label", - "zOrder": "149", - "measuredW": "147", - "measuredH": "26", - "x": "713", - "y": "2464", - "properties": { - "size": "18", - "text": "Understand these" - } - }, - { - "ID": "5143", - "typeID": "__group__", - "zOrder": "150", - "measuredW": "75", - "measuredH": "50", - "w": "75", - "h": "50", - "x": "627", - "y": "2405", - "properties": { - "controlName": "100-networking-knowledge:understand-these:man" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "75", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "41", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "MAN" - } - } - ] - } - } - }, - { - "ID": "5144", - "typeID": "__group__", - "zOrder": "151", - "measuredW": "72", - "measuredH": "50", - "w": "72", - "h": "50", - "x": "710", - "y": "2405", - "properties": { - "controlName": "101-networking-knowledge:understand-these:lan" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "72", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "35", - "measuredH": "26", - "x": "18", - "y": "12", - "properties": { - "size": "18", - "text": "LAN" - } - } - ] - } - } - }, - { - "ID": "5145", - "typeID": "__group__", - "zOrder": "152", - "measuredW": "77", - "measuredH": "50", - "w": "77", - "h": "50", - "x": "790", - "y": "2405", - "properties": { - "controlName": "102-networking-knowledge:ip-terminology:wan" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "77", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "40", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "WAN" - } - } - ] - } - } - }, - { - "ID": "5146", - "typeID": "__group__", - "zOrder": "153", - "measuredW": "76", - "measuredH": "50", - "w": "76", - "h": "50", - "x": "875", - "y": "2405", - "properties": { - "controlName": "103-networking-knowledge:understand-these:wlan" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "76", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "52", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "WLAN" - } - } - ] - } - } - }, - { - "ID": "5147", - "typeID": "TextArea", - "zOrder": "154", - "w": "353", - "h": "117", - "measuredW": "200", - "measuredH": "140", - "x": "611", - "y": "2503" - }, - { - "ID": "5148", - "typeID": "Label", - "zOrder": "155", - "measuredW": "138", - "measuredH": "26", - "x": "719", - "y": "2575", - "properties": { - "size": "18", - "text": "Function of Each" - } - }, - { - "ID": "5149", - "typeID": "__group__", - "zOrder": "156", - "measuredW": "83", - "measuredH": "50", - "w": "83", - "h": "50", - "x": "627", - "y": "2515", - "properties": { - "controlName": "100-networking-knowledge:functions-of-each:dhcp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "83", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "51", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "DHCP" - } - } - ] - } - } - }, - { - "ID": "5150", - "typeID": "__group__", - "zOrder": "157", - "measuredW": "77", - "measuredH": "50", - "w": "77", - "h": "50", - "x": "715", - "y": "2515", - "properties": { - "controlName": "101-networking-knowledge:functions-of-each:dns" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "77", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "38", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "DNS" - } - } - ] - } - } - }, - { - "ID": "5151", - "typeID": "__group__", - "zOrder": "158", - "measuredW": "72", - "measuredH": "50", - "w": "72", - "h": "50", - "x": "797", - "y": "2515", - "properties": { - "controlName": "102-networking-knowledge:functions-of-each:ntp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "72", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "36", - "measuredH": "26", - "x": "18", - "y": "12", - "properties": { - "size": "18", - "text": "NTP" - } - } - ] - } - } - }, - { - "ID": "5152", - "typeID": "__group__", - "zOrder": "159", - "measuredW": "75", - "measuredH": "50", - "w": "75", - "h": "50", - "x": "874", - "y": "2515", - "properties": { - "controlName": "103-networking-knowledge:functions-of-each:ipam" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "75", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "43", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "IPAM" - } - } - ] - } - } - }, - { - "ID": "5153", - "typeID": "__group__", - "zOrder": "160", - "measuredW": "433", - "measuredH": "290", - "w": "433", - "h": "290", - "x": "120", - "y": "2434", - "properties": { - "controlName": "111-networking-knowledge:troubleshooting-tools" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "433", - "h": "290", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "177", - "measuredH": "26", - "x": "131", - "y": "19", - "properties": { - "size": "18", - "text": "Troubleshooting Tools" - } - } - ] - } - } - }, - { - "ID": "5154", - "typeID": "__group__", - "zOrder": "161", - "measuredW": "179", - "measuredH": "50", - "w": "179", - "h": "50", - "x": "361", - "y": "2495", - "properties": { - "controlName": "102-networking-knowledge:troubleshooting-tools:packet-sniffers" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "179", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "121", - "measuredH": "26", - "x": "29", - "y": "12", - "properties": { - "size": "18", - "text": "Packet Sniffers" - } - } - ] - } - } - }, - { - "ID": "5155", - "typeID": "__group__", - "zOrder": "162", - "measuredW": "179", - "measuredH": "50", - "w": "179", - "h": "50", - "x": "361", - "y": "2551", - "properties": { - "controlName": "105-networking-knowledge:troubleshooting-tools:port-scanners" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "179", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "115", - "measuredH": "26", - "x": "32", - "y": "12", - "properties": { - "size": "18", - "text": "Port Scanners" - } - } - ] - } - } - }, - { - "ID": "5156", - "typeID": "__group__", - "zOrder": "163", - "measuredW": "180", - "measuredH": "50", - "w": "180", - "h": "50", - "x": "361", - "y": "2606", - "properties": { - "controlName": "109-networking-knowledge:troubleshooting-tools:protocol-analyzers" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "180", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "150", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "Protocol Analyzers" - } - } - ] - } - } - }, - { - "ID": "5157", - "typeID": "__group__", - "zOrder": "164", - "measuredW": "76", - "measuredH": "50", - "w": "76", - "h": "50", - "x": "136", - "y": "2606", - "properties": { - "controlName": "106-networking-knowledge:troubleshooting-tools:ping" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "76", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "36", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "ping" - } - } - ] - } - } - }, - { - "ID": "5158", - "typeID": "__group__", - "zOrder": "165", - "measuredW": "106", - "measuredH": "50", - "w": "106", - "h": "50", - "x": "434", - "y": "2662", - "properties": { - "controlName": "113-networking-knowledge:troubleshooting-tools:tracert" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "106", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "55", - "measuredH": "26", - "x": "25", - "y": "12", - "properties": { - "size": "18", - "text": "tracert" - } - } - ] - } - } - }, - { - "ID": "5159", - "typeID": "__group__", - "zOrder": "166", - "measuredW": "62", - "measuredH": "50", - "w": "62", - "h": "50", - "x": "219", - "y": "2606", - "properties": { - "controlName": "107-networking-knowledge:troubleshooting-tools:dig" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "62", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "25", - "measuredH": "26", - "x": "18", - "y": "12", - "properties": { - "size": "18", - "text": "dig" - } - } - ] - } - } - }, - { - "ID": "5160", - "typeID": "__group__", - "zOrder": "167", - "measuredW": "105", - "measuredH": "50", - "w": "105", - "h": "50", - "x": "137", - "y": "2495", - "properties": { - "controlName": "100-networking-knowledge:troubleshooting-tools:nslookup" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "105", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "73", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "nslookup" - } - } - ] - } - } - }, - { - "ID": "5161", - "typeID": "__group__", - "zOrder": "168", - "measuredW": "105", - "measuredH": "50", - "w": "105", - "h": "50", - "x": "136", - "y": "2551", - "properties": { - "controlName": "103-networking-knowledge:troubleshooting-tools:ipconfig" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "105", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "64", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "ipconfig" - } - } - ] - } - } - }, - { - "ID": "5162", - "typeID": "__group__", - "zOrder": "169", - "measuredW": "105", - "measuredH": "50", - "w": "105", - "h": "50", - "x": "249", - "y": "2495", - "properties": { - "controlName": "101-networking-knowledge:troubleshooting-tools:iptables" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "105", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "64", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "iptables" - } - } - ] - } - } - }, - { - "ID": "5163", - "typeID": "__group__", - "zOrder": "170", - "measuredW": "105", - "measuredH": "50", - "w": "105", - "h": "50", - "x": "249", - "y": "2551", - "properties": { - "controlName": "104-networking-knowledge:troubleshooting-tools:netstat" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "105", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "57", - "measuredH": "26", - "x": "24", - "y": "12", - "properties": { - "size": "18", - "text": "netstat" - } - } - ] - } - } - }, - { - "ID": "5164", - "typeID": "__group__", - "zOrder": "171", - "measuredW": "113", - "measuredH": "50", - "w": "113", - "h": "50", - "x": "315", - "y": "2662", - "properties": { - "controlName": "112-networking-knowledge:troubleshooting-tools:tcpdump" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "113", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "72", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "tcpdump" - } - } - ] - } - } - }, - { - "ID": "5165", - "typeID": "__group__", - "zOrder": "172", - "measuredW": "65", - "measuredH": "50", - "w": "65", - "h": "50", - "x": "287", - "y": "2606", - "properties": { - "controlName": "108-networking-knowledge:troubleshooting-tools:arp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "65", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "28", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "arp" - } - } - ] - } - } - }, - { - "ID": "5166", - "typeID": "__group__", - "zOrder": "173", - "measuredW": "86", - "measuredH": "50", - "w": "86", - "h": "50", - "x": "136", - "y": "2662", - "properties": { - "controlName": "110-networking-knowledge:troubleshooting-tools:nmap" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "86", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "46", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "nmap" - } - } - ] - } - } - }, - { - "ID": "5167", - "typeID": "__group__", - "zOrder": "174", - "measuredW": "80", - "measuredH": "50", - "w": "80", - "h": "50", - "x": "228", - "y": "2662", - "properties": { - "controlName": "111-networking-knowledge:troubleshooting-tools:route" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "80", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "43", - "measuredH": "26", - "x": "18", - "y": "12", - "properties": { - "size": "18", - "text": "route" - } - } - ] - } - } - }, - { - "ID": "5168", - "typeID": "__group__", - "zOrder": "175", - "measuredW": "353", - "measuredH": "50", - "w": "353", - "h": "50", - "x": "611", - "y": "1883", - "properties": { - "controlName": "105-networking-knowledge:basics-of-subnetting" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "353", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "167", - "measuredH": "26", - "x": "93", - "y": "12", - "properties": { - "size": "18", - "text": "Basics of Subnetting" - } - } - ] - } - } - }, - { - "ID": "5169", - "typeID": "__group__", - "zOrder": "176", - "measuredW": "353", - "measuredH": "125", - "w": "353", - "h": "125", - "x": "611", - "y": "2615", - "properties": { - "controlName": "107-networking-knowledge:network-topologies" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "353", - "h": "125", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "160", - "measuredH": "26", - "x": "97", - "y": "16", - "properties": { - "size": "18", - "text": "Network Topologies" - } - } - ] - } - } - }, - { - "ID": "5170", - "typeID": "__group__", - "zOrder": "177", - "measuredW": "69", - "measuredH": "50", - "w": "69", - "h": "50", - "x": "625", - "y": "2673", - "properties": { - "controlName": "100-networking-knowledge:network-topologies:star-topology" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "69", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "33", - "measuredH": "26", - "x": "18", - "y": "12", - "properties": { - "size": "18", - "text": "Star" - } - } - ] - } - } - }, - { - "ID": "5171", - "typeID": "__group__", - "zOrder": "178", - "measuredW": "85", - "measuredH": "50", - "w": "85", - "h": "50", - "x": "782", - "y": "2673", - "properties": { - "controlName": "102-networking-knowledge:network-topologies:mesh-topology" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "85", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "46", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "Mesh" - } - } - ] - } - } - }, - { - "ID": "5172", - "typeID": "__group__", - "zOrder": "179", - "measuredW": "72", - "measuredH": "50", - "w": "72", - "h": "50", - "x": "703", - "y": "2673", - "properties": { - "controlName": "101-networking-knowledge:network-topologies:ring-topology" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "72", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "38", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "Ring" - } - } - ] - } - } - }, - { - "ID": "5173", - "typeID": "__group__", - "zOrder": "180", - "measuredW": "74", - "measuredH": "50", - "w": "74", - "h": "50", - "x": "876", - "y": "2673", - "properties": { - "controlName": "103-networking-knowledge:network-topologies:bus-topology" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "74", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "32", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "Bus" - } - } - ] - } - } - }, - { - "ID": "5174", - "typeID": "__group__", - "zOrder": "181", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1021", - "y": "2864", - "properties": { - "controlName": "104-networking-knowledge:basics-of-nas-and-san" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "191", - "measuredH": "26", - "x": "85", - "y": "12", - "properties": { - "size": "18", - "text": "Basics of NAS and SAN" - } - } - ] - } - } - }, - { - "ID": "5175", - "typeID": "__group__", - "zOrder": "182", - "measuredW": "115", - "measuredH": "50", - "w": "115", - "h": "50", - "x": "136", - "y": "2333", - "properties": { - "controlName": "100-networking-knowledge:virutalization-basics:hypervisor" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "115", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "88", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "Hypervisor" - } - } - ] - } - } - }, - { - "ID": "5176", - "typeID": "__group__", - "zOrder": "183", - "measuredW": "61", - "measuredH": "50", - "w": "61", - "h": "50", - "x": "259", - "y": "2333", - "properties": { - "controlName": "101-networking-knowledge:virutalization-basics:vm" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "61", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "27", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "VM" - } - } - ] - } - } - }, - { - "ID": "5177", - "typeID": "__group__", - "zOrder": "184", - "measuredW": "106", - "measuredH": "50", - "w": "106", - "h": "50", - "x": "328", - "y": "2333", - "properties": { - "controlName": "102-networking-knowledge:virutalization-basics:guest-os" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "106", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "74", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "GuestOS" - } - } - ] - } - } - }, - { - "ID": "5178", - "typeID": "__group__", - "zOrder": "185", - "measuredW": "94", - "measuredH": "50", - "w": "94", - "h": "50", - "x": "441", - "y": "2333", - "properties": { - "controlName": "103-networking-knowledge:virutalization-basics:host-os" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "94", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "63", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "HostOS" - } - } - ] - } - } - }, - { - "ID": "5179", - "typeID": "__group__", - "zOrder": "186", - "measuredW": "433", - "measuredH": "119", - "w": "433", - "h": "119", - "x": "120", - "y": "2202", - "properties": { - "controlName": "109-networking-knowledge:virtualization-technologies" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "433", - "h": "119", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "295", - "measuredH": "26", - "x": "69", - "y": "77", - "properties": { - "size": "18", - "text": "Common Virtualization Technologies" - } - } - ] - } - } - }, - { - "ID": "5180", - "typeID": "__group__", - "zOrder": "187", - "measuredW": "104", - "measuredH": "50", - "w": "104", - "h": "50", - "x": "136", - "y": "2217", - "properties": { - "controlName": "100-networking-knowledge:virtualization-technologies:vmware" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "104", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "70", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "VMWare" - } - } - ] - } - } - }, - { - "ID": "5181", - "typeID": "__group__", - "zOrder": "188", - "measuredW": "115", - "measuredH": "50", - "w": "115", - "h": "50", - "x": "247", - "y": "2217", - "properties": { - "controlName": "101-networking-knowledge:virtualization-technologies:virtualbox" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "115", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "82", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "VirtualBox" - } - } - ] - } - } - }, - { - "ID": "5182", - "typeID": "__group__", - "zOrder": "189", - "measuredW": "58", - "measuredH": "50", - "w": "58", - "h": "50", - "x": "370", - "y": "2217", - "properties": { - "controlName": "102-networking-knowledge:virtualization-technologies:esxi" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "58", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "33", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "esxi" - } - } - ] - } - } - }, - { - "ID": "5183", - "typeID": "__group__", - "zOrder": "190", - "measuredW": "101", - "measuredH": "50", - "w": "101", - "h": "50", - "x": "436", - "y": "2217", - "properties": { - "controlName": "104-networking-knowledge:virtualization-technologies:proxmox" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "101", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "68", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "proxmox" - } - } - ] - } - } - }, - { - "ID": "5184", - "typeID": "__group__", - "zOrder": "191", - "measuredW": "353", - "measuredH": "179", - "w": "353", - "h": "179", - "x": "611", - "y": "2735", - "properties": { - "controlName": "108-networking-knowledge:common-protocols" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "353", - "h": "179", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "255", - "measuredH": "26", - "x": "49", - "y": "18", - "properties": { - "size": "18", - "text": "Understand Common Protocols" - } - } - ] - } - } - }, - { - "ID": "5185", - "typeID": "__group__", - "zOrder": "192", - "measuredW": "69", - "measuredH": "50", - "w": "69", - "h": "50", - "x": "625", - "y": "2793", - "properties": { - "controlName": "100-networking-knowledge:common-protocols:ssh" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "69", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "35", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "SSH" - } - } - ] - } - } - }, - { - "ID": "5186", - "typeID": "__group__", - "zOrder": "193", - "measuredW": "85", - "measuredH": "50", - "w": "85", - "h": "50", - "x": "782", - "y": "2793", - "properties": { - "controlName": "102-networking-knowledge:common-protocols:ftp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "85", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "33", - "measuredH": "26", - "x": "26", - "y": "12", - "properties": { - "size": "18", - "text": "FTP" - } - } - ] - } - } - }, - { - "ID": "5187", - "typeID": "__group__", - "zOrder": "194", - "measuredW": "72", - "measuredH": "50", - "w": "72", - "h": "50", - "x": "703", - "y": "2793", - "properties": { - "controlName": "101-networking-knowledge:common-protocols:rdp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "72", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "38", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "RDP" - } - } - ] - } - } - }, - { - "ID": "5188", - "typeID": "__group__", - "zOrder": "195", - "measuredW": "74", - "measuredH": "50", - "w": "74", - "h": "50", - "x": "876", - "y": "2793", - "properties": { - "controlName": "103-networking-knowledge:common-protocols:sftp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "74", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "44", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "SFTP" - } - } - ] - } - } - }, - { - "ID": "5189", - "typeID": "__group__", - "zOrder": "196", - "measuredW": "162", - "measuredH": "50", - "w": "162", - "h": "50", - "x": "625", - "y": "2850", - "properties": { - "controlName": "104-networking-knowledge:common-protocols:http-https" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "162", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "121", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "HTTP / HTTPS" - } - } - ] - } - } - }, - { - "ID": "5190", - "typeID": "__group__", - "zOrder": "197", - "measuredW": "158", - "measuredH": "50", - "w": "158", - "h": "50", - "x": "793", - "y": "2850", - "properties": { - "controlName": "105-networking-knowledge:common-protocols:ssl-tls" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "158", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "82", - "measuredH": "26", - "x": "38", - "y": "12", - "properties": { - "size": "18", - "text": "SSL / TLS" - } - } - ] - } - } - }, - { - "ID": "5191", - "typeID": "__group__", - "zOrder": "198", - "measuredW": "132", - "measuredH": "50", - "w": "132", - "h": "50", - "x": "146", - "y": "2787", - "properties": { - "controlName": "100-networking-knowledge:auth-methodologies:kerberos" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "132", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "75", - "measuredH": "26", - "x": "28", - "y": "12", - "properties": { - "size": "18", - "text": "Kerberos" - } - } - ] - } - } - }, - { - "ID": "5192", - "typeID": "__group__", - "zOrder": "199", - "measuredW": "128", - "measuredH": "50", - "w": "128", - "h": "50", - "x": "286", - "y": "2787", - "properties": { - "controlName": "101-networking-knowledge:auth-methodologies:ldap" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "128", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "46", - "measuredH": "26", - "x": "41", - "y": "12", - "properties": { - "size": "18", - "text": "LDAP" - } - } - ] - } - } - }, - { - "ID": "5193", - "typeID": "__group__", - "zOrder": "200", - "measuredW": "106", - "measuredH": "50", - "w": "106", - "h": "50", - "x": "425", - "y": "2787", - "properties": { - "controlName": "102-networking-knowledge:auth-methodologies:sso" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "106", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "36", - "measuredH": "26", - "x": "35", - "y": "12", - "properties": { - "size": "18", - "text": "SSO" - } - } - ] - } - } - }, - { - "ID": "5194", - "typeID": "__group__", - "zOrder": "201", - "measuredW": "133", - "measuredH": "50", - "w": "133", - "h": "50", - "x": "145", - "y": "2844", - "properties": { - "controlName": "103-networking-knowledge:auth-methodologies:certificates" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "133", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "94", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "Certificates" - } - } - ] - } - } - }, - { - "ID": "5195", - "typeID": "__group__", - "zOrder": "202", - "measuredW": "130", - "measuredH": "50", - "w": "130", - "h": "50", - "x": "286", - "y": "2844", - "properties": { - "controlName": "104-networking-knowledge:auth-methodologies:local-auth" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "130", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "85", - "measuredH": "26", - "x": "22", - "y": "12", - "properties": { - "size": "18", - "text": "Local Auth" - } - } - ] - } - } - }, - { - "ID": "5196", - "typeID": "__group__", - "zOrder": "203", - "measuredW": "105", - "measuredH": "50", - "w": "105", - "h": "50", - "x": "425", - "y": "2844", - "properties": { - "controlName": "105-networking-knowledge:auth-methodologies:radius" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "105", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "67", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "RADIUS" - } - } - ] - } - } - }, - { - "ID": "5197", - "typeID": "__group__", - "zOrder": "204", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1021", - "y": "3546", - "properties": { - "controlName": "103-security-skills-and-knowledge" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "Canvas", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "100", - "measuredH": "70", - "x": "0", - "y": "0", - "properties": { - "color": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "241", - "measuredH": "26", - "x": "60", - "y": "12", - "properties": { - "size": "18", - "text": "Security Skills and Knowledge" - } - } - ] - } - } - }, - { - "ID": "5198", - "typeID": "TextArea", - "zOrder": "205", - "w": "433", - "h": "485", - "measuredW": "200", - "measuredH": "140", - "x": "949", - "y": "3660" - }, - { - "ID": "5199", - "typeID": "Label", - "zOrder": "206", - "measuredW": "236", - "measuredH": "26", - "x": "1032", - "y": "3683", - "properties": { - "size": "18", - "text": "Attack Types and Differences" - } - }, - { - "ID": "5200", - "typeID": "__group__", - "zOrder": "207", - "measuredW": "398", - "measuredH": "50", - "w": "398", - "h": "50", - "x": "967", - "y": "3726", - "properties": { - "controlName": "100-security-skills-and-knowledge:attack-types:phishing-vishing-whaling-smishing" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "398", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "347", - "measuredH": "26", - "x": "25", - "y": "12", - "properties": { - "size": "18", - "text": "Phishing vs Vishing vs Whaling vs Smishing" - } - } - ] - } - } - }, - { - "ID": "5201", - "typeID": "__group__", - "zOrder": "208", - "measuredW": "155", - "measuredH": "50", - "w": "155", - "h": "50", - "x": "967", - "y": "3781", - "properties": { - "controlName": "101-security-skills-and-knowledge:attack-types:spam-vs-spim" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "155", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "114", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "Spam vs Spim" - } - } - ] - } - } - }, - { - "ID": "5202", - "typeID": "__group__", - "zOrder": "209", - "measuredW": "234", - "measuredH": "50", - "w": "234", - "h": "50", - "x": "1130", - "y": "3781", - "properties": { - "controlName": "102-security-skills-and-knowledge:attack-types:shoulder-surfing" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "234", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "134", - "measuredH": "26", - "x": "50", - "y": "12", - "properties": { - "size": "18", - "text": "Shoulder Surfing" - } - } - ] - } - } - }, - { - "ID": "5203", - "typeID": "__group__", - "zOrder": "210", - "measuredW": "167", - "measuredH": "50", - "w": "167", - "h": "50", - "x": "967", - "y": "3837", - "properties": { - "controlName": "103-security-skills-and-knowledge:attack-types:dumpster-diving" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "167", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "135", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "Dumpster Diving" - } - } - ] - } - } - }, - { - "ID": "5204", - "typeID": "__group__", - "zOrder": "211", - "measuredW": "104", - "measuredH": "50", - "w": "104", - "h": "50", - "x": "1142", - "y": "3837", - "properties": { - "controlName": "104-security-skills-and-knowledge:attack-types:tailgating" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "104", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "79", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "Tailgating" - } - } - ] - } - } - }, - { - "ID": "5205", - "typeID": "__group__", - "zOrder": "212", - "measuredW": "213", - "measuredH": "50", - "w": "213", - "h": "50", - "x": "968", - "y": "3893", - "properties": { - "controlName": "106-security-skills-and-knowledge:attack-types:social-engineering" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "213", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "154", - "measuredH": "26", - "x": "30", - "y": "12", - "properties": { - "size": "18", - "text": "Social Engineering" - } - } - ] - } - } - }, - { - "ID": "5206", - "typeID": "__group__", - "zOrder": "213", - "measuredW": "178", - "measuredH": "50", - "w": "178", - "h": "50", - "x": "1187", - "y": "3893", - "properties": { - "controlName": "107-security-skills-and-knowledge:attack-types:reconnaissance" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "178", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "137", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "Reconnaissance" - } - } - ] - } - } - }, - { - "ID": "5207", - "typeID": "__group__", - "zOrder": "214", - "measuredW": "152", - "measuredH": "50", - "w": "152", - "h": "50", - "x": "968", - "y": "3951", - "properties": { - "controlName": "108-security-skills-and-knowledge:attack-types:impersonation" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "152", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "118", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "Impersonation" - } - } - ] - } - } - }, - { - "ID": "5208", - "typeID": "__group__", - "zOrder": "215", - "measuredW": "236", - "measuredH": "50", - "w": "236", - "h": "50", - "x": "1128", - "y": "3951", - "properties": { - "controlName": "109-security-skills-and-knowledge:attack-types:watering-hole-attack" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "236", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "171", - "measuredH": "26", - "x": "32", - "y": "12", - "properties": { - "size": "18", - "text": "Watering Hole Attack" - } - } - ] - } - } - }, - { - "ID": "5209", - "typeID": "__group__", - "zOrder": "216", - "measuredW": "220", - "measuredH": "50", - "w": "220", - "h": "50", - "x": "968", - "y": "4008", - "properties": { - "controlName": "110-security-skills-and-knowledge:attack-types:drive-by-attack" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "220", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "120", - "measuredH": "26", - "x": "50", - "y": "12", - "properties": { - "size": "18", - "text": "Drive by Attack" - } - } - ] - } - } - }, - { - "ID": "5210", - "typeID": "__group__", - "zOrder": "217", - "measuredW": "168", - "measuredH": "50", - "w": "168", - "h": "50", - "x": "1197", - "y": "4008", - "properties": { - "controlName": "111-security-skills-and-knowledge:attack-types:typo-squatting" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "168", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "121", - "measuredH": "26", - "x": "23", - "y": "12", - "properties": { - "size": "18", - "text": "Typo Squatting" - } - } - ] - } - } - }, - { - "ID": "5211", - "typeID": "__group__", - "zOrder": "218", - "measuredW": "396", - "measuredH": "50", - "w": "396", - "h": "50", - "x": "968", - "y": "4064", - "properties": { - "controlName": "112-security-skills-and-knowledge:attack-types:brute-force-vs-password-spray" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "396", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "252", - "measuredH": "26", - "x": "72", - "y": "12", - "properties": { - "size": "18", - "text": "Brute Force vs Password Spray" - } - } - ] - } - } - }, - { - "ID": "5212", - "typeID": "__group__", - "zOrder": "219", - "measuredW": "110", - "measuredH": "50", - "w": "110", - "h": "50", - "x": "1254", - "y": "3837", - "properties": { - "controlName": "105-security-skills-and-knowledge:attack-types:zero-day" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "110", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "75", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "Zero Day" - } - } - ] - } - } - }, - { - "ID": "5213", - "typeID": "__group__", - "zOrder": "220", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1016", - "y": "3433", - "properties": { - "controlName": "100-security-skills-and-knowledge:malware-and-types" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "327", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "Learn how Malware Operates and Types" - } - } - ] - } - } - }, - { - "ID": "5214", - "typeID": "__group__", - "zOrder": "221", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1016", - "y": "3377", - "properties": { - "controlName": "101-security-skills-and-knowledge:owasp-top-10" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "282", - "measuredH": "26", - "x": "40", - "y": "12", - "properties": { - "size": "18", - "text": "Web Based Attacks and OWASP 10" - } - } - ] - } - } - }, - { - "ID": "5215", - "typeID": "__group__", - "zOrder": "222", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1016", - "y": "3322", - "properties": { - "controlName": "102-security-skills-and-knowledge:privilege-escalation-attacks" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "335", - "measuredH": "26", - "x": "13", - "y": "12", - "properties": { - "size": "18", - "text": "Privilege escalation / User based Attacks" - } - } - ] - } - } - }, - { - "ID": "5216", - "typeID": "__group__", - "zOrder": "223", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1016", - "y": "3267", - "properties": { - "controlName": "103-security-skills-and-knowledge:cia-triad" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "176", - "measuredH": "26", - "x": "93", - "y": "12", - "properties": { - "size": "18", - "text": "Understand CIA Triad" - } - } - ] - } - } - }, - { - "ID": "5217", - "typeID": "__group__", - "zOrder": "224", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1016", - "y": "3212", - "properties": { - "controlName": "104-security-skills-and-knowledge:handshakes" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "202", - "measuredH": "26", - "x": "80", - "y": "12", - "properties": { - "size": "18", - "text": "Understand Handshakes" - } - } - ] - } - } - }, - { - "ID": "5218", - "typeID": "__group__", - "zOrder": "225", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1016", - "y": "3157", - "properties": { - "controlName": "105-security-skills-and-knowledge:threat-intel-osint" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "236", - "measuredH": "26", - "x": "63", - "y": "12", - "properties": { - "size": "18", - "text": "Basics of Threat Intel, OSINT" - } - } - ] - } - } - }, - { - "ID": "5219", - "typeID": "__group__", - "zOrder": "226", - "measuredW": "361", - "measuredH": "81", - "w": "361", - "h": "81", - "x": "1016", - "y": "3071", - "properties": { - "controlName": "106-security-skills-and-knowledge:false-true-negative-positive" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "81", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "251", - "measuredH": "26", - "x": "63", - "y": "12", - "properties": { - "size": "18", - "text": "False Negative / False Positive" - } - }, - { - "ID": "2", - "typeID": "Label", - "zOrder": "2", - "measuredW": "237", - "measuredH": "26", - "x": "63", - "y": "42", - "properties": { - "size": "18", - "text": "True Negative / True Positive" - } - } - ] - } - } - }, - { - "ID": "5220", - "typeID": "__group__", - "zOrder": "227", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "1017", - "y": "3016", - "properties": { - "controlName": "107-security-skills-and-knowledge:blue-team-read-team-purple-team" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "326", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "Blue Team vs Red Team vs Purple Team" - } - } - ] - } - } - }, - { - "ID": "5221", - "typeID": "__group__", - "zOrder": "228", - "measuredW": "182", - "measuredH": "50", - "w": "182", - "h": "50", - "x": "606", - "y": "3209", - "properties": { - "controlName": "113-security-skills-and-knowledge:cyber-kill-chain" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "182", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "130", - "measuredH": "26", - "x": "26", - "y": "12", - "properties": { - "size": "18", - "text": "Cyber Kill Chain" - } - } - ] - } - } - }, - { - "ID": "5222", - "typeID": "__group__", - "zOrder": "229", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "603", - "y": "3265", - "properties": { - "controlName": "112-security-skills-and-knowledge:os-hardening" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "236", - "measuredH": "26", - "x": "63", - "y": "12", - "properties": { - "size": "18", - "text": "Operating System Hardening" - } - } - ] - } - } - }, - { - "ID": "5223", - "typeID": "__group__", - "zOrder": "230", - "measuredW": "171", - "measuredH": "50", - "w": "171", - "h": "50", - "x": "793", - "y": "3209", - "properties": { - "controlName": "114-security-skills-and-knowledge:mfa-2fa" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "171", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "109", - "measuredH": "26", - "x": "31", - "y": "12", - "properties": { - "size": "18", - "text": "MFA and 2FA" - } - } - ] - } - } - }, - { - "ID": "5224", - "typeID": "__group__", - "zOrder": "231", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "604", - "y": "3432", - "properties": { - "controlName": "108-security-skills-and-knowledge:authentication-vs-authorization" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "250", - "measuredH": "26", - "x": "77", - "y": "12", - "properties": { - "size": "18", - "text": "Authentication vs Authorization" - } - } - ] - } - } - }, - { - "ID": "5225", - "typeID": "__group__", - "zOrder": "232", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "604", - "y": "3153", - "properties": { - "controlName": "115-security-skills-and-knowledge:backups-and-resiliency" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "295", - "measuredH": "26", - "x": "38", - "y": "12", - "properties": { - "size": "18", - "text": "Understand Backups and Resiliency" - } - } - ] - } - } - }, - { - "ID": "5226", - "typeID": "__group__", - "zOrder": "233", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "603", - "y": "3042", - "properties": { - "controlName": "117-security-skills-and-knowledge:compliance-and-auditors" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "276", - "measuredH": "26", - "x": "43", - "y": "12", - "properties": { - "size": "18", - "text": "Roles of Compliance and Auditors" - } - } - ] - } - } - }, - { - "ID": "5227", - "typeID": "__group__", - "zOrder": "234", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "603", - "y": "3098", - "properties": { - "controlName": "116-security-skills-and-knowledge:definition-of-risk" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "269", - "measuredH": "26", - "x": "46", - "y": "12", - "properties": { - "size": "18", - "text": "Understand the Definition of Risk" - } - } - ] - } - } - }, - { - "ID": "5228", - "typeID": "__group__", - "zOrder": "235", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "603", - "y": "2987", - "properties": { - "controlName": "118-security-skills-and-knowledge:zero-trust" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "232", - "measuredH": "26", - "x": "65", - "y": "12", - "properties": { - "size": "18", - "text": "Core Concepts of Zero Trust" - } - } - ] - } - } - }, - { - "ID": "5229", - "typeID": "__group__", - "zOrder": "236", - "measuredW": "224", - "measuredH": "50", - "w": "224", - "h": "50", - "x": "603", - "y": "3376", - "properties": { - "controlName": "109-security-skills-and-knowledge:basics-of-ids-ips" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "224", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "178", - "measuredH": "26", - "x": "23", - "y": "12", - "properties": { - "size": "18", - "text": "Basics of IDS and IPS" - } - } - ] - } - } - }, - { - "ID": "5230", - "typeID": "__group__", - "zOrder": "237", - "measuredW": "129", - "measuredH": "50", - "w": "129", - "h": "50", - "x": "835", - "y": "3376", - "properties": { - "controlName": "110-security-skills-and-knowledge:honeypots" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "129", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "88", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "Honeypots" - } - } - ] - } - } - }, - { - "ID": "5231", - "typeID": "__group__", - "zOrder": "238", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "603", - "y": "3320", - "properties": { - "controlName": "111-security-skills-and-knowledge:concept-of-isolation" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "296", - "measuredH": "26", - "x": "33", - "y": "12", - "properties": { - "size": "18", - "text": "Understand the Concept of Isolation" - } - } - ] - } - } - }, - { - "ID": "5232", - "typeID": "__group__", - "zOrder": "239", - "measuredW": "379", - "measuredH": "50", - "w": "379", - "h": "50", - "x": "161", - "y": "3431", - "properties": { - "controlName": "119-security-skills-and-knowledge:perimiter-dmz-segmentation" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "379", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "281", - "measuredH": "26", - "x": "49", - "y": "12", - "properties": { - "size": "18", - "text": "Perimiter vs DMZ vs Segmentation" - } - } - ] - } - } - }, - { - "ID": "5233", - "typeID": "__group__", - "zOrder": "240", - "measuredW": "379", - "measuredH": "50", - "w": "379", - "h": "50", - "x": "161", - "y": "3377", - "properties": { - "controlName": "120-security-skills-and-knowledge:penetration-rules-of-engagement" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "379", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "339", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "Penetration Testing Rules of Engagement" - } - } - ] - } - } - }, - { - "ID": "5234", - "typeID": "__group__", - "zOrder": "241", - "measuredW": "379", - "measuredH": "50", - "w": "379", - "h": "50", - "x": "161", - "y": "3323", - "properties": { - "controlName": "121-security-skills-and-knowledge:basics-of-reverse-engineering" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "379", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "253", - "measuredH": "26", - "x": "63", - "y": "12", - "properties": { - "size": "18", - "text": "Basics of Reverse Engineering" - } - } - ] - } - } - }, - { - "ID": "5235", - "typeID": "__group__", - "zOrder": "242", - "measuredW": "379", - "measuredH": "50", - "w": "379", - "h": "50", - "x": "161", - "y": "3268", - "properties": { - "controlName": "122-security-skills-and-knowledge:vulnerability-management" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "379", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "289", - "measuredH": "26", - "x": "45", - "y": "12", - "properties": { - "size": "18", - "text": "Basics of Vulnerability Management" - } - } - ] - } - } - }, - { - "ID": "5236", - "typeID": "__group__", - "zOrder": "243", - "measuredW": "379", - "measuredH": "50", - "w": "379", - "h": "50", - "x": "161", - "y": "3214", - "properties": { - "controlName": "123-security-skills-and-knowledge:threat-hunting" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "379", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "319", - "measuredH": "26", - "x": "30", - "y": "12", - "properties": { - "size": "18", - "text": "Basics and Concepts of Threat Hunting" - } - } - ] - } - } - }, - { - "ID": "5237", - "typeID": "__group__", - "zOrder": "244", - "measuredW": "379", - "measuredH": "50", - "w": "379", - "h": "50", - "x": "161", - "y": "3159", - "properties": { - "controlName": "124-security-skills-and-knowledge:forensics" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "379", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "260", - "measuredH": "26", - "x": "60", - "y": "12", - "properties": { - "size": "18", - "text": "Understand Basics of Forensics" - } - } - ] - } - } - }, - { - "ID": "5238", - "typeID": "__group__", - "zOrder": "245", - "measuredW": "379", - "measuredH": "50", - "w": "379", - "h": "50", - "x": "161", - "y": "3105", - "properties": { - "controlName": "125-security-skills-and-knowledge:runbooks" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "379", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "277", - "measuredH": "26", - "x": "51", - "y": "12", - "properties": { - "size": "18", - "text": "Understand Concept of Runbooks" - } - } - ] - } - } - }, - { - "ID": "5239", - "typeID": "__group__", - "zOrder": "246", - "measuredW": "379", - "measuredH": "50", - "w": "379", - "h": "50", - "x": "161", - "y": "3050", - "properties": { - "controlName": "126-security-skills-and-knowledge:defense-in-depth" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "379", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "338", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "Understand Concept of Defense in Depth" - } - } - ] - } - } - }, - { - "ID": "5240", - "typeID": "__group__", - "zOrder": "247", - "measuredW": "379", - "measuredH": "50", - "w": "379", - "h": "50", - "x": "161", - "y": "2996", - "properties": { - "controlName": "127-security-skills-and-knowledge:common-exploit-frameworks" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "379", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "338", - "measuredH": "26", - "x": "21", - "y": "13", - "properties": { - "size": "18", - "text": "Understand Common Exploit Frameworks" - } - } - ] - } - } - }, - { - "ID": "5241", - "typeID": "TextArea", - "zOrder": "248", - "w": "433", - "h": "200", - "measuredW": "200", - "measuredH": "140", - "x": "949", - "y": "4417" - }, - { - "ID": "5242", - "typeID": "TextArea", - "zOrder": "249", - "w": "433", - "h": "292", - "measuredW": "200", - "measuredH": "140", - "x": "949", - "y": "4132" - }, - { - "ID": "5243", - "typeID": "Label", - "zOrder": "250", - "measuredW": "267", - "measuredH": "26", - "x": "1033", - "y": "4150", - "properties": { - "size": "18", - "text": "Common Network Based Attacks" - } - }, - { - "ID": "5244", - "typeID": "__group__", - "zOrder": "251", - "measuredW": "144", - "measuredH": "50", - "w": "144", - "h": "50", - "x": "969", - "y": "4188", - "properties": { - "controlName": "100-security-skills-and-knowledge:common-network-based-attacks:dos-vs-ddos" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "144", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "109", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "DoS vs DDoS" - } - } - ] - } - } - }, - { - "ID": "5245", - "typeID": "__group__", - "zOrder": "252", - "measuredW": "107", - "measuredH": "50", - "w": "107", - "h": "50", - "x": "969", - "y": "4244", - "properties": { - "controlName": "103-security-skills-and-knowledge:common-network-based-attacks:evil-twin" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "107", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "69", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "Evil Twin" - } - } - ] - } - } - }, - { - "ID": "5246", - "typeID": "__group__", - "zOrder": "253", - "measuredW": "77", - "measuredH": "50", - "w": "77", - "h": "50", - "x": "1120", - "y": "4188", - "properties": { - "controlName": "101-security-skills-and-knowledge:common-network-based-attacks:mitm" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "77", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "48", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "MITM" - } - } - ] - } - } - }, - { - "ID": "5247", - "typeID": "__group__", - "zOrder": "254", - "measuredW": "154", - "measuredH": "50", - "w": "154", - "h": "50", - "x": "1085", - "y": "4247", - "properties": { - "controlName": "104-security-skills-and-knowledge:common-network-based-attacks:dns-poisoning" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "154", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "122", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "DNS Poisoning" - } - } - ] - } - } - }, - { - "ID": "5248", - "typeID": "__group__", - "zOrder": "255", - "measuredW": "155", - "measuredH": "50", - "w": "155", - "h": "50", - "x": "1206", - "y": "4188", - "properties": { - "controlName": "102-security-skills-and-knowledge:common-network-based-attacks:arp-poisoning" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "155", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "120", - "measuredH": "26", - "x": "18", - "y": "12", - "properties": { - "size": "18", - "text": "ARP Poisoning" - } - } - ] - } - } - }, - { - "ID": "5249", - "typeID": "__group__", - "zOrder": "256", - "measuredW": "113", - "measuredH": "50", - "w": "113", - "h": "50", - "x": "1248", - "y": "4247", - "properties": { - "controlName": "105-security-skills-and-knowledge:common-network-based-attacks:spoofing" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "113", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "72", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "Spoofing" - } - } - ] - } - } - }, - { - "ID": "5250", - "typeID": "__group__", - "zOrder": "257", - "measuredW": "196", - "measuredH": "50", - "w": "196", - "h": "50", - "x": "969", - "y": "4303", - "properties": { - "controlName": "106-security-skills-and-knowledge:common-network-based-attacks:deauth-attack" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "196", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "115", - "measuredH": "26", - "x": "40", - "y": "12", - "properties": { - "size": "18", - "text": "Deauth Attack" - } - } - ] - } - } - }, - { - "ID": "5251", - "typeID": "__group__", - "zOrder": "258", - "measuredW": "188", - "measuredH": "50", - "w": "188", - "h": "50", - "x": "1173", - "y": "4304", - "properties": { - "controlName": "107-security-skills-and-knowledge:common-network-based-attacks:vlan-hopping" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "188", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "120", - "measuredH": "26", - "x": "33", - "y": "12", - "properties": { - "size": "18", - "text": "VLAN Hopping" - } - } - ] - } - } - }, - { - "ID": "5252", - "typeID": "__group__", - "zOrder": "259", - "measuredW": "196", - "measuredH": "50", - "w": "196", - "h": "50", - "x": "969", - "y": "4360", - "properties": { - "controlName": "108-security-skills-and-knowledge:common-network-based-attacks:rogue-access-point" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "196", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "163", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "Rogue Access Point" - } - } - ] - } - } - }, - { - "ID": "5253", - "typeID": "__group__", - "zOrder": "260", - "measuredW": "188", - "measuredH": "50", - "w": "188", - "h": "50", - "x": "1173", - "y": "4360", - "properties": { - "controlName": "109-security-skills-and-knowledge:common-network-based-attacks:war-driving-dialing" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "188", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "153", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "War-driving/dialing" - } - } - ] - } - } - }, - { - "ID": "5254", - "typeID": "__group__", - "zOrder": "261", - "measuredW": "157", - "measuredH": "50", - "w": "157", - "h": "50", - "x": "973", - "y": "4439", - "properties": { - "controlName": "100-security-skills-and-knowledge:other-attacks:buffer-overflow" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "157", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "124", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "Buffer Overflow" - } - } - ] - } - } - }, - { - "ID": "5255", - "typeID": "__group__", - "zOrder": "262", - "measuredW": "146", - "measuredH": "50", - "w": "146", - "h": "50", - "x": "1139", - "y": "4439", - "properties": { - "controlName": "101-security-skills-and-knowledge:other-attacks:memory-leak" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "146", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "110", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "Memory Leak" - } - } - ] - } - } - }, - { - "ID": "5256", - "typeID": "__group__", - "zOrder": "263", - "measuredW": "145", - "measuredH": "50", - "w": "145", - "h": "50", - "x": "973", - "y": "4496", - "properties": { - "controlName": "103-security-skills-and-knowledge:other-attacks:sql-injection" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "145", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "111", - "measuredH": "26", - "x": "18", - "y": "12", - "properties": { - "size": "18", - "text": "SQL Injection" - } - } - ] - } - } - }, - { - "ID": "5257", - "typeID": "__group__", - "zOrder": "264", - "measuredW": "67", - "measuredH": "50", - "w": "67", - "h": "50", - "x": "1293", - "y": "4439", - "properties": { - "controlName": "102-security-skills-and-knowledge:other-attacks:xss" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "67", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "32", - "measuredH": "26", - "x": "18", - "y": "12", - "properties": { - "size": "18", - "text": "XSS" - } - } - ] - } - } - }, - { - "ID": "5258", - "typeID": "__group__", - "zOrder": "265", - "measuredW": "81", - "measuredH": "50", - "w": "81", - "h": "50", - "x": "1127", - "y": "4496", - "properties": { - "controlName": "104-security-skills-and-knowledge:other-attacks:csrf" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "81", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "48", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "CSRF" - } - } - ] - } - } - }, - { - "ID": "5259", - "typeID": "__group__", - "zOrder": "266", - "measuredW": "158", - "measuredH": "50", - "w": "158", - "h": "50", - "x": "972", - "y": "4553", - "properties": { - "controlName": "106-security-skills-and-knowledge:other-attacks:pass-the-hash" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "158", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "117", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "Pass the Hash" - } - } - ] - } - } - }, - { - "ID": "5260", - "typeID": "__group__", - "zOrder": "267", - "measuredW": "143", - "measuredH": "50", - "w": "143", - "h": "50", - "x": "1217", - "y": "4496", - "properties": { - "controlName": "105-security-skills-and-knowledge:other-attacks:replay-attack" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "143", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "111", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "Replay Attack" - } - } - ] - } - } - }, - { - "ID": "5261", - "typeID": "__group__", - "zOrder": "268", - "measuredW": "221", - "measuredH": "50", - "w": "221", - "h": "50", - "x": "1139", - "y": "4553", - "properties": { - "controlName": "107-security-skills-and-knowledge:other-attacks:directory-traversal" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "221", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "153", - "measuredH": "26", - "x": "34", - "y": "12", - "properties": { - "size": "18", - "text": "Directory Traversal" - } - } - ] - } - } - }, - { - "ID": "5262", - "typeID": "__group__", - "zOrder": "269", - "measuredW": "100", - "measuredH": "50", - "w": "100", - "h": "50", - "x": "557", - "y": "4074", - "properties": { - "controlName": "100-security-skills-and-knowledge:understand-the-following-terms:antivirus" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "100", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "69", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "Antivirus" - } - } - ] - } - } - }, - { - "ID": "5263", - "typeID": "__group__", - "zOrder": "270", - "measuredW": "124", - "measuredH": "50", - "w": "124", - "h": "50", - "x": "665", - "y": "4074", - "properties": { - "controlName": "101-security-skills-and-knowledge:understand-the-following-terms:antimalware" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "124", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "99", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "Antimalware" - } - } - ] - } - } - }, - { - "ID": "5264", - "typeID": "__group__", - "zOrder": "271", - "measuredW": "67", - "measuredH": "50", - "w": "67", - "h": "50", - "x": "795", - "y": "4074", - "properties": { - "controlName": "102-security-skills-and-knowledge:understand-the-following-terms:edr" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "67", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "38", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "EDR" - } - } - ] - } - } - }, - { - "ID": "5265", - "typeID": "__group__", - "zOrder": "272", - "measuredW": "67", - "measuredH": "50", - "w": "67", - "h": "50", - "x": "867", - "y": "4074", - "properties": { - "controlName": "103-security-skills-and-knowledge:understand-the-following-terms:dlp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "67", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "35", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "DLP" - } - } - ] - } - } - }, - { - "ID": "5266", - "typeID": "__group__", - "zOrder": "273", - "measuredW": "270", - "measuredH": "50", - "w": "270", - "h": "50", - "x": "557", - "y": "4131", - "properties": { - "controlName": "104-security-skills-and-knowledge:understand-the-following-terms:firewall-nextgen-firewall" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "270", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "239", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "Firewall and Nextgen Firewall" - } - } - ] - } - } - }, - { - "ID": "5267", - "typeID": "__group__", - "zOrder": "274", - "measuredW": "100", - "measuredH": "50", - "w": "100", - "h": "50", - "x": "834", - "y": "4132", - "properties": { - "controlName": "105-security-skills-and-knowledge:understand-the-following-terms:hips" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "100", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "41", - "measuredH": "26", - "x": "29", - "y": "12", - "properties": { - "size": "18", - "text": "HIPS" - } - } - ] - } - } - }, - { - "ID": "5268", - "typeID": "__group__", - "zOrder": "275", - "measuredW": "67", - "measuredH": "50", - "w": "67", - "h": "50", - "x": "557", - "y": "4187", - "properties": { - "controlName": "106-security-skills-and-knowledge:understand-the-following-terms:nids" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "67", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "44", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "NIDS" - } - } - ] - } - } - }, - { - "ID": "5269", - "typeID": "__group__", - "zOrder": "276", - "measuredW": "67", - "measuredH": "50", - "w": "67", - "h": "50", - "x": "629", - "y": "4187", - "properties": { - "controlName": "107-security-skills-and-knowledge:understand-the-following-terms:nips" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "67", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "42", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "NIPS" - } - } - ] - } - } - }, - { - "ID": "5270", - "typeID": "__group__", - "zOrder": "277", - "measuredW": "231", - "measuredH": "50", - "w": "231", - "h": "50", - "x": "701", - "y": "4188", - "properties": { - "controlName": "108-security-skills-and-knowledge:understand-the-following-terms:host-based-firewall" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "231", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "162", - "measuredH": "26", - "x": "35", - "y": "12", - "properties": { - "size": "18", - "text": "Host Based Firewall" - } - } - ] - } - } - }, - { - "ID": "5271", - "typeID": "__group__", - "zOrder": "278", - "measuredW": "126", - "measuredH": "50", - "w": "126", - "h": "50", - "x": "557", - "y": "4242", - "properties": { - "controlName": "109-security-skills-and-knowledge:understand-the-following-terms:sandboxing" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "126", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "95", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "Sandboxing" - } - } - ] - } - } - }, - { - "ID": "5272", - "typeID": "__group__", - "zOrder": "279", - "measuredW": "64", - "measuredH": "50", - "w": "64", - "h": "50", - "x": "689", - "y": "4242", - "properties": { - "controlName": "110-security-skills-and-knowledge:understand-the-following-terms:acl" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "64", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "34", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "ACL" - } - } - ] - } - } - }, - { - "ID": "5273", - "typeID": "__group__", - "zOrder": "280", - "measuredW": "279", - "measuredH": "50", - "w": "279", - "h": "50", - "x": "558", - "y": "4298", - "properties": { - "controlName": "112-security-skills-and-knowledge:understand-the-following-terms:wpa-vs-wpa2-vs-wpa3-vs-wep" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "279", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "254", - "measuredH": "26", - "x": "13", - "y": "12", - "properties": { - "size": "18", - "text": "WPA vs WPA2 vs WPA3 vs WEP" - } - } - ] - } - } - }, - { - "ID": "5274", - "typeID": "__group__", - "zOrder": "281", - "measuredW": "173", - "measuredH": "50", - "w": "173", - "h": "50", - "x": "759", - "y": "4242", - "properties": { - "controlName": "111-security-skills-and-knowledge:understand-the-following-terms:eap-vs-peap" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "173", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "107", - "measuredH": "26", - "x": "33", - "y": "12", - "properties": { - "size": "18", - "text": "EAP vs PEAP" - } - } - ] - } - } - }, - { - "ID": "5275", - "typeID": "__group__", - "zOrder": "282", - "measuredW": "90", - "measuredH": "50", - "w": "90", - "h": "50", - "x": "842", - "y": "4297", - "properties": { - "controlName": "113-security-skills-and-knowledge:understand-the-following-terms:wps" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "90", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "39", - "measuredH": "26", - "x": "25", - "y": "12", - "properties": { - "size": "18", - "text": "WPS" - } - } - ] - } - } - }, - { - "ID": "5276", - "typeID": "__group__", - "zOrder": "283", - "measuredW": "162", - "measuredH": "50", - "w": "162", - "h": "50", - "x": "558", - "y": "4426", - "properties": { - "controlName": "100-security-skills-and-knowledge:incident-response-process:preparation" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "162", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "96", - "measuredH": "26", - "x": "33", - "y": "12", - "properties": { - "size": "18", - "text": "Preparation" - } - } - ] - } - } - }, - { - "ID": "5277", - "typeID": "__group__", - "zOrder": "284", - "measuredW": "206", - "measuredH": "50", - "w": "206", - "h": "50", - "x": "729", - "y": "4426", - "properties": { - "controlName": "101-security-skills-and-knowledge:incident-response-process:identification" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "206", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "106", - "measuredH": "26", - "x": "50", - "y": "12", - "properties": { - "size": "18", - "text": "Identification" - } - } - ] - } - } - }, - { - "ID": "5278", - "typeID": "__group__", - "zOrder": "285", - "measuredW": "162", - "measuredH": "50", - "w": "162", - "h": "50", - "x": "558", - "y": "4483", - "properties": { - "controlName": "102-security-skills-and-knowledge:incident-response-process:containment" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "162", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "105", - "measuredH": "26", - "x": "28", - "y": "12", - "properties": { - "size": "18", - "text": "Containment" - } - } - ] - } - } - }, - { - "ID": "5279", - "typeID": "__group__", - "zOrder": "286", - "measuredW": "206", - "measuredH": "50", - "w": "206", - "h": "50", - "x": "729", - "y": "4483", - "properties": { - "controlName": "103-security-skills-and-knowledge:incident-response-process:eradication" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "206", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "93", - "measuredH": "26", - "x": "56", - "y": "12", - "properties": { - "size": "18", - "text": "Eradication" - } - } - ] - } - } - }, - { - "ID": "5280", - "typeID": "__group__", - "zOrder": "287", - "measuredW": "162", - "measuredH": "50", - "w": "162", - "h": "50", - "x": "558", - "y": "4540", - "properties": { - "controlName": "104-security-skills-and-knowledge:incident-response-process:recovery" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "162", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "78", - "measuredH": "26", - "x": "42", - "y": "12", - "properties": { - "size": "18", - "text": "Recovery" - } - } - ] - } - } - }, - { - "ID": "5281", - "typeID": "__group__", - "zOrder": "288", - "measuredW": "207", - "measuredH": "50", - "w": "207", - "h": "50", - "x": "729", - "y": "4540", - "properties": { - "controlName": "105-security-skills-and-knowledge:incident-response-process:lessons-learned" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "207", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "141", - "measuredH": "26", - "x": "32", - "y": "12", - "properties": { - "size": "18", - "text": "Lessons Learned" - } - } - ] - } - } - }, - { - "ID": "5282", - "typeID": "__group__", - "zOrder": "289", - "measuredW": "75", - "measuredH": "50", - "w": "75", - "h": "50", - "x": "136", - "y": "3716", - "properties": { - "controlName": "100-security-skills-and-knowledge:incident-response-and-discovery-tools:nmap" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "75", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "46", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "nmap" - } - } - ] - } - } - }, - { - "ID": "5283", - "typeID": "__group__", - "zOrder": "290", - "measuredW": "75", - "measuredH": "50", - "w": "75", - "h": "50", - "x": "219", - "y": "3716", - "properties": { - "controlName": "101-security-skills-and-knowledge:incident-response-and-discovery-tools:tracert" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "75", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "55", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "tracert" - } - } - ] - } - } - }, - { - "ID": "5284", - "typeID": "__group__", - "zOrder": "291", - "measuredW": "96", - "measuredH": "50", - "w": "96", - "h": "50", - "x": "301", - "y": "3717", - "properties": { - "controlName": "102-security-skills-and-knowledge:incident-response-and-discovery-tools:nslookup" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "96", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "73", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "nslookup" - } - } - ] - } - } - }, - { - "ID": "5285", - "typeID": "__group__", - "zOrder": "292", - "measuredW": "53", - "measuredH": "50", - "w": "53", - "h": "50", - "x": "403", - "y": "3717", - "properties": { - "controlName": "103-security-skills-and-knowledge:incident-response-and-discovery-tools:dig" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "53", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "25", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "dig" - } - } - ] - } - } - }, - { - "ID": "5286", - "typeID": "__group__", - "zOrder": "293", - "measuredW": "65", - "measuredH": "50", - "w": "65", - "h": "50", - "x": "464", - "y": "3717", - "properties": { - "controlName": "104-security-skills-and-knowledge:incident-response-and-discovery-tools:curl" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "65", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "31", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "curl" - } - } - ] - } - } - }, - { - "ID": "5287", - "typeID": "__group__", - "zOrder": "294", - "measuredW": "90", - "measuredH": "50", - "w": "90", - "h": "50", - "x": "134", - "y": "3773", - "properties": { - "controlName": "105-security-skills-and-knowledge:incident-response-and-discovery-tools:ipconfig" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "90", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "64", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "ipconfig" - } - } - ] - } - } - }, - { - "ID": "5288", - "typeID": "__group__", - "zOrder": "295", - "measuredW": "68", - "measuredH": "50", - "w": "68", - "h": "50", - "x": "230", - "y": "3773", - "properties": { - "controlName": "106-security-skills-and-knowledge:incident-response-and-discovery-tools:hping" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "68", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "46", - "measuredH": "26", - "x": "13", - "y": "12", - "properties": { - "size": "18", - "text": "hping" - } - } - ] - } - } - }, - { - "ID": "5289", - "typeID": "__group__", - "zOrder": "296", - "measuredW": "59", - "measuredH": "50", - "w": "59", - "h": "50", - "x": "305", - "y": "3773", - "properties": { - "controlName": "107-security-skills-and-knowledge:incident-response-and-discovery-tools:ping" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "59", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "36", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "ping" - } - } - ] - } - } - }, - { - "ID": "5290", - "typeID": "__group__", - "zOrder": "297", - "measuredW": "51", - "measuredH": "50", - "w": "51", - "h": "50", - "x": "371", - "y": "3773", - "properties": { - "controlName": "108-security-skills-and-knowledge:incident-response-and-discovery-tools:arp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "51", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "28", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "arp" - } - } - ] - } - } - }, - { - "ID": "5291", - "typeID": "__group__", - "zOrder": "298", - "measuredW": "51", - "measuredH": "50", - "w": "51", - "h": "50", - "x": "429", - "y": "3773", - "properties": { - "controlName": "109-security-skills-and-knowledge:incident-response-and-discovery-tools:cat" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "51", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "26", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "cat" - } - } - ] - } - } - }, - { - "ID": "5292", - "typeID": "__group__", - "zOrder": "299", - "measuredW": "43", - "measuredH": "50", - "w": "43", - "h": "50", - "x": "486", - "y": "3773", - "properties": { - "controlName": "110-security-skills-and-knowledge:incident-response-and-discovery-tools:dd" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "43", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "21", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "dd" - } - } - ] - } - } - }, - { - "ID": "5293", - "typeID": "__group__", - "zOrder": "300", - "measuredW": "70", - "measuredH": "50", - "w": "70", - "h": "50", - "x": "134", - "y": "3829", - "properties": { - "controlName": "111-security-skills-and-knowledge:incident-response-and-discovery-tools:head" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "70", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "42", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "head" - } - } - ] - } - } - }, - { - "ID": "5294", - "typeID": "__group__", - "zOrder": "301", - "measuredW": "51", - "measuredH": "50", - "w": "51", - "h": "50", - "x": "211", - "y": "3829", - "properties": { - "controlName": "112-security-skills-and-knowledge:incident-response-and-discovery-tools:tail" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "51", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "24", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "tail" - } - } - ] - } - } - }, - { - "ID": "5295", - "typeID": "__group__", - "zOrder": "302", - "measuredW": "59", - "measuredH": "50", - "w": "59", - "h": "50", - "x": "269", - "y": "3829", - "properties": { - "controlName": "113-security-skills-and-knowledge:incident-response-and-discovery-tools:grep" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "59", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "38", - "measuredH": "26", - "x": "13", - "y": "12", - "properties": { - "size": "18", - "text": "grep" - } - } - ] - } - } - }, - { - "ID": "5296", - "typeID": "__group__", - "zOrder": "303", - "measuredW": "100", - "measuredH": "50", - "w": "100", - "h": "50", - "x": "334", - "y": "3829", - "properties": { - "controlName": "114-security-skills-and-knowledge:incident-response-and-discovery-tools:wireshark" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "100", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "78", - "measuredH": "26", - "x": "13", - "y": "12", - "properties": { - "size": "18", - "text": "wireshark" - } - } - ] - } - } - }, - { - "ID": "5297", - "typeID": "__group__", - "zOrder": "304", - "measuredW": "88", - "measuredH": "50", - "w": "88", - "h": "50", - "x": "441", - "y": "3829", - "properties": { - "controlName": "115-security-skills-and-knowledge:incident-response-and-discovery-tools:winhex" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "88", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "56", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "winhex" - } - } - ] - } - } - }, - { - "ID": "5298", - "typeID": "__group__", - "zOrder": "305", - "measuredW": "114", - "measuredH": "50", - "w": "114", - "h": "50", - "x": "134", - "y": "3886", - "properties": { - "controlName": "116-security-skills-and-knowledge:incident-response-and-discovery-tools:memdump" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "114", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "87", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "memdump" - } - } - ] - } - } - }, - { - "ID": "5299", - "typeID": "__group__", - "zOrder": "306", - "measuredW": "123", - "measuredH": "50", - "w": "123", - "h": "50", - "x": "255", - "y": "3886", - "properties": { - "controlName": "117-security-skills-and-knowledge:incident-response-and-discovery-tools:ftk-imager" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "123", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "97", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "FTK Imager" - } - } - ] - } - } - }, - { - "ID": "5300", - "typeID": "__group__", - "zOrder": "307", - "measuredW": "143", - "measuredH": "50", - "w": "143", - "h": "50", - "x": "386", - "y": "3886", - "properties": { - "controlName": "118-security-skills-and-knowledge:incident-response-and-discovery-tools:autopsy" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "143", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "64", - "measuredH": "26", - "x": "40", - "y": "12", - "properties": { - "size": "18", - "text": "autopsy" - } - } - ] - } - } - }, - { - "ID": "5301", - "typeID": "__group__", - "zOrder": "308", - "measuredW": "99", - "measuredH": "50", - "w": "99", - "h": "50", - "x": "134", - "y": "4004", - "properties": { - "controlName": "100-security-skills-and-knowledge:uderstand-frameworks:attck" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "99", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "68", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "ATT&CK" - } - } - ] - } - } - }, - { - "ID": "5302", - "typeID": "__group__", - "zOrder": "309", - "measuredW": "99", - "measuredH": "50", - "w": "99", - "h": "50", - "x": "243", - "y": "4004", - "properties": { - "controlName": "101-security-skills-and-knowledge:uderstand-frameworks:kill-chain" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "99", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "73", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "Kill chain" - } - } - ] - } - } - }, - { - "ID": "5303", - "typeID": "__group__", - "zOrder": "310", - "measuredW": "170", - "measuredH": "50", - "w": "170", - "h": "50", - "x": "352", - "y": "4004", - "properties": { - "controlName": "102-security-skills-and-knowledge:uderstand-frameworks:diamond-model" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "170", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "129", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "Diamond Model" - } - } - ] - } - } - }, - { - "ID": "5304", - "typeID": "__group__", - "zOrder": "311", - "measuredW": "59", - "measuredH": "50", - "w": "59", - "h": "50", - "x": "157", - "y": "4124", - "properties": { - "controlName": "100-security-skills-and-knowledge:common-standards:iso" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "59", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "31", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "ISO" - } - } - ] - } - } - }, - { - "ID": "5305", - "typeID": "__group__", - "zOrder": "312", - "measuredW": "70", - "measuredH": "50", - "w": "70", - "h": "50", - "x": "224", - "y": "4124", - "properties": { - "controlName": "101-security-skills-and-knowledge:common-standards:nist" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "70", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "41", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "NIST" - } - } - ] - } - } - }, - { - "ID": "5306", - "typeID": "__group__", - "zOrder": "313", - "measuredW": "59", - "measuredH": "50", - "w": "59", - "h": "50", - "x": "300", - "y": "4124", - "properties": { - "controlName": "102-security-skills-and-knowledge:common-standards:rmf" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "59", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "40", - "measuredH": "26", - "x": "10", - "y": "12", - "properties": { - "size": "18", - "text": "RMF" - } - } - ] - } - } - }, - { - "ID": "5307", - "typeID": "__group__", - "zOrder": "314", - "measuredW": "59", - "measuredH": "50", - "w": "59", - "h": "50", - "x": "365", - "y": "4124", - "properties": { - "controlName": "103-security-skills-and-knowledge:common-standards:cis" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "59", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "30", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "CIS" - } - } - ] - } - } - }, - { - "ID": "5308", - "typeID": "__group__", - "zOrder": "315", - "measuredW": "59", - "measuredH": "50", - "w": "59", - "h": "50", - "x": "432", - "y": "4124", - "properties": { - "controlName": "104-security-skills-and-knowledge:common-standards:csf" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "59", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "35", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "CSF" - } - } - ] - } - } - }, - { - "ID": "5309", - "typeID": "Label", - "zOrder": "316", - "measuredW": "96", - "measuredH": "26", - "x": "156", - "y": "4205", - "properties": { - "size": "18", - "text": "Understand" - } - }, - { - "ID": "5310", - "typeID": "__group__", - "zOrder": "317", - "measuredW": "62", - "measuredH": "50", - "w": "62", - "h": "50", - "x": "133", - "y": "4242", - "properties": { - "controlName": "100-security-skills-and-knowledge:understand:siem" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "62", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "44", - "measuredH": "26", - "x": "9", - "y": "12", - "properties": { - "size": "18", - "text": "SIEM" - } - } - ] - } - } - }, - { - "ID": "5311", - "typeID": "__group__", - "zOrder": "318", - "measuredW": "70", - "measuredH": "50", - "w": "70", - "h": "50", - "x": "201", - "y": "4243", - "properties": { - "controlName": "102-security-skills-and-knowledge:understand:soar" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "70", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "48", - "measuredH": "26", - "x": "11", - "y": "12", - "properties": { - "size": "18", - "text": "SOAR" - } - } - ] - } - } - }, - { - "ID": "5312", - "typeID": "Label", - "zOrder": "319", - "measuredW": "233", - "measuredH": "26", - "x": "294", - "y": "4203", - "properties": { - "size": "18", - "text": "Common Distros for Hacking" - } - }, - { - "ID": "5313", - "typeID": "__group__", - "zOrder": "320", - "measuredW": "98", - "measuredH": "50", - "w": "98", - "h": "50", - "x": "298", - "y": "4243", - "properties": { - "controlName": "100-security-skills-and-knowledge:common-distros-for-hacking:parrot-os" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "98", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "74", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "ParrotOS" - } - } - ] - } - } - }, - { - "ID": "5314", - "typeID": "__group__", - "zOrder": "321", - "measuredW": "123", - "measuredH": "50", - "w": "123", - "h": "50", - "x": "404", - "y": "4243", - "properties": { - "controlName": "101-security-skills-and-knowledge:common-distros-for-hacking:kali-linux" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "123", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "78", - "measuredH": "26", - "x": "23", - "y": "12", - "properties": { - "size": "18", - "text": "Kali Linux" - } - } - ] - } - } - }, - { - "ID": "5315", - "typeID": "__group__", - "zOrder": "322", - "measuredW": "365", - "measuredH": "50", - "w": "365", - "h": "50", - "x": "140", - "y": "4360", - "properties": { - "controlName": "100-security-skills-and-knowledge:tools-for-unintended-purposes:lolbas" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "365", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "69", - "measuredH": "26", - "x": "148", - "y": "12", - "properties": { - "size": "18", - "text": "LOLBAS" - } - } - ] - } - } - }, - { - "ID": "5316", - "typeID": "__group__", - "zOrder": "323", - "measuredW": "166", - "measuredH": "50", - "w": "166", - "h": "50", - "x": "133", - "y": "4485", - "properties": { - "controlName": "100-security-skills-and-knowledge:find-and-use-logs:event-logs" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "166", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "91", - "measuredH": "26", - "x": "37", - "y": "12", - "properties": { - "size": "18", - "text": "Event Logs" - } - } - ] - } - } - }, - { - "ID": "5317", - "typeID": "__group__", - "zOrder": "324", - "measuredW": "97", - "measuredH": "50", - "w": "97", - "h": "50", - "x": "310", - "y": "4485", - "properties": { - "controlName": "101-security-skills-and-knowledge:find-and-use-logs:syslogs" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "97", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "60", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "syslogs" - } - } - ] - } - } - }, - { - "ID": "5318", - "typeID": "__group__", - "zOrder": "325", - "measuredW": "106", - "measuredH": "50", - "w": "106", - "h": "50", - "x": "418", - "y": "4485", - "properties": { - "controlName": "102-security-skills-and-knowledge:find-and-use-logs:netflow" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "106", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "58", - "measuredH": "26", - "x": "24", - "y": "12", - "properties": { - "size": "18", - "text": "netflow" - } - } - ] - } - } - }, - { - "ID": "5319", - "typeID": "__group__", - "zOrder": "326", - "measuredW": "166", - "measuredH": "50", - "w": "166", - "h": "50", - "x": "133", - "y": "4543", - "properties": { - "controlName": "103-security-skills-and-knowledge:find-and-use-logs:packet-captures" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "166", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "135", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "Packet Captures" - } - } - ] - } - } - }, - { - "ID": "5320", - "typeID": "__group__", - "zOrder": "327", - "measuredW": "213", - "measuredH": "50", - "w": "213", - "h": "50", - "x": "311", - "y": "4543", - "properties": { - "controlName": "104-security-skills-and-knowledge:find-and-use-logs:firewall-logs" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "213", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "107", - "measuredH": "26", - "x": "53", - "y": "12", - "properties": { - "size": "18", - "text": "Firewall Logs" - } - } - ] - } - } - }, - { - "ID": "5321", - "typeID": "__group__", - "zOrder": "328", - "measuredW": "424", - "measuredH": "254", - "w": "424", - "h": "254", - "x": "118", - "y": "4613", - "properties": { - "controlName": "103-security-skills-and-knowledge:hardening-concepts" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "424", - "h": "254", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "269", - "measuredH": "26", - "x": "77", - "y": "21", - "properties": { - "size": "18", - "text": "Understand Hardening Concepts" - } - } - ] - } - } - }, - { - "ID": "5322", - "typeID": "__group__", - "zOrder": "329", - "measuredW": "124", - "measuredH": "50", - "w": "124", - "h": "50", - "x": "133", - "y": "4675", - "properties": { - "controlName": "100-security-skills-and-knowledge:hardening-concepts:mac-based" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "124", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "96", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "MAC-based" - } - } - ] - } - } - }, - { - "ID": "5323", - "typeID": "__group__", - "zOrder": "330", - "measuredW": "126", - "measuredH": "50", - "w": "126", - "h": "50", - "x": "266", - "y": "4675", - "properties": { - "controlName": "101-security-skills-and-knowledge:hardening-concepts:nac-based" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "126", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "94", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "NAC-based" - } - } - ] - } - } - }, - { - "ID": "5324", - "typeID": "__group__", - "zOrder": "331", - "measuredW": "132", - "measuredH": "50", - "w": "132", - "h": "50", - "x": "397", - "y": "4675", - "properties": { - "controlName": "102-security-skills-and-knowledge:hardening-concepts:port-blocking" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "132", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "108", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "Port Blocking" - } - } - ] - } - } - }, - { - "ID": "5325", - "typeID": "__group__", - "zOrder": "332", - "measuredW": "124", - "measuredH": "50", - "w": "124", - "h": "50", - "x": "133", - "y": "4732", - "properties": { - "controlName": "103-security-skills-and-knowledge:hardening-concepts:group-policy" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "124", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "102", - "measuredH": "26", - "x": "11", - "y": "12", - "properties": { - "size": "18", - "text": "Group Policy" - } - } - ] - } - } - }, - { - "ID": "5326", - "typeID": "__group__", - "zOrder": "333", - "measuredW": "64", - "measuredH": "50", - "w": "64", - "h": "50", - "x": "265", - "y": "4732", - "properties": { - "controlName": "104-security-skills-and-knowledge:hardening-concepts:acls" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "64", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "43", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "ACLs" - } - } - ] - } - } - }, - { - "ID": "5327", - "typeID": "__group__", - "zOrder": "334", - "measuredW": "96", - "measuredH": "50", - "w": "96", - "h": "50", - "x": "336", - "y": "4732", - "properties": { - "controlName": "105-security-skills-and-knowledge:hardening-concepts:sinkholes" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "96", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "78", - "measuredH": "26", - "x": "12", - "y": "12", - "properties": { - "size": "18", - "text": "Sinkholes" - } - } - ] - } - } - }, - { - "ID": "5328", - "typeID": "__group__", - "zOrder": "335", - "measuredW": "90", - "measuredH": "50", - "w": "90", - "h": "50", - "x": "440", - "y": "4732", - "properties": { - "controlName": "106-security-skills-and-knowledge:hardening-concepts:patching" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "90", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "w": "73", - "measuredW": "71", - "measuredH": "26", - "x": "9", - "y": "12", - "properties": { - "text": "Patching", - "size": "18" - } - } - ] - } - } - }, - { - "ID": "5329", - "typeID": "__group__", - "zOrder": "336", - "measuredW": "208", - "measuredH": "50", - "w": "208", - "h": "50", - "x": "133", - "y": "4790", - "properties": { - "controlName": "107-security-skills-and-knowledge:hardening-concepts:jump-server" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "208", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "103", - "measuredH": "26", - "x": "52", - "y": "12", - "properties": { - "size": "18", - "text": "Jump Server" - } - } - ] - } - } - }, - { - "ID": "5330", - "typeID": "__group__", - "zOrder": "337", - "measuredW": "181", - "measuredH": "50", - "w": "181", - "h": "50", - "x": "349", - "y": "4791", - "properties": { - "controlName": "108-security-skills-and-knowledge:hardening-concepts:endpoint-security" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "181", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "143", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "Endpoint Security" - } - } - ] - } - } - }, - { - "ID": "5331", - "typeID": "__group__", - "zOrder": "338", - "measuredW": "104", - "measuredH": "50", - "w": "104", - "h": "50", - "x": "558", - "y": "4675", - "properties": { - "controlName": "100-security-skills-and-knowledge:threat-classification:zero-day" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "104", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "75", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "Zero Day" - } - } - ] - } - } - }, - { - "ID": "5332", - "typeID": "__group__", - "zOrder": "339", - "measuredW": "187", - "measuredH": "50", - "w": "187", - "h": "50", - "x": "671", - "y": "4675", - "properties": { - "controlName": "101-security-skills-and-knowledge:threat-classification:known-vs-unknown" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "187", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "157", - "measuredH": "26", - "x": "15", - "y": "12", - "properties": { - "size": "18", - "text": "Known vs Unknown" - } - } - ] - } - } - }, - { - "ID": "5333", - "typeID": "__group__", - "zOrder": "340", - "measuredW": "72", - "measuredH": "50", - "w": "72", - "h": "50", - "x": "864", - "y": "4675", - "properties": { - "controlName": "102-security-skills-and-knowledge:threat-classification:apt" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "72", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "34", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "APT" - } - } - ] - } - } - }, - { - "ID": "5334", - "typeID": "Label", - "zOrder": "341", - "measuredW": "178", - "measuredH": "26", - "x": "1078", - "y": "4634", - "properties": { - "size": "18", - "text": "Understand Audience" - } - }, - { - "ID": "5335", - "typeID": "TextArea", - "zOrder": "342", - "w": "132", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "969", - "y": "4675", - "properties": { - "color": "16770457" - } - }, - { - "ID": "5336", - "typeID": "Label", - "zOrder": "343", - "measuredW": "107", - "measuredH": "26", - "x": "981", - "y": "4687", - "properties": { - "size": "18", - "text": "Stakeholders" - } - }, - { - "ID": "5337", - "typeID": "TextArea", - "zOrder": "344", - "w": "50", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "1109", - "y": "4675", - "properties": { - "color": "16770457" - } - }, - { - "ID": "5338", - "typeID": "Label", - "zOrder": "345", - "measuredW": "26", - "measuredH": "26", - "x": "1121", - "y": "4687", - "properties": { - "size": "18", - "text": "HR" - } - }, - { - "ID": "5339", - "typeID": "TextArea", - "zOrder": "346", - "w": "69", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "1165", - "y": "4675", - "properties": { - "color": "16770457" - } - }, - { - "ID": "5340", - "typeID": "Label", - "zOrder": "347", - "measuredW": "46", - "measuredH": "26", - "x": "1177", - "y": "4687", - "properties": { - "size": "18", - "text": "Legal" - } - }, - { - "ID": "5341", - "typeID": "TextArea", - "zOrder": "348", - "w": "125", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "1241", - "y": "4675", - "properties": { - "color": "16770457" - } - }, - { - "ID": "5342", - "typeID": "Label", - "zOrder": "349", - "measuredW": "98", - "measuredH": "26", - "x": "1255", - "y": "4687", - "properties": { - "size": "18", - "text": "Compliance" - } - }, - { - "ID": "5343", - "typeID": "TextArea", - "zOrder": "350", - "w": "397", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "969", - "y": "4731", - "properties": { - "color": "16770457" - } - }, - { - "ID": "5344", - "typeID": "Label", - "zOrder": "351", - "measuredW": "109", - "measuredH": "26", - "x": "1113", - "y": "4743", - "properties": { - "size": "18", - "text": "Management" - } - }, - { - "ID": "5345", - "typeID": "Label", - "zOrder": "352", - "measuredW": "221", - "measuredH": "26", - "x": "636", - "y": "4761", - "properties": { - "size": "18", - "text": "Understand Common Tools" - } - }, - { - "ID": "5346", - "typeID": "__group__", - "zOrder": "353", - "measuredW": "104", - "measuredH": "43", - "w": "104", - "h": "43", - "x": "553", - "y": "4809", - "properties": { - "controlName": "100-security-skills-and-knowledge:understand-common-tools:virus-total" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "104", - "h": "43", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "80", - "measuredH": "26", - "x": "14", - "y": "9", - "properties": { - "size": "18", - "text": "VirusTotal" - } - } - ] - } - } - }, - { - "ID": "5347", - "typeID": "__group__", - "zOrder": "354", - "measuredW": "131", - "measuredH": "43", - "w": "131", - "h": "43", - "x": "664", - "y": "4809", - "properties": { - "controlName": "101-security-skills-and-knowledge:understand-common-tools:joe-sandbox" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "131", - "h": "43", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "105", - "measuredH": "26", - "x": "14", - "y": "9", - "properties": { - "size": "18", - "text": "Joe Sandbox" - } - } - ] - } - } - }, - { - "ID": "5348", - "typeID": "__group__", - "zOrder": "355", - "measuredW": "84", - "measuredH": "43", - "w": "84", - "h": "43", - "x": "801", - "y": "4809", - "properties": { - "controlName": "102-security-skills-and-knowledge:understand-common-tools:any-run" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "84", - "h": "43", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "58", - "measuredH": "26", - "x": "14", - "y": "9", - "properties": { - "size": "18", - "text": "any.run" - } - } - ] - } - } - }, - { - "ID": "5349", - "typeID": "__group__", - "zOrder": "356", - "measuredW": "84", - "measuredH": "43", - "w": "84", - "h": "43", - "x": "892", - "y": "4809", - "properties": { - "controlName": "103-security-skills-and-knowledge:understand-common-tools:urlvoid" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "84", - "h": "43", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "54", - "measuredH": "26", - "x": "14", - "y": "9", - "properties": { - "size": "18", - "text": "urlvoid" - } - } - ] - } - } - }, - { - "ID": "5350", - "typeID": "__group__", - "zOrder": "357", - "measuredW": "90", - "measuredH": "43", - "w": "90", - "h": "43", - "x": "982", - "y": "4809", - "properties": { - "controlName": "104-security-skills-and-knowledge:understand-common-tools:urlscan" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "90", - "h": "43", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "60", - "measuredH": "26", - "x": "14", - "y": "9", - "properties": { - "size": "18", - "text": "urlscan" - } - } - ] - } - } - }, - { - "ID": "5351", - "typeID": "__group__", - "zOrder": "358", - "measuredW": "90", - "measuredH": "43", - "w": "90", - "h": "43", - "x": "1079", - "y": "4809", - "properties": { - "controlName": "105-security-skills-and-knowledge:understand-common-tools:whois" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "90", - "h": "43", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "60", - "measuredH": "26", - "x": "14", - "y": "9", - "properties": { - "size": "18", - "text": "WHOIS" - } - } - ] - } - } - }, - { - "ID": "5352", - "typeID": "__group__", - "zOrder": "359", - "measuredW": "379", - "measuredH": "50", - "w": "379", - "h": "50", - "x": "161", - "y": "2942", - "properties": { - "controlName": "128-security-skills-and-knowledge:common-hacking-tools" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "379", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "292", - "measuredH": "26", - "x": "44", - "y": "13", - "properties": { - "size": "18", - "text": "Understand Common Hacking Tools" - } - } - ] - } - } - }, - { - "ID": "5353", - "typeID": "Arrow", - "zOrder": "360", - "w": "705", - "h": "3", - "measuredW": "150", - "measuredH": "100", - "x": "736", - "y": "4965", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.4566527136892091, - "y": 0 - }, - "p1": { - "x": 0.4641773311710299, - "y": -0.003611133130633742 - }, - "p2": { - "x": 705, - "y": 0 - } - } - }, - { - "ID": "5354", - "typeID": "__group__", - "zOrder": "361", - "measuredW": "361", - "measuredH": "50", - "w": "361", - "h": "50", - "x": "615", - "y": "4941", - "properties": { - "controlName": "104-cloud-skills-and-knowledge" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "Canvas", - "zOrder": "0", - "w": "361", - "h": "50", - "measuredW": "100", - "measuredH": "70", - "x": "0", - "y": "0", - "properties": { - "color": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "223", - "measuredH": "26", - "x": "69", - "y": "12", - "properties": { - "size": "18", - "text": "Cloud Skills and Knowledge" - } - } - ] - } - } - }, - { - "ID": "5355", - "typeID": "__group__", - "zOrder": "362", - "measuredW": "305", - "measuredH": "138", - "w": "305", - "h": "138", - "x": "834", - "y": "5056", - "properties": { - "controlName": "106-cloud-skills-and-knowledge:cloud-services" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "305", - "h": "138", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "223", - "measuredH": "26", - "x": "41", - "y": "20", - "properties": { - "size": "18", - "text": "Understand Cloud Services" - } - } - ] - } - } - }, - { - "ID": "5356", - "typeID": "__group__", - "zOrder": "363", - "measuredW": "75", - "measuredH": "50", - "w": "75", - "h": "50", - "x": "865", - "y": "5119", - "properties": { - "controlName": "100-cloud-skills-and-knowledge:cloud-services:saas" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "75", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "43", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "SaaS" - } - } - ] - } - } - }, - { - "ID": "5357", - "typeID": "__group__", - "zOrder": "364", - "measuredW": "78", - "measuredH": "50", - "w": "78", - "h": "50", - "x": "949", - "y": "5119", - "properties": { - "controlName": "101-cloud-skills-and-knowledge:cloud-services:paas" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "78", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "42", - "measuredH": "26", - "x": "18", - "y": "12", - "properties": { - "size": "18", - "text": "PaaS" - } - } - ] - } - } - }, - { - "ID": "5358", - "typeID": "__group__", - "zOrder": "365", - "measuredW": "72", - "measuredH": "50", - "w": "72", - "h": "50", - "x": "1036", - "y": "5119", - "properties": { - "controlName": "102-cloud-skills-and-knowledge:cloud-services:iaas" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "72", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "37", - "measuredH": "26", - "x": "17", - "y": "12", - "properties": { - "size": "18", - "text": "IaaS" - } - } - ] - } - } - }, - { - "ID": "5359", - "typeID": "__group__", - "zOrder": "366", - "measuredW": "304", - "measuredH": "138", - "w": "304", - "h": "138", - "x": "835", - "y": "5207", - "properties": { - "controlName": "107-cloud-skills-and-knowledge:cloud-models" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "304", - "h": "138", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "112", - "measuredH": "26", - "x": "96", - "y": "22", - "properties": { - "size": "18", - "text": "Cloud Models" - } - } - ] - } - } - }, - { - "ID": "5360", - "typeID": "__group__", - "zOrder": "367", - "measuredW": "89", - "measuredH": "50", - "w": "89", - "h": "50", - "x": "850", - "y": "5270", - "properties": { - "controlName": "100-cloud-skills-and-knowledge:cloud-models:private" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "89", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "57", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "Private" - } - } - ] - } - } - }, - { - "ID": "5361", - "typeID": "__group__", - "zOrder": "368", - "measuredW": "78", - "measuredH": "50", - "w": "78", - "h": "50", - "x": "950", - "y": "5270", - "properties": { - "controlName": "101-cloud-skills-and-knowledge:cloud-models:public" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "78", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "50", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "Public" - } - } - ] - } - } - }, - { - "ID": "5362", - "typeID": "__group__", - "zOrder": "369", - "measuredW": "85", - "measuredH": "50", - "w": "85", - "h": "50", - "x": "1039", - "y": "5270", - "properties": { - "controlName": "102-cloud-skills-and-knowledge:cloud-models:hybrid" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "85", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "53", - "measuredH": "26", - "x": "16", - "y": "12", - "properties": { - "size": "18", - "text": "Hybrid" - } - } - ] - } - } - }, - { - "ID": "5363", - "typeID": "__group__", - "zOrder": "370", - "measuredW": "305", - "measuredH": "138", - "w": "305", - "h": "138", - "x": "1152", - "y": "5057", - "properties": { - "controlName": "108-cloud-skills-and-knowledge:common-cloud-environments" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "305", - "h": "138", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "242", - "measuredH": "26", - "x": "26", - "y": "20", - "properties": { - "size": "18", - "text": "Common Cloud Environments" - } - } - ] - } - } - }, - { - "ID": "5364", - "typeID": "__group__", - "zOrder": "371", - "measuredW": "89", - "measuredH": "50", - "w": "89", - "h": "50", - "x": "1165", - "y": "5120", - "properties": { - "controlName": "100-cloud-skills-and-knowledge:common-cloud-environments:aws" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "89", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "38", - "measuredH": "26", - "x": "26", - "y": "12", - "properties": { - "size": "18", - "text": "AWS" - } - } - ] - } - } - }, - { - "ID": "5365", - "typeID": "__group__", - "zOrder": "372", - "measuredW": "78", - "measuredH": "50", - "w": "78", - "h": "50", - "x": "1265", - "y": "5120", - "properties": { - "controlName": "101-cloud-skills-and-knowledge:common-cloud-environments:gcp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "78", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "38", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "GCP" - } - } - ] - } - } - }, - { - "ID": "5366", - "typeID": "__group__", - "zOrder": "373", - "measuredW": "85", - "measuredH": "50", - "w": "85", - "h": "50", - "x": "1354", - "y": "5120", - "properties": { - "controlName": "102-cloud-skills-and-knowledge:common-cloud-environments:azure" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "85", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "47", - "measuredH": "26", - "x": "19", - "y": "12", - "properties": { - "size": "18", - "text": "Azure" - } - } - ] - } - } - }, - { - "ID": "5367", - "typeID": "__group__", - "zOrder": "374", - "measuredW": "303", - "measuredH": "249", - "w": "303", - "h": "249", - "x": "1154", - "y": "5203", - "properties": { - "controlName": "109-cloud-skills-and-knowledge:common-cloud-storage" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "303", - "h": "249", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "194", - "measuredH": "26", - "x": "69", - "y": "21", - "properties": { - "size": "18", - "text": "Common Cloud Storage" - } - } - ] - } - } - }, - { - "ID": "5368", - "typeID": "__group__", - "zOrder": "375", - "measuredW": "64", - "measuredH": "50", - "w": "64", - "h": "50", - "x": "1181", - "y": "5267", - "properties": { - "controlName": "100-cloud-skills-and-knowledge:common-cloud-storage:s3" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "64", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "22", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "S3" - } - } - ] - } - } - }, - { - "ID": "5369", - "typeID": "__group__", - "zOrder": "376", - "measuredW": "90", - "measuredH": "50", - "w": "90", - "h": "50", - "x": "1251", - "y": "5267", - "properties": { - "controlName": "101-cloud-skills-and-knowledge:common-cloud-storage:dropbox" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "90", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "69", - "measuredH": "26", - "x": "10", - "y": "12", - "properties": { - "size": "18", - "text": "Dropbox" - } - } - ] - } - } - }, - { - "ID": "5370", - "typeID": "__group__", - "zOrder": "377", - "measuredW": "83", - "measuredH": "50", - "w": "83", - "h": "50", - "x": "1350", - "y": "5267", - "properties": { - "controlName": "102-cloud-skills-and-knowledge:common-cloud-storage:box" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "83", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "31", - "measuredH": "26", - "x": "26", - "y": "12", - "properties": { - "size": "18", - "text": "Box" - } - } - ] - } - } - }, - { - "ID": "5371", - "typeID": "__group__", - "zOrder": "378", - "measuredW": "105", - "measuredH": "50", - "w": "105", - "h": "50", - "x": "1180", - "y": "5324", - "properties": { - "controlName": "103-cloud-skills-and-knowledge:common-cloud-storage:one-drive" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "105", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "77", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "OneDrive" - } - } - ] - } - } - }, - { - "ID": "5372", - "typeID": "__group__", - "zOrder": "379", - "measuredW": "138", - "measuredH": "50", - "w": "138", - "h": "50", - "x": "1295", - "y": "5324", - "properties": { - "controlName": "104-cloud-skills-and-knowledge:common-cloud-storage:google-drive" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "138", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "107", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "Google Drive" - } - } - ] - } - } - }, - { - "ID": "5373", - "typeID": "__group__", - "zOrder": "380", - "measuredW": "253", - "measuredH": "50", - "w": "253", - "h": "50", - "x": "1180", - "y": "5381", - "properties": { - "controlName": "105-cloud-skills-and-knowledge:common-cloud-storage:icloud" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "253", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "52", - "measuredH": "26", - "x": "101", - "y": "12", - "properties": { - "size": "18", - "text": "iCloud" - } - } - ] - } - } - }, - { - "ID": "5374", - "typeID": "__group__", - "zOrder": "381", - "measuredW": "569", - "measuredH": "50", - "w": "569", - "h": "50", - "x": "218", - "y": "5071", - "properties": { - "controlName": "100-cloud-skills-and-knowledge:security-concept-in-the-cloud" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "569", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "363", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "Understand concepts of security in the cloud" - } - } - ] - } - } - }, - { - "ID": "5375", - "typeID": "__group__", - "zOrder": "382", - "measuredW": "570", - "measuredH": "50", - "w": "570", - "h": "50", - "x": "218", - "y": "5127", - "properties": { - "controlName": "101-cloud-skills-and-knowledge:cloud-deployment-flow" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "570", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "525", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "Understand the basics and general flow of deploying in the cloud" - } - } - ] - } - } - }, - { - "ID": "5376", - "typeID": "__group__", - "zOrder": "383", - "measuredW": "570", - "measuredH": "50", - "w": "570", - "h": "50", - "x": "218", - "y": "5184", - "properties": { - "controlName": "102-cloud-skills-and-knowledge:cloud-vs-onpremises" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "570", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "488", - "measuredH": "26", - "x": "20", - "y": "12", - "properties": { - "size": "18", - "text": "Understand the differences between cloud and on-premises" - } - } - ] - } - } - }, - { - "ID": "5377", - "typeID": "__group__", - "zOrder": "384", - "measuredW": "571", - "measuredH": "50", - "w": "571", - "h": "50", - "x": "217", - "y": "5241", - "properties": { - "controlName": "103-cloud-skills-and-knowledge:infra-as-code" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "571", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "402", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "Understand the concept of infrastructure as code" - } - } - ] - } - } - }, - { - "ID": "5378", - "typeID": "__group__", - "zOrder": "385", - "measuredW": "571", - "measuredH": "50", - "w": "571", - "h": "50", - "x": "217", - "y": "5298", - "properties": { - "controlName": "104-cloud-skills-and-knowledge:concept-of-serverless" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "571", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "309", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "Understand the concept of Serverless" - } - } - ] - } - } - }, - { - "ID": "5379", - "typeID": "__group__", - "zOrder": "386", - "measuredW": "571", - "measuredH": "50", - "w": "571", - "h": "50", - "x": "217", - "y": "5355", - "properties": { - "controlName": "105-cloud-skills-and-knowledge:concept-of-cdn" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "571", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "263", - "measuredH": "26", - "x": "21", - "y": "12", - "properties": { - "size": "18", - "text": "Understand the concept of CDN" - } - } - ] - } - } - }, - { - "ID": "5380", - "typeID": "Arrow", - "zOrder": "387", - "w": "2", - "h": "599", - "measuredW": "150", - "measuredH": "100", - "x": "147", - "y": "4965", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.18934813107512127, - "y": 599 - }, - "p1": { - "x": 0.46417733117103044, - "y": -0.0036111331306337433 - }, - "p2": { - "x": -0.18934813107512127, - "y": -0.1921212121210374 - } - } - }, - { - "ID": "5381", - "typeID": "Arrow", - "zOrder": "388", - "w": "705", - "h": "3", - "measuredW": "150", - "measuredH": "100", - "x": "148", - "y": "5565", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.4566527136892091, - "y": 0 - }, - "p1": { - "x": 0.4641773311710299, - "y": -0.003611133130633742 - }, - "p2": { - "x": 705, - "y": 0 - } - } - }, - { - "ID": "5382", - "typeID": "__group__", - "zOrder": "389", - "measuredW": "561", - "measuredH": "50", - "w": "561", - "h": "50", - "x": "532", - "y": "5543", - "properties": { - "controlName": "105-programming-knowledge" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "Canvas", - "zOrder": "0", - "w": "561", - "h": "50", - "measuredW": "100", - "measuredH": "70", - "x": "0", - "y": "0", - "properties": { - "color": "16776960" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "534", - "measuredH": "26", - "x": "14", - "y": "12", - "properties": { - "size": "18", - "text": "Programming Skills and Knowledge (Optional But Recommended)" - } - } - ] - } - } - }, - { - "ID": "5383", - "typeID": "__group__", - "zOrder": "390", - "measuredW": "138", - "measuredH": "50", - "w": "138", - "h": "50", - "x": "1268", - "y": "5543", - "properties": { - "controlName": "100-programming-knowledge:python" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "138", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "56", - "measuredH": "26", - "x": "41", - "y": "12", - "properties": { - "size": "18", - "text": "Python" - } - } - ] - } - } - }, - { - "ID": "5384", - "typeID": "__group__", - "zOrder": "391", - "measuredW": "138", - "measuredH": "50", - "w": "138", - "h": "50", - "x": "1268", - "y": "5770", - "properties": { - "controlName": "104-programming-knowledge:bash" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "138", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "42", - "measuredH": "26", - "x": "48", - "y": "12", - "properties": { - "size": "18", - "text": "Bash" - } - } - ] - } - } - }, - { - "ID": "5385", - "typeID": "__group__", - "zOrder": "392", - "measuredW": "138", - "measuredH": "50", - "w": "138", - "h": "50", - "x": "1268", - "y": "5827", - "properties": { - "controlName": "105-programming-knowledge:power-shell" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "138", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "94", - "measuredH": "26", - "x": "22", - "y": "12", - "properties": { - "size": "18", - "text": "Power Shell" - } - } - ] - } - } - }, - { - "ID": "5386", - "typeID": "__group__", - "zOrder": "393", - "measuredW": "138", - "measuredH": "50", - "w": "138", - "h": "50", - "x": "1268", - "y": "5599", - "properties": { - "controlName": "101-programming-knowledge:go" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "138", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "24", - "measuredH": "26", - "x": "57", - "y": "12", - "properties": { - "size": "18", - "text": "Go" - } - } - ] - } - } - }, - { - "ID": "5387", - "typeID": "__group__", - "zOrder": "394", - "measuredW": "138", - "measuredH": "50", - "w": "138", - "h": "50", - "x": "1268", - "y": "5656", - "properties": { - "controlName": "102-programming-knowledge:javascript" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "138", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "85", - "measuredH": "26", - "x": "26", - "y": "12", - "properties": { - "size": "18", - "text": "JavaScript" - } - } - ] - } - } - }, - { - "ID": "5388", - "typeID": "__group__", - "zOrder": "395", - "measuredW": "138", - "measuredH": "50", - "w": "138", - "h": "50", - "x": "1268", - "y": "5713", - "properties": { - "controlName": "103-programming-knowledge:cpp" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "TextArea", - "zOrder": "0", - "w": "138", - "h": "50", - "measuredW": "200", - "measuredH": "140", - "x": "0", - "y": "0", - "properties": { - "color": "16770457" - } - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "37", - "measuredH": "26", - "x": "50", - "y": "12", - "properties": { - "size": "18", - "text": "C++" - } - } - ] - } - } - }, - { - "ID": "5389", - "typeID": "Label", - "zOrder": "396", - "measuredW": "187", - "measuredH": "36", - "x": "750", - "y": "5770", - "properties": { - "size": "28", - "text": "Keep Learning" - } - }, - { - "ID": "5390", - "typeID": "Arrow", - "zOrder": "397", - "w": "1", - "h": "111", - "measuredW": "150", - "measuredH": "100", - "x": "843", - "y": "5819", - "properties": { - "color": "2848996", - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.18934813107512127, - "y": 111 - }, - "p1": { - "x": 0.46417733117103055, - "y": -0.0036111331306337433 - }, - "p2": { - "x": -0.18934813107512127, - "y": -0.1921212121210374 - }, - "stroke": "dotted" - } - }, - { - "ID": "5391", - "typeID": "Arrow", - "zOrder": "398", - "w": "1", - "h": "64", - "measuredW": "150", - "measuredH": "100", - "x": "102", - "y": "1390", - "properties": { - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.3586399639038973, - "y": 0 - }, - "p1": { - "x": 0.32941176470588224, - "y": 0 - }, - "p2": { - "x": -0.3586399639038973, - "y": 64 - }, - "stroke": "dotted", - "color": "16777215" - } - }, - { - "ID": "5392", - "typeID": "Arrow", - "zOrder": "399", - "w": "1", - "h": "111", - "measuredW": "150", - "measuredH": "100", - "x": "921", - "y": "5885", - "properties": { - "direction": "bottom", - "leftArrow": "false", - "rightArrow": "false", - "p0": { - "x": -0.18934813107512127, - "y": 111 - }, - "p1": { - "x": 0.46417733117103055, - "y": -0.0036111331306337433 - }, - "p2": { - "x": -0.18934813107512127, - "y": -0.1921212121210374 - }, - "stroke": "dotted", - "color": "16777215" - } - }, - { - "ID": "5393", - "typeID": "__group__", - "zOrder": "69", - "measuredW": "350", - "measuredH": "141", - "w": "350", - "h": "141", - "x": "1123", - "y": "1209", - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "Canvas", - "zOrder": "0", - "w": "350", - "h": "141", - "measuredW": "100", - "measuredH": "70", - "x": "0", - "y": "0" - }, - { - "ID": "1", - "typeID": "Label", - "zOrder": "1", - "measuredW": "314", - "measuredH": "25", - "x": "14", - "y": "17", - "properties": { - "size": "17", - "text": "Find the detailed version of this roadmap" - } - }, - { - "ID": "2", - "typeID": "Label", - "zOrder": "2", - "measuredW": "319", - "measuredH": "25", - "x": "14", - "y": "45", - "properties": { - "size": "17", - "text": "along with resources and other roadmaps" - } - }, - { - "ID": "3", - "typeID": "__group__", - "zOrder": "3", - "measuredW": "320", - "measuredH": "45", - "w": "320", - "h": "45", - "x": "15", - "y": "81", - "properties": { - "controlName": "ext_link:roadmap.sh" - }, - "children": { - "controls": { - "control": [ - { - "ID": "0", - "typeID": "Canvas", - "zOrder": "0", - "w": "320", - "h": "45", - "measuredW": "100", - "measuredH": "70", - "x": "0", - "y": "0", - "properties": { - "borderColor": "4273622", - "color": "4273622" - } - }, - { - "ID": "2", - "typeID": "Label", - "zOrder": "1", - "measuredW": "172", - "measuredH": "28", - "x": "74", - "y": "8", - "properties": { - "color": "16777215", - "size": "20", - "text": "https://roadmap.sh" - } - } - ] - } - } - } - ] - } - } - } - ] - }, - "attributes": { - "name": "New Wireframe 1 copy", - "order": 1000010.2336643032, - "parentID": null, - "notes": "" - }, - "branchID": "Master", - "resourceID": "D5E1AC09-3023-4145-A52A-4D904363A065", - "mockupH": "4787", - "mockupW": "1371", - "measuredW": "1473", - "measuredH": "5996", - "version": "1.0" - }, - "groupOffset": { - "x": 0, - "y": 0 - }, - "dependencies": [], - "projectID": "file:///Users/kamrify/Desktop/New%20Roadmaps/New%20Project%201.bmpr" + "nodes": [ + { + "id": "Ua8SDkyd9VtTqjrh17B9t", + "type": "vertical", + "position": { + "x": -169.6044451290735, + "y": 4263.724035563796 + }, + "selected": false, + "data": { + "label": "vertical node", + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2B78E4" + } + }, + "zIndex": 999, + "width": 20, + "height": 65, + "style": { + "width": 20, + "height": 65 + }, + "positionAbsolute": { + "x": -169.6044451290735, + "y": 4263.724035563796 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "0chjO1tLOWpFVXk3OEpgN", + "type": "section", + "position": { + "x": 335.74860459852323, + "y": 3922.0539129945323 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "zIndex": -999, + "width": 282, + "height": 219, + "style": { + "width": 282, + "height": 219 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": 335.74860459852323, + "y": 3922.0539129945323 + }, + "selectable": true, + "focusable": true + }, + { + "id": "sxKISh5cBkQYtiLknLJsM", + "type": "section", + "position": { + "x": 335.74860459852323, + "y": 3816.439557462727 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "zIndex": -999, + "width": 282, + "height": 110, + "style": { + "width": 282, + "height": 110 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": 335.74860459852323, + "y": 3816.439557462727 + }, + "selectable": true, + "focusable": true + }, + { + "id": "YyqMiJgEQTkM8snOlZQVr", + "type": "section", + "position": { + "x": 336.7328119806167, + "y": 3711.814113925716 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "zIndex": -999, + "width": 281, + "height": 109, + "style": { + "width": 281, + "height": 109 + }, + "resizing": false, + "positionAbsolute": { + "x": 336.7328119806167, + "y": 3711.814113925716 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "QKWwtq6kqGgcMh63Zy4Va", + "type": "section", + "position": { + "x": 336.14550367389484, + "y": 3605.5540952888614 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "zIndex": -999, + "width": 281, + "height": 109, + "style": { + "width": 281, + "height": 109 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": 336.14550367389484, + "y": 3605.5540952888614 + }, + "selectable": true, + "focusable": true + }, + { + "id": "FNyo1X9BP0v8GnBhPYXDR", + "type": "section", + "position": { + "x": -235.57902321451058, + "y": 3605.863216999975 + }, + "width": 575, + "height": 291, + "style": { + "width": 575, + "height": 291 + }, + "selected": false, + "data": { + "style": { + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "positionAbsolute": { + "x": -235.57902321451058, + "y": 3605.863216999975 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "DfC6Qg-kj35sKLoXSuaD7", + "type": "vertical", + "position": { + "x": 129.0692426643592, + "y": 1672.9704602802167 + }, + "selected": false, + "data": { + "label": "vertical node", + "style": { + "stroke": "#2B78E4", + "strokeWidth": 3.5, + "strokeDasharray": "0.8 8", + "strokeLinecap": "round" + } + }, + "zIndex": 999, + "width": 20, + "height": 50, + "style": { + "width": 20, + "height": 50 + }, + "resizing": false, + "positionAbsolute": { + "x": 129.0692426643592, + "y": 1672.9704602802167 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "6su23I9VvPjUw-3QPrcEo", + "type": "vertical", + "position": { + "x": -211.58651732554733, + "y": 1672.9704602802167 + }, + "selected": false, + "data": { + "label": "vertical node", + "style": { + "stroke": "#2B78E4", + "strokeWidth": 3.5, + "strokeDasharray": "0.8 8", + "strokeLinecap": "round" + }, + "oldId": "DfC6Qg-kj35sKLoXSuaD7" + }, + "zIndex": 999, + "width": 20, + "height": 50, + "style": { + "width": 20, + "height": 50 + }, + "resizing": false, + "positionAbsolute": { + "x": -211.58651732554733, + "y": 1672.9704602802167 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "hQ2uraeJ3zerDvEHMleJe", + "type": "horizontal", + "position": { + "x": -386.28240093098316, + "y": 1662.9704602802167 + }, + "selected": false, + "data": { + "label": "horizontal node", + "style": { + "stroke": "#2B78E4", + "strokeWidth": 3.5 + } + }, + "zIndex": 999, + "width": 1055, + "height": 20, + "style": { + "width": 1055, + "height": 20 + }, + "positionAbsolute": { + "x": -386.28240093098316, + "y": 1662.9704602802167 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "OcvcB4rWdJY1Xbe0A0Qwx", + "type": "horizontal", + "position": { + "x": 615.7175990690168, + "y": 1254.8697484068446 + }, + "selected": false, + "data": { + "label": "horizontal node", + "style": { + "stroke": "#2B78E4", + "strokeWidth": 3.5 + }, + "oldId": "hQ2uraeJ3zerDvEHMleJe" + }, + "zIndex": 999, + "width": 50, + "height": 20, + "style": { + "width": 50, + "height": 20 + }, + "positionAbsolute": { + "x": 615.7175990690168, + "y": 1254.8697484068446 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "GEp7BfyOSkS-8i3P4jLCj", + "type": "horizontal", + "position": { + "x": 615.7175990690168, + "y": 595.1903573629068 + }, + "selected": false, + "data": { + "label": "horizontal node", + "style": { + "stroke": "#2B78E4", + "strokeWidth": 3.5 + }, + "oldId": "hQ2uraeJ3zerDvEHMleJe" + }, + "zIndex": 999, + "width": 50, + "height": 20, + "style": { + "width": 50, + "height": 20 + }, + "positionAbsolute": { + "x": 615.7175990690168, + "y": 595.1903573629068 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "GAUtI7Z6Xblg6yZctu-wz", + "type": "horizontal", + "position": { + "x": -67.22621057004233, + "y": 1257.0411782062843 + }, + "selected": false, + "data": { + "label": "horizontal node", + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2B78E4" + } + }, + "zIndex": 999, + "width": 50, + "height": 20, + "style": { + "width": 50, + "height": 20 + }, + "positionAbsolute": { + "x": -67.22621057004233, + "y": 1257.0411782062843 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "A_c4jiw7VKOHek-PZTrqu", + "type": "section", + "position": { + "x": -389.8275709952726, + "y": 1415.4911298788138 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "zIndex": -999, + "width": 324, + "height": 180, + "style": { + "width": 324, + "height": 180 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": -389.8275709952726, + "y": 1415.4911298788138 + }, + "selectable": true, + "focusable": true + }, + { + "id": "4_8vkR5-Zgzx5l9vbEpM0", + "type": "section", + "position": { + "x": -389.8275709952726, + "y": 1040.180495784059 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "zIndex": -999, + "width": 324, + "height": 381, + "style": { + "width": 324, + "height": 381 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": -389.8275709952726, + "y": 1040.180495784059 + }, + "selectable": true, + "focusable": true + }, + { + "id": "bmLWcL3CqdiLYUdmKi93B", + "type": "section", + "position": { + "x": -389.77990812357274, + "y": 876.360801242143 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "zIndex": -999, + "width": 324, + "height": 166, + "style": { + "width": 324, + "height": 166 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": -389.77990812357274, + "y": 876.360801242143 + }, + "selectable": true, + "focusable": true + }, + { + "id": "g9i4uhgcbHRGZ0ttxfoBG", + "type": "section", + "position": { + "x": -389.77990812357274, + "y": 719.5945140721572 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "zIndex": -999, + "width": 324, + "height": 163, + "style": { + "width": 324, + "height": 163 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": -389.77990812357274, + "y": 719.5945140721572 + }, + "selectable": true, + "focusable": true + }, + { + "id": "vpVkdDBnrOF3NrXEw8Hpn", + "type": "section", + "position": { + "x": -21.08169683114272, + "y": 1106.9597557165084 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "zIndex": -999, + "width": 299, + "height": 111, + "style": { + "width": 299, + "height": 111 + }, + "resizing": false, + "positionAbsolute": { + "x": -21.08169683114272, + "y": 1106.9597557165084 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "EDAwfCY7aqdDo-VT-k-Js", + "type": "section", + "position": { + "x": -21.08169683114272, + "y": 891.3400785145216 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "zIndex": -999, + "width": 299, + "height": 221, + "style": { + "width": 299, + "height": 221 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": -21.08169683114272, + "y": 891.3400785145216 + }, + "focusable": true, + "selectable": true + }, + { + "id": "L8q17C-usuz7mo1PqDWld", + "type": "section", + "position": { + "x": -21.08169683114272, + "y": 560.1561270232144 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "zIndex": -999, + "width": 299, + "height": 335, + "style": { + "width": 299, + "height": 335 + }, + "resizing": false, + "positionAbsolute": { + "x": -21.08169683114272, + "y": 560.1561270232144 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "e7uabnTNmXPwm-qfDu7Hl", + "type": "vertical", + "position": { + "x": 491.2039980365524, + "y": 1259.8697484068446 + }, + "selected": false, + "data": { + "label": "vertical node", + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2B78E4" + } + }, + "zIndex": 999, + "width": 20, + "height": 91, + "style": { + "width": 20, + "height": 91 + }, + "positionAbsolute": { + "x": 491.2039980365524, + "y": 1259.8697484068446 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "S_kvx3o0Astz09U2X6RAi", + "type": "vertical", + "position": { + "x": 570.2039980365523, + "y": 537.1854223279927 + }, + "selected": false, + "data": { + "label": "vertical node", + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2B78E4" + }, + "oldId": "yGOolcb7t4cXVyg8q0MSF" + }, + "zIndex": 999, + "width": 20, + "height": 120, + "style": { + "width": 20, + "height": 120 + }, + "positionAbsolute": { + "x": 570.2039980365523, + "y": 537.1854223279927 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "aTv22cTfxUAc0mlwUMhfN", + "type": "vertical", + "position": { + "x": 404.70399803655243, + "y": 537.1854223279927 + }, + "selected": false, + "data": { + "label": "vertical node", + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2B78E4" + }, + "oldId": "S_kvx3o0Astz09U2X6RAi" + }, + "zIndex": 999, + "width": 20, + "height": 120, + "style": { + "width": 20, + "height": 120 + }, + "positionAbsolute": { + "x": 404.70399803655243, + "y": 537.1854223279927 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "x0yoSjQ3wyxYMYYQD58em", + "type": "vertical", + "position": { + "x": 491.20399803655243, + "y": 538.7628462321036 + }, + "selected": false, + "data": { + "label": "vertical node", + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2B78E4" + }, + "oldId": "S_kvx3o0Astz09U2X6RAi" + }, + "zIndex": 999, + "width": 20, + "height": 120, + "style": { + "width": 20, + "height": 120 + }, + "positionAbsolute": { + "x": 491.20399803655243, + "y": 538.7628462321036 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "-EnxQFVTyS3p-gp0QyPCd", + "type": "section", + "position": { + "x": 309.0947456767392, + "y": 657.1854223279928 + }, + "width": 333, + "height": 482, + "style": { + "width": 333, + "height": 482 + }, + "selected": false, + "data": { + "style": { + "backgroundColor": "#ffffff", + "borderColor": "#000000" + } + }, + "dragging": false, + "positionAbsolute": { + "x": 309.0947456767392, + "y": 657.1854223279928 + }, + "selectable": true, + "focusable": true + }, + { + "id": "cufgzgnnTxPucwhSz3BQo", + "type": "vertical", + "position": { + "x": 119.21759906901679, + "y": 88.17193234556692 + }, + "selected": false, + "data": { + "label": "vertical node", + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2B78E4" + } + }, + "zIndex": 999, + "width": 20, + "height": 72, + "style": { + "width": 20, + "height": 72 + }, + "positionAbsolute": { + "x": 119.21759906901679, + "y": 88.17193234556692 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "width": 225, + "height": 68, + "id": "iogwMmOvub2ZF4zgg6WyF", + "type": "title", + "position": { + "x": 17.217599069016785, + "y": -51.41178951309303 + }, + "selected": false, + "data": { + "label": "Cyber Security", + "style": { + "fontSize": 28, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "9nxw2PEl-_eQPW0FHNPq2" + }, + "zIndex": 999, + "dragging": false, + "positionAbsolute": { + "x": 17.217599069016785, + "y": -51.41178951309303 + }, + "focusable": true, + "selectable": true + }, + { + "width": 215, + "height": 49, + "id": "oimYzZYFXKjgvc7D4c-2u", + "type": "topic", + "position": { + "x": 21.717599069016785, + "y": 72.25104790092138 + }, + "selected": false, + "data": { + "label": "Fundamental IT Skills", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "_hYN0gEi9BL24nptEtXWU" + }, + "zIndex": 999, + "style": { + "width": 215, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": 21.717599069016785, + "y": 72.25104790092138 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "Y-00drWVavq2B1BBpoOkN", + "type": "vertical", + "position": { + "x": 119.21759906901679, + "y": -129.45865507923247 + }, + "selected": false, + "data": { + "label": "vertical node", + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2B78E4" + } + }, + "zIndex": 999, + "width": 20, + "height": 76, + "style": { + "width": 20, + "height": 76 + }, + "positionAbsolute": { + "x": 119.21759906901679, + "y": -129.45865507923247 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "Ih0YZt8u9vDwYo8y1t41n", + "type": "subtopic", + "position": { + "x": 24.170431619340548, + "y": 160.9217814037986 + }, + "selected": false, + "data": { + "label": "Computer Hardware Components", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 327, + "height": 49, + "style": { + "width": 327, + "height": 49 + }, + "positionAbsolute": { + "x": 24.170431619340548, + "y": 160.9217814037986 + }, + "dragging": false, + "focusable": true, + "selectable": true, + "resizing": false + }, + { + "id": "F1QVCEmGkgvz-_H5lTxY2", + "type": "subtopic", + "position": { + "x": 24.170431619340548, + "y": 213.9217814037986 + }, + "selected": false, + "data": { + "label": "Connection Types and their function", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 327, + "height": 49, + "style": { + "width": 327, + "height": 49 + }, + "positionAbsolute": { + "x": 24.170431619340548, + "y": 213.9217814037986 + }, + "dragging": false, + "focusable": true, + "selectable": true, + "resizing": false + }, + { + "id": "pJUhQin--BGMuXHPwx3JJ", + "type": "subtopic", + "position": { + "x": 24.170431619340548, + "y": 266.9217814037986 + }, + "selected": false, + "data": { + "label": "OS-Independent Troubleshooting", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 327, + "height": 49, + "style": { + "width": 327, + "height": 49 + }, + "positionAbsolute": { + "x": 24.170431619340548, + "y": 266.9217814037986 + }, + "dragging": false, + "focusable": true, + "selectable": true, + "resizing": false + }, + { + "id": "_7RjH4Goi0x6Noy6za0rP", + "type": "subtopic", + "position": { + "x": 24.170431619340548, + "y": 319.9217814037986 + }, + "selected": false, + "data": { + "label": "Understand Basics of Popular Suites", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 327, + "height": 49, + "style": { + "width": 327, + "height": 49 + }, + "positionAbsolute": { + "x": 24.170431619340548, + "y": 319.9217814037986 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "T0aU8ZQGShmF9uXhWY4sD", + "type": "subtopic", + "position": { + "x": 24.170431619340548, + "y": 372.9217814037986 + }, + "selected": false, + "data": { + "label": "Basics of Computer Networking", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 327, + "height": 49, + "style": { + "width": 327, + "height": 49 + }, + "dragging": false, + "positionAbsolute": { + "x": 24.170431619340548, + "y": 372.9217814037986 + }, + "focusable": true, + "selectable": true, + "resizing": false + }, + { + "id": "hwAUFLYpc_ftCfXq95dey", + "type": "subtopic", + "position": { + "x": 426.45762909207644, + "y": 185.17193234556692 + }, + "selected": false, + "data": { + "label": "NFC", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "focusable": true, + "positionAbsolute": { + "x": 426.45762909207644, + "y": 185.17193234556692 + }, + "dragging": false, + "selectable": true + }, + { + "id": "fUBNKHNPXbemRYrnzH3VT", + "type": "subtopic", + "position": { + "x": 426.45762909207644, + "y": 238.17193234556692 + }, + "selected": false, + "data": { + "label": "WiFi", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "focusable": true, + "dragging": false, + "positionAbsolute": { + "x": 426.45762909207644, + "y": 238.17193234556692 + }, + "selectable": true, + "resizing": true + }, + { + "id": "DbWf5LdqiByPiJa4xHtl_", + "type": "subtopic", + "position": { + "x": 533.410763525937, + "y": 185.17193234556692 + }, + "selected": false, + "data": { + "label": "Bluetooth", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "focusable": true, + "positionAbsolute": { + "x": 533.410763525937, + "y": 185.17193234556692 + }, + "dragging": false, + "selectable": true + }, + { + "id": "KsZ63c3KQLLn373c5CZnp", + "type": "subtopic", + "position": { + "x": 533.410763525937, + "y": 238.17193234556692 + }, + "selected": false, + "data": { + "label": "Infrared", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "focusable": true, + "positionAbsolute": { + "x": 533.410763525937, + "y": 238.17193234556692 + }, + "dragging": false, + "selectable": true + }, + { + "id": "E7yfALgu9E2auOYDOTmex", + "type": "subtopic", + "position": { + "x": 427.4810618751462, + "y": 373.06557917114316 + }, + "selected": false, + "data": { + "label": "iCloud", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 204, + "height": 49, + "style": { + "width": 204, + "height": 49 + }, + "positionAbsolute": { + "x": 427.4810618751462, + "y": 373.06557917114316 + }, + "dragging": false, + "focusable": true, + "selectable": true, + "resizing": false + }, + { + "id": "IOK_FluAv34j3Tj_NvwdO", + "type": "subtopic", + "position": { + "x": 427.4810618751462, + "y": 426.06557917114316 + }, + "selected": false, + "data": { + "label": "Google Suite", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 204, + "height": 49, + "style": { + "width": 204, + "height": 49 + }, + "positionAbsolute": { + "x": 427.4810618751462, + "y": 426.06557917114316 + }, + "dragging": false, + "focusable": true, + "selectable": true, + "resizing": false + }, + { + "id": "-5haJATqlmj0SFSFAqN6A", + "type": "subtopic", + "position": { + "x": 427.4810618751462, + "y": 320.06557917114316 + }, + "selected": false, + "data": { + "label": "MS Office Suite", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 204, + "height": 49, + "style": { + "width": 204, + "height": 49 + }, + "positionAbsolute": { + "x": 427.4810618751462, + "y": 320.06557917114316 + }, + "dragging": false, + "focusable": true, + "selectable": true, + "resizing": false + }, + { + "id": "4kG2uNnZNmTdzJZK3w6Rj", + "type": "label", + "position": { + "x": -330.5291449445003, + "y": -139.45865507923247 + }, + "selected": false, + "data": { + "label": "CTFs (Capture the Flag)", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + }, + "oldId": "4dZqgrIsbcshLTJPo29os" + }, + "zIndex": 999, + "width": 203, + "height": 36, + "style": {}, + "dragging": false, + "positionAbsolute": { + "x": -330.5291449445003, + "y": -139.45865507923247 + }, + "selectable": true, + "focusable": true + }, + { + "id": "wkuE_cChPZT2MHyGjUuU4", + "type": "subtopic", + "position": { + "x": -390.0291449445003, + "y": -96.74895209907868 + }, + "selected": false, + "data": { + "label": "HackTheBox", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 322, + "height": 49, + "style": { + "width": 322, + "height": 49 + }, + "positionAbsolute": { + "x": -390.0291449445003, + "y": -96.74895209907868 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "kht-L7_v-DbglMYUHuchp", + "type": "subtopic", + "position": { + "x": -390.0291449445003, + "y": -43.74895209907868 + }, + "selected": false, + "data": { + "label": "TryHackMe", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 322, + "height": 49, + "style": { + "width": 322, + "height": 49 + }, + "positionAbsolute": { + "x": -390.0291449445003, + "y": -43.74895209907868 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "W94wY_otBuvVW_-EFlKA6", + "type": "subtopic", + "position": { + "x": -390.0291449445003, + "y": 9.251047900921321 + }, + "selected": false, + "data": { + "label": "VulnHub", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 322, + "height": 49, + "style": { + "width": 322, + "height": 49 + }, + "positionAbsolute": { + "x": -390.0291449445003, + "y": 9.251047900921321 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "pou5xHwnz9Zsy5J6lNlKq", + "type": "subtopic", + "position": { + "x": -390.0291449445003, + "y": 62.25104790092132 + }, + "selected": false, + "data": { + "label": "picoCTF", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 322, + "height": 49, + "style": { + "width": 322, + "height": 49 + }, + "positionAbsolute": { + "x": -390.0291449445003, + "y": 62.25104790092132 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "WCeJrvWl837m1BIjuA1Mu", + "type": "subtopic", + "position": { + "x": -390.0291449445003, + "y": 115.25104790092132 + }, + "selected": false, + "data": { + "label": "SANS Holiday Hack Challenge", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 322, + "height": 49, + "style": { + "width": 322, + "height": 49 + }, + "dragging": false, + "positionAbsolute": { + "x": -390.0291449445003, + "y": 115.25104790092132 + }, + "selectable": true, + "focusable": true + }, + { + "id": "4dZqgrIsbcshLTJPo29os", + "type": "label", + "position": { + "x": -287.5291449445003, + "y": 179.66462455710462 + }, + "selected": false, + "data": { + "label": "Certifications", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 117, + "height": 36, + "style": {}, + "dragging": false, + "positionAbsolute": { + "x": -287.5291449445003, + "y": 179.66462455710462 + }, + "selectable": true, + "focusable": true + }, + { + "id": "1gKxcnmRherd4kQCrNwDn", + "type": "paragraph", + "position": { + "x": -390.0291449445003, + "y": 219.59273159677468 + }, + "selected": false, + "data": { + "label": "Beginner Certifications", + "style": { + "fontSize": 17, + "borderColor": "#000000", + "backgroundColor": "#ffffff", + "color": "#000000", + "textAlign": "center", + "justifyContent": "center", + "padding": 16 + }, + "oldId": "rimygCL5JuYfbzSc5H0zI" + }, + "zIndex": 999, + "width": 322, + "height": 44, + "style": { + "width": 322, + "height": 44 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": -390.0291449445003, + "y": 219.59273159677468 + }, + "selectable": true, + "focusable": true + }, + { + "id": "lbAgU5lR1O7L_5mCbNz_D", + "type": "subtopic", + "position": { + "x": -390.0291449445003, + "y": 267.5927315967746 + }, + "selected": false, + "data": { + "label": "CompTIA A+", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "s86x24SHPEbbOB9lYNU-w" + }, + "zIndex": 999, + "width": 145, + "height": 49, + "style": { + "width": 145, + "height": 49 + }, + "positionAbsolute": { + "x": -390.0291449445003, + "y": 267.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "p34Qwlj2sjwEPR2ay1WOK", + "type": "subtopic", + "position": { + "x": -240.02914494450027, + "y": 267.5927315967746 + }, + "selected": false, + "data": { + "label": "CompTIA Linux+", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 172, + "height": 49, + "style": { + "width": 172, + "height": 49 + }, + "positionAbsolute": { + "x": -240.02914494450027, + "y": 267.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "4RGbNOfMPDbBcvUFWTTCV", + "type": "subtopic", + "position": { + "x": -390.0291449445003, + "y": 320.5927315967746 + }, + "selected": false, + "data": { + "label": "CompTIA Network+", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 197, + "height": 49, + "style": { + "width": 197, + "height": 49 + }, + "dragging": false, + "resizing": false, + "positionAbsolute": { + "x": -390.0291449445003, + "y": 320.5927315967746 + }, + "focusable": true, + "selectable": true + }, + { + "id": "4RD22UZATfL8dc71YkJwQ", + "type": "subtopic", + "position": { + "x": -188.02914494450027, + "y": 320.5927315967746 + }, + "selected": false, + "data": { + "label": "CCNA", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 120, + "height": 49, + "style": { + "width": 120, + "height": 49 + }, + "positionAbsolute": { + "x": -188.02914494450027, + "y": 320.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "AxeDcKK3cUtEojtHQPBw7", + "type": "subtopic", + "position": { + "x": -390.0291449445003, + "y": 373.5927315967746 + }, + "selected": false, + "data": { + "label": "CompTIA Security+", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 321, + "height": 49, + "style": { + "width": 321, + "height": 49 + }, + "positionAbsolute": { + "x": -390.0291449445003, + "y": 373.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "rimygCL5JuYfbzSc5H0zI", + "type": "paragraph", + "position": { + "x": -390.0291449445003, + "y": 432.5927315967746 + }, + "selected": false, + "data": { + "label": "Advanced Certifications", + "style": { + "fontSize": 17, + "borderColor": "#000000", + "backgroundColor": "#ffffff", + "color": "#000000", + "textAlign": "center", + "justifyContent": "center", + "padding": 16 + } + }, + "zIndex": 999, + "width": 323, + "height": 45, + "style": { + "width": 323, + "height": 45 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": -390.0291449445003, + "y": 432.5927315967746 + }, + "selectable": true, + "focusable": true + }, + { + "id": "BqvijNoRzSGYLCMP-6hhr", + "type": "subtopic", + "position": { + "x": -390.0291449445003, + "y": 481.5927315967746 + }, + "selected": false, + "data": { + "label": "CISSP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "s86x24SHPEbbOB9lYNU-w" + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -390.0291449445003, + "y": 481.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "lqFp4VLY_S-5tAbhNQTew", + "type": "subtopic", + "position": { + "x": -286.0291449445003, + "y": 481.5927315967746 + }, + "selected": false, + "data": { + "label": "CISA", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "s86x24SHPEbbOB9lYNU-w" + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -286.0291449445003, + "y": 481.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "s86x24SHPEbbOB9lYNU-w", + "type": "subtopic", + "position": { + "x": -182.02914494450027, + "y": 481.5927315967746 + }, + "selected": false, + "data": { + "label": "CISM", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 115, + "height": 49, + "style": { + "width": 115, + "height": 49 + }, + "positionAbsolute": { + "x": -182.02914494450027, + "y": 481.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "nlmATCTgHoIoMcEOW8bUW", + "type": "subtopic", + "position": { + "x": -389.24003999212795, + "y": 534.5927315967746 + }, + "selected": false, + "data": { + "label": "GSEC", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "BqvijNoRzSGYLCMP-6hhr" + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -389.24003999212795, + "y": 534.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "t4h9rEKWz5Us0qJKXhxlX", + "type": "subtopic", + "position": { + "x": -285.24003999212795, + "y": 534.5927315967746 + }, + "selected": false, + "data": { + "label": "GPEN", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "lqFp4VLY_S-5tAbhNQTew" + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -285.24003999212795, + "y": 534.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "rwniCTWfYpKP5gi02Pa9f", + "type": "subtopic", + "position": { + "x": -181.24003999212795, + "y": 534.5927315967746 + }, + "selected": false, + "data": { + "label": "GWAPT", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "s86x24SHPEbbOB9lYNU-w" + }, + "zIndex": 999, + "width": 116, + "height": 49, + "style": { + "width": 116, + "height": 49 + }, + "positionAbsolute": { + "x": -181.24003999212795, + "y": 534.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "ZiUT-lyIBfHTzG-dwSy96", + "type": "subtopic", + "position": { + "x": -389.24003999212795, + "y": 587.5927315967746 + }, + "selected": false, + "data": { + "label": "GIAC", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "AAo7DXB7hyBzO6p05gx1i" + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -389.24003999212795, + "y": 587.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "SwVGVP2bbCFs2uNg9Qtxb", + "type": "subtopic", + "position": { + "x": -285.24003999212795, + "y": 587.5927315967746 + }, + "selected": false, + "data": { + "label": "OSCP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "t4h9rEKWz5Us0qJKXhxlX" + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -285.24003999212795, + "y": 587.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "rA1skdztev3-8VmAtIlmr", + "type": "subtopic", + "position": { + "x": -181.24003999212795, + "y": 587.5927315967746 + }, + "selected": false, + "data": { + "label": "CREST", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "rwniCTWfYpKP5gi02Pa9f" + }, + "zIndex": 999, + "width": 115, + "height": 49, + "style": { + "width": 115, + "height": 49 + }, + "positionAbsolute": { + "x": -181.24003999212795, + "y": 587.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "AAo7DXB7hyBzO6p05gx1i", + "type": "subtopic", + "position": { + "x": -389.24003999212795, + "y": 640.5927315967746 + }, + "selected": false, + "data": { + "label": "CEH", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center", + "colorType": "c" + }, + "oldId": "nlmATCTgHoIoMcEOW8bUW" + }, + "zIndex": 999, + "width": 322, + "height": 49, + "style": { + "width": 322, + "height": 49 + }, + "positionAbsolute": { + "x": -389.24003999212795, + "y": 640.5927315967746 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "width": 273, + "height": 49, + "id": "UY6xdt_V3YMkZxZ1hZLvW", + "type": "topic", + "position": { + "x": 370.3833665120144, + "y": 580.6903573629068 + }, + "selected": false, + "data": { + "label": "Operating Systems", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "_hYN0gEi9BL24nptEtXWU" + }, + "zIndex": 999, + "style": { + "width": 273, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": 370.3833665120144, + "y": 580.6903573629068 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "BNUKEQ4YpZmIhSPQdkHgU", + "type": "subtopic", + "position": { + "x": 369.70399803655243, + "y": 507.40513458176565 + }, + "selected": false, + "data": { + "label": "Windows", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 90, + "height": 50, + "style": { + "width": 90, + "height": 50 + }, + "positionAbsolute": { + "x": 369.70399803655243, + "y": 507.40513458176565 + }, + "dragging": false, + "focusable": true, + "resizing": false, + "selectable": true + }, + { + "id": "4frVcjYI1VlVU9hQgpwcT", + "type": "subtopic", + "position": { + "x": 463.7039980365524, + "y": 507.40513458176565 + }, + "selected": false, + "data": { + "label": "Linux", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 75, + "height": 49, + "style": { + "width": 75, + "height": 49 + }, + "positionAbsolute": { + "x": 463.7039980365524, + "y": 507.40513458176565 + }, + "dragging": false, + "focusable": true, + "resizing": false, + "selectable": true + }, + { + "id": "dztwr-DSckggQbcNIi4_2", + "type": "subtopic", + "position": { + "x": 542.7039980365523, + "y": 507.40513458176565 + }, + "selected": false, + "data": { + "label": "MacOS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 75, + "height": 49, + "style": { + "width": 75, + "height": 49 + }, + "positionAbsolute": { + "x": 542.7039980365523, + "y": 507.40513458176565 + }, + "dragging": false, + "focusable": true, + "resizing": false, + "selectable": true + }, + { + "id": "02aaEP9E5tlefeGBxf_Rj", + "type": "subtopic", + "position": { + "x": 317.0947456767392, + "y": 710.2164647830613 + }, + "selected": false, + "data": { + "label": "Installation and Configuration", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 317, + "height": 49, + "style": { + "width": 317, + "height": 49 + }, + "focusable": true, + "positionAbsolute": { + "x": 317.0947456767392, + "y": 710.2164647830613 + }, + "dragging": false, + "selectable": true + }, + { + "id": "yXOGqlufAZ69uiBzKFfh6", + "type": "subtopic", + "position": { + "x": 317.0947456767392, + "y": 763.2164647830613 + }, + "selected": false, + "data": { + "label": "Different Versions and Differences", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 317, + "height": 49, + "style": { + "width": 317, + "height": 49 + }, + "focusable": true, + "positionAbsolute": { + "x": 317.0947456767392, + "y": 763.2164647830613 + }, + "dragging": false, + "selectable": true + }, + { + "id": "MGitS_eJBoY99zOR-W3F4", + "type": "subtopic", + "position": { + "x": 317.0947456767392, + "y": 816.2164647830613 + }, + "selected": false, + "data": { + "label": "Navigating using GUI and CLI", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 317, + "height": 49, + "style": { + "width": 317, + "height": 49 + }, + "focusable": true, + "positionAbsolute": { + "x": 317.0947456767392, + "y": 816.2164647830613 + }, + "dragging": false, + "selectable": true + }, + { + "id": "bTfL7cPOmBBFl-eHxUJI6", + "type": "subtopic", + "position": { + "x": 317.0947456767392, + "y": 869.2164647830613 + }, + "selected": false, + "data": { + "label": "Understand Permissions", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 317, + "height": 49, + "style": { + "width": 317, + "height": 49 + }, + "focusable": true, + "positionAbsolute": { + "x": 317.0947456767392, + "y": 869.2164647830613 + }, + "dragging": false, + "selectable": true + }, + { + "id": "Ot3LGpM-CT_nKsNqIKIye", + "type": "subtopic", + "position": { + "x": 317.0947456767392, + "y": 922.2164647830613 + }, + "selected": false, + "data": { + "label": "Installing Software and Applications", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 318, + "height": 49, + "style": { + "width": 318, + "height": 49 + }, + "focusable": true, + "positionAbsolute": { + "x": 317.0947456767392, + "y": 922.2164647830613 + }, + "dragging": false, + "selectable": true, + "resizing": false + }, + { + "id": "zRXyoJMap9irOYo3AdHE8", + "type": "subtopic", + "position": { + "x": 317.0947456767392, + "y": 975.2164647830613 + }, + "selected": false, + "data": { + "label": "Performing CRUD on Files", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 317, + "height": 49, + "style": { + "width": 317, + "height": 49 + }, + "focusable": true, + "positionAbsolute": { + "x": 317.0947456767392, + "y": 975.2164647830613 + }, + "dragging": false, + "selectable": true + }, + { + "id": "xeRWOX1fWQDLNLWMAFTEe", + "type": "subtopic", + "position": { + "x": 317.0947456767392, + "y": 1028.2164647830612 + }, + "selected": false, + "data": { + "label": "Troubleshooting", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 317, + "height": 49, + "style": { + "width": 317, + "height": 49 + }, + "focusable": true, + "positionAbsolute": { + "x": 317.0947456767392, + "y": 1028.2164647830612 + }, + "dragging": false, + "selectable": true + }, + { + "id": "WDrSO7wBNn-2jB8mcyT7j", + "type": "subtopic", + "position": { + "x": 317.0947456767392, + "y": 1081.2164647830614 + }, + "selected": false, + "data": { + "label": "Common Commands", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 317, + "height": 49, + "style": { + "width": 317, + "height": 49 + }, + "focusable": true, + "positionAbsolute": { + "x": 317.0947456767392, + "y": 1081.2164647830614 + }, + "dragging": false, + "selectable": true + }, + { + "id": "_4aPOIqioIWCEWbPqC6rV", + "type": "label", + "position": { + "x": 373.5283483419462, + "y": 663.9344853855907 + }, + "selected": false, + "data": { + "label": "Learn following for each", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 199, + "height": 36, + "style": {}, + "focusable": true, + "dragging": false, + "positionAbsolute": { + "x": 373.5283483419462, + "y": 663.9344853855907 + }, + "selectable": true + }, + { + "width": 273, + "height": 49, + "id": "gSLr-Lc119eX9Ig-kDzJ2", + "type": "topic", + "position": { + "x": 368.7414006437348, + "y": 1242.5411782062843 + }, + "selected": false, + "data": { + "label": "Networking Knowledge", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "_hYN0gEi9BL24nptEtXWU" + }, + "zIndex": 999, + "style": { + "width": 273, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": 368.7414006437348, + "y": 1242.5411782062843 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "OXUd1UPPsBhNoUGLKZJGV", + "type": "subtopic", + "position": { + "x": 332.7414006437348, + "y": 1332.0066383056935 + }, + "selected": false, + "data": { + "label": "Understand the OSI Model", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 309, + "height": 49, + "style": { + "width": 309, + "height": 49 + }, + "positionAbsolute": { + "x": 332.7414006437348, + "y": 1332.0066383056935 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "ViF-mpR17MB3_KJ1rV8mS", + "type": "subtopic", + "position": { + "x": 332.7414006437348, + "y": 1385.0066383056935 + }, + "selected": false, + "data": { + "label": "Common Protocols and their Uses", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 309, + "height": 49, + "style": { + "width": 309, + "height": 49 + }, + "positionAbsolute": { + "x": 332.7414006437348, + "y": 1385.0066383056935 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "0tx2QYDYXhm85iYrCWd9U", + "type": "subtopic", + "position": { + "x": 332.7414006437348, + "y": 1438.0066383056935 + }, + "selected": false, + "data": { + "label": "Common Ports and their Uses", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 309, + "height": 49, + "style": { + "width": 309, + "height": 49 + }, + "positionAbsolute": { + "x": 332.7414006437348, + "y": 1438.0066383056935 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "dJ0NUsODFhk52W2zZxoPh", + "type": "subtopic", + "position": { + "x": 332.7414006437348, + "y": 1491.0066383056935 + }, + "selected": false, + "data": { + "label": "SSL and TLS Basics", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 309, + "height": 49, + "style": { + "width": 309, + "height": 49 + }, + "positionAbsolute": { + "x": 332.7414006437348, + "y": 1491.0066383056935 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "umbMBQ0yYmB5PgWfY6zfO", + "type": "subtopic", + "position": { + "x": 332.7414006437348, + "y": 1544.0066383056935 + }, + "selected": false, + "data": { + "label": "Basics of NAS and SAN", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 309, + "height": 49, + "style": { + "width": 309, + "height": 49 + }, + "positionAbsolute": { + "x": 332.7414006437348, + "y": 1544.0066383056935 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "E8Z7qFFW-I9ivr0HzoXCq", + "type": "subtopic", + "position": { + "x": -11.782541263425742, + "y": 570.0828362946356 + }, + "selected": false, + "data": { + "label": "Basics of Subnetting", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 280, + "height": 49, + "style": { + "width": 280, + "height": 49 + }, + "positionAbsolute": { + "x": -11.782541263425742, + "y": 570.0828362946356 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "2nQfhnvBjJg1uDZ28aE4v", + "type": "subtopic", + "position": { + "x": -11.782541263425742, + "y": 623.0828362946356 + }, + "selected": false, + "data": { + "label": "Public vs Private IP Addresses", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 280, + "height": 51, + "style": { + "width": 280, + "height": 51 + }, + "positionAbsolute": { + "x": -11.782541263425742, + "y": 623.0828362946356 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "ziELvuQjNdneU2r59whyr", + "type": "label", + "position": { + "x": 63.71745873657426, + "y": 686.0936920538965 + }, + "selected": false, + "data": { + "label": "IP Terminology", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 129, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 63.71745873657426, + "y": 686.0936920538965 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "0TWwox-4pSwuXojI8ixFO", + "type": "subtopic", + "position": { + "x": -12.319935709390279, + "y": 729.7592610315122 + }, + "selected": false, + "data": { + "label": "localhost", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": -12.319935709390279, + "y": 729.7592610315122 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "W_oloLu2Euz5zRSy7v_T8", + "type": "subtopic", + "position": { + "x": 94.90443096639763, + "y": 728.6844721395831 + }, + "selected": false, + "data": { + "label": "loopback", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": 94.90443096639763, + "y": 728.6844721395831 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "PPIH1oHW4_ZDyD3U3shDg", + "type": "subtopic", + "position": { + "x": 198.9044309663975, + "y": 728.6844721395831 + }, + "selected": false, + "data": { + "label": "CIDR", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": { + "width": 70, + "height": 49 + }, + "resizing": true, + "positionAbsolute": { + "x": 198.9044309663975, + "y": 728.6844721395831 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "f-v8qtweWXFY_Ryo3oYUF", + "type": "subtopic", + "position": { + "x": -11.782541263425742, + "y": 782.6844721395831 + }, + "selected": false, + "data": { + "label": "subnet mask", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 280, + "height": 49, + "style": { + "width": 280, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": -11.782541263425742, + "y": 782.6844721395831 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "5rKaFtjYx0n2iF8uTLs8X", + "type": "subtopic", + "position": { + "x": -11.782541263425742, + "y": 835.6844721395831 + }, + "selected": false, + "data": { + "label": "default gateway", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 280, + "height": 49, + "style": { + "width": 280, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": -11.782541263425742, + "y": 835.6844721395831 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "YIrr0O9RSwdonm9IuqqLJ", + "type": "label", + "position": { + "x": 14.067880952715768, + "y": 903.6645670507262 + }, + "selected": false, + "data": { + "label": "Understand the Terminology", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 233, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 14.067880952715768, + "y": 903.6645670507262 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "d5Cv3EXf6OXW19yPJ4x6e", + "type": "subtopic", + "position": { + "x": -6.034652344133178, + "y": 945.955278295614 + }, + "selected": false, + "data": { + "label": "VLAN", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "gTozEpxJeG1NTkVBHH-05" + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": { + "width": 70, + "height": 49 + }, + "positionAbsolute": { + "x": -6.034652344133178, + "y": 945.955278295614 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "gfpvDQz61I3zTB7tGu7vp", + "type": "subtopic", + "position": { + "x": 67.96534765586682, + "y": 945.955278295614 + }, + "selected": false, + "data": { + "label": "DMZ", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "ORIdKG8H97VkBUYpiDtXf" + }, + "zIndex": 999, + "width": 75, + "height": 49, + "style": { + "width": 75, + "height": 49 + }, + "positionAbsolute": { + "x": 67.96534765586682, + "y": 945.955278295614 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "M52V7hmG4ORf4TIVw3W3J", + "type": "subtopic", + "position": { + "x": 146.96534765586682, + "y": 945.955278295614 + }, + "selected": false, + "data": { + "label": "ARP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "Kkd3f_0OYNCdpDgrJ-_Ju" + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": 146.96534765586682, + "y": 945.955278295614 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "ZTC5bLWEIQcdmowc7sk_E", + "type": "subtopic", + "position": { + "x": 210.96534765586688, + "y": 945.955278295614 + }, + "selected": false, + "data": { + "label": "VM", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "FdoqB2---uDAyz6xZjk_u" + }, + "zIndex": 999, + "width": 50, + "height": 49, + "style": { + "width": 50, + "height": 49 + }, + "positionAbsolute": { + "x": 210.96534765586688, + "y": 945.955278295614 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "T4312p70FqRBkzVfWKMaR", + "type": "subtopic", + "position": { + "x": -6.034652344133178, + "y": 998.955278295614 + }, + "selected": false, + "data": { + "label": "DHCP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "gTozEpxJeG1NTkVBHH-05" + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": { + "width": 70, + "height": 49 + }, + "positionAbsolute": { + "x": -6.034652344133178, + "y": 998.955278295614 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "ORIdKG8H97VkBUYpiDtXf", + "type": "subtopic", + "position": { + "x": 67.96534765586682, + "y": 998.955278295614 + }, + "selected": false, + "data": { + "label": "DNS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 75, + "height": 49, + "style": { + "width": 75, + "height": 49 + }, + "positionAbsolute": { + "x": 67.96534765586682, + "y": 998.955278295614 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "Kkd3f_0OYNCdpDgrJ-_Ju", + "type": "subtopic", + "position": { + "x": 146.96534765586682, + "y": 998.1796449714019 + }, + "selected": false, + "data": { + "label": "NAT", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": 146.96534765586682, + "y": 998.1796449714019 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "FdoqB2---uDAyz6xZjk_u", + "type": "subtopic", + "position": { + "x": 210.96534765586688, + "y": 998.955278295614 + }, + "selected": false, + "data": { + "label": "IP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 50, + "height": 49, + "style": { + "width": 50, + "height": 49 + }, + "positionAbsolute": { + "x": 210.96534765586688, + "y": 998.955278295614 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "lwSFIbIX-xOZ0QK2sGFb1", + "type": "subtopic", + "position": { + "x": -4.959863452203763, + "y": 1051.9552782956139 + }, + "selected": false, + "data": { + "label": "Router", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "gTozEpxJeG1NTkVBHH-05" + }, + "zIndex": 999, + "width": 85, + "height": 49, + "style": { + "width": 85, + "height": 49 + }, + "positionAbsolute": { + "x": -4.959863452203763, + "y": 1051.9552782956139 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "r9byGV8XuBPzoqj5ZPf2W", + "type": "subtopic", + "position": { + "x": 84.68851991059739, + "y": 1051.9552782956139 + }, + "selected": false, + "data": { + "label": "Switch", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "gTozEpxJeG1NTkVBHH-05" + }, + "zIndex": 999, + "width": 93, + "height": 49, + "style": { + "width": 93, + "height": 49 + }, + "positionAbsolute": { + "x": 84.68851991059739, + "y": 1051.9552782956139 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "gTozEpxJeG1NTkVBHH-05", + "type": "subtopic", + "position": { + "x": 183.04013654779618, + "y": 1051.9552782956139 + }, + "selected": false, + "data": { + "label": "VPN", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "ANjrRn83gKjXDVj-2XMfM" + }, + "zIndex": 999, + "width": 75, + "height": 49, + "style": { + "width": 75, + "height": 49 + }, + "positionAbsolute": { + "x": 183.04013654779618, + "y": 1051.9552782956139 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "LrwTMH_1fTd8iB9wJg-0t", + "type": "subtopic", + "position": { + "x": -8.161301594094653, + "y": 1119.3976333088228 + }, + "selected": false, + "data": { + "label": "MAN", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": { + "width": 70, + "height": 49 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": -8.161301594094653, + "y": 1119.3976333088228 + }, + "focusable": true, + "selectable": true + }, + { + "id": "xWxusBtMEWnd-6n7oqjHz", + "type": "subtopic", + "position": { + "x": 65.83869840590535, + "y": 1119.3976333088228 + }, + "selected": false, + "data": { + "label": "LAN", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": 65.83869840590535, + "y": 1119.3976333088228 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "vCkTJMkDXcQmwsmeNUAX5", + "type": "subtopic", + "position": { + "x": 129.83869840590535, + "y": 1119.3976333088228 + }, + "selected": false, + "data": { + "label": "WAN", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": 129.83869840590535, + "y": 1119.3976333088228 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "QCVYF1rmPsMVtklBNDNaB", + "type": "subtopic", + "position": { + "x": 193.8386984059053, + "y": 1119.3976333088228 + }, + "selected": false, + "data": { + "label": "WLAN", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 75, + "height": 49, + "style": { + "width": 75, + "height": 49 + }, + "positionAbsolute": { + "x": 193.8386984059053, + "y": 1119.3976333088228 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "n2nh_Yxc7y1uLO42nZDGA", + "type": "label", + "position": { + "x": 51.41830316885728, + "y": 1174.6103155810856 + }, + "selected": false, + "data": { + "label": "Understand these", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 154, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 51.41830316885728, + "y": 1174.6103155810856 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "M2J4wsTcEo3IcULZDRNyM", + "type": "section", + "position": { + "x": -20.75479685850621, + "y": 1211.5411782062843 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + }, + "oldId": "vpVkdDBnrOF3NrXEw8Hpn" + }, + "zIndex": -999, + "width": 299, + "height": 111, + "style": { + "width": 299, + "height": 111 + }, + "resizing": false, + "positionAbsolute": { + "x": -20.75479685850621, + "y": 1211.5411782062843 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "R5HEeh6jwpQDo27rz1KSH", + "type": "subtopic", + "position": { + "x": -7.834401621458142, + "y": 1223.9790557985987 + }, + "selected": false, + "data": { + "label": "DHCP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "LrwTMH_1fTd8iB9wJg-0t" + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": { + "width": 70, + "height": 49 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": -7.834401621458142, + "y": 1223.9790557985987 + }, + "focusable": true, + "selectable": true + }, + { + "id": "r1IKvhpwg2umazLGlQZL1", + "type": "subtopic", + "position": { + "x": 66.16559837854186, + "y": 1223.9790557985987 + }, + "selected": false, + "data": { + "label": "DNS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "xWxusBtMEWnd-6n7oqjHz" + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": 66.16559837854186, + "y": 1223.9790557985987 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "tf0TymdPHbplDHvuVIIh4", + "type": "subtopic", + "position": { + "x": 130.16559837854186, + "y": 1223.9790557985987 + }, + "selected": false, + "data": { + "label": "NTP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "vCkTJMkDXcQmwsmeNUAX5" + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": 130.16559837854186, + "y": 1223.9790557985987 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "hN8p5YBcSaPm-byQUIz8L", + "type": "subtopic", + "position": { + "x": 194.16559837854192, + "y": 1223.9790557985987 + }, + "selected": false, + "data": { + "label": "IPAM", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "QCVYF1rmPsMVtklBNDNaB" + }, + "zIndex": 999, + "width": 75, + "height": 49, + "style": { + "width": 75, + "height": 49 + }, + "positionAbsolute": { + "x": 194.16559837854192, + "y": 1223.9790557985987 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "BeOWMvEDBZn64OsZkBkQ2", + "type": "label", + "position": { + "x": 52.24520314149379, + "y": 1279.1917380708614 + }, + "selected": false, + "data": { + "label": "Functions of each", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + }, + "oldId": "n2nh_Yxc7y1uLO42nZDGA" + }, + "zIndex": 999, + "width": 153, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 52.24520314149379, + "y": 1279.1917380708614 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "HJ1wroQw_zvdE0HORyOck", + "type": "section", + "position": { + "x": -20.427896885869472, + "y": 1315.0478118041308 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + }, + "oldId": "M2J4wsTcEo3IcULZDRNyM" + }, + "zIndex": -999, + "width": 299, + "height": 111, + "style": { + "width": 299, + "height": 111 + }, + "resizing": false, + "positionAbsolute": { + "x": -20.427896885869472, + "y": 1315.0478118041308 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "P0ZhAXd_H-mTOMr13Ag31", + "type": "subtopic", + "position": { + "x": -7.507501648821517, + "y": 1327.4856893964452 + }, + "selected": false, + "data": { + "label": "Star", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "R5HEeh6jwpQDo27rz1KSH" + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": { + "width": 70, + "height": 49 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": -7.507501648821517, + "y": 1327.4856893964452 + }, + "focusable": true, + "selectable": true + }, + { + "id": "9vEUVJ8NTh0wKyIE6-diY", + "type": "subtopic", + "position": { + "x": 66.49249835117848, + "y": 1327.4856893964452 + }, + "selected": false, + "data": { + "label": "Ring", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "r1IKvhpwg2umazLGlQZL1" + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": 66.49249835117848, + "y": 1327.4856893964452 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "PYeF15e7iVB9seFrrO7W6", + "type": "subtopic", + "position": { + "x": 130.49249835117848, + "y": 1327.4856893964452 + }, + "selected": false, + "data": { + "label": "Mesh", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "tf0TymdPHbplDHvuVIIh4" + }, + "zIndex": 999, + "width": 73, + "height": 49, + "style": { + "width": 73, + "height": 49 + }, + "positionAbsolute": { + "x": 130.49249835117848, + "y": 1327.4856893964452 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "0DWh4WmLK_ENDuqQmQcu4", + "type": "subtopic", + "position": { + "x": 206.96534765586688, + "y": 1327.4856893964452 + }, + "selected": false, + "data": { + "label": "Bus", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "hN8p5YBcSaPm-byQUIz8L" + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": 206.96534765586688, + "y": 1327.4856893964452 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "RfVcN1i-70yq4bEAcm-Ry", + "type": "label", + "position": { + "x": 45.57210311413053, + "y": 1382.698371668708 + }, + "selected": false, + "data": { + "label": "Network Topologies", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + }, + "oldId": "BeOWMvEDBZn64OsZkBkQ2" + }, + "zIndex": 999, + "width": 167, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 45.57210311413053, + "y": 1382.698371668708 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "6Dfk8Gt9DE8EYczCwEAyQ", + "type": "section", + "position": { + "x": -21.175785805162263, + "y": 1420.7040231858357 + }, + "selected": false, + "data": { + "label": "", + "style": { + "width": 150, + "height": 100, + "fontSize": 17, + "backgroundColor": "#ffffff", + "borderColor": "#000000" + }, + "oldId": "HJ1wroQw_zvdE0HORyOck" + }, + "zIndex": -999, + "width": 299, + "height": 172, + "style": { + "width": 299, + "height": 172 + }, + "resizing": false, + "positionAbsolute": { + "x": -21.175785805162263, + "y": 1420.7040231858357 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "8Mog890Lj-gVBpWa05EzT", + "type": "subtopic", + "position": { + "x": -13.810285668345273, + "y": 1433.14190077815 + }, + "selected": false, + "data": { + "label": "SSH", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "P0ZhAXd_H-mTOMr13Ag31" + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": { + "width": 70, + "height": 49 + }, + "resizing": false, + "dragging": false, + "positionAbsolute": { + "x": -13.810285668345273, + "y": 1433.14190077815 + }, + "focusable": true, + "selectable": true + }, + { + "id": "Ia6M1FKPNpqLDiWx7CwDh", + "type": "subtopic", + "position": { + "x": 60.744609431885806, + "y": 1433.14190077815 + }, + "selected": false, + "data": { + "label": "RDP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "9vEUVJ8NTh0wKyIE6-diY" + }, + "zIndex": 999, + "width": 65, + "height": 49, + "style": { + "width": 65, + "height": 49 + }, + "positionAbsolute": { + "x": 60.744609431885806, + "y": 1433.14190077815 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "ftYYMxRpVer-jgSswHLNa", + "type": "subtopic", + "position": { + "x": 129.7446094318858, + "y": 1433.14190077815 + }, + "selected": false, + "data": { + "label": "FTP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "PYeF15e7iVB9seFrrO7W6" + }, + "zIndex": 999, + "width": 67, + "height": 49, + "style": { + "width": 67, + "height": 49 + }, + "positionAbsolute": { + "x": 129.7446094318858, + "y": 1433.14190077815 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "YEy6o-clTBKZp1yOkLwNb", + "type": "subtopic", + "position": { + "x": 201.18971433165478, + "y": 1433.14190077815 + }, + "selected": false, + "data": { + "label": "SFTP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "0DWh4WmLK_ENDuqQmQcu4" + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": { + "width": 70, + "height": 49 + }, + "positionAbsolute": { + "x": 201.18971433165478, + "y": 1433.14190077815 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "8He-lADSDdhv4-CjwRMlw", + "type": "label", + "position": { + "x": 47.68851991059739, + "y": 1544.8747594889746 + }, + "selected": false, + "data": { + "label": "Network Topologies", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + }, + "oldId": "RfVcN1i-70yq4bEAcm-Ry" + }, + "zIndex": 999, + "width": 167, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 47.68851991059739, + "y": 1544.8747594889746 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "3Awm221OJHxXNLiL9yxfd", + "type": "subtopic", + "position": { + "x": -13.810285668345273, + "y": 1486.5008150293284 + }, + "selected": false, + "data": { + "label": "HTTP / HTTPS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 160, + "height": 49, + "style": { + "width": 160, + "height": 49 + }, + "positionAbsolute": { + "x": -13.810285668345273, + "y": 1486.5008150293284 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "LKK1A5-xawA7yCIAWHS8P", + "type": "subtopic", + "position": { + "x": 149.18971433165473, + "y": 1486.5008150293284 + }, + "selected": false, + "data": { + "label": "SSL / TLS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 123, + "height": 49, + "style": { + "width": 123, + "height": 49 + }, + "positionAbsolute": { + "x": 149.18971433165473, + "y": 1486.5008150293284 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "AjywuCZdBi9atGUbetlUL", + "type": "subtopic", + "position": { + "x": -373.8108056117037, + "y": 731.3605858762598 + }, + "selected": false, + "data": { + "label": "VMWare", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 136, + "height": 49, + "style": { + "width": 136, + "height": 49 + }, + "positionAbsolute": { + "x": -373.8108056117037, + "y": 731.3605858762598 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "vGVFhZXYOZOy4qFpLLbxp", + "type": "subtopic", + "position": { + "x": -232.12449524069427, + "y": 731.3605858762598 + }, + "selected": false, + "data": { + "label": "VirtualBox", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 150, + "height": 49, + "style": { + "width": 150, + "height": 49 + }, + "positionAbsolute": { + "x": -232.12449524069427, + "y": 731.3605858762598 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "BisNooct1vJDKaBKsGR7_", + "type": "subtopic", + "position": { + "x": -373.8108056117037, + "y": 784.3605858762598 + }, + "selected": false, + "data": { + "label": "esxi", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 136, + "height": 49, + "style": { + "width": 136, + "height": 49 + }, + "positionAbsolute": { + "x": -373.8108056117037, + "y": 784.3605858762598 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "jqX1A5hFF3Qznqup4lfiF", + "type": "subtopic", + "position": { + "x": -232.12449524069427, + "y": 784.3605858762598 + }, + "selected": false, + "data": { + "label": "proxmax", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 150, + "height": 49, + "style": { + "width": 150, + "height": 49 + }, + "positionAbsolute": { + "x": -232.12449524069427, + "y": 784.3605858762598 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "CzZbiEbtngRNJOKbNQUxp", + "type": "label", + "position": { + "x": -375.01868263492054, + "y": 840.1567847664894 + }, + "selected": false, + "data": { + "label": "Common Virtualization Technologies", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 295, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -375.01868263492054, + "y": 840.1567847664894 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "CIoLaRv5I3sCr9tBnZHEi", + "type": "subtopic", + "position": { + "x": -360.1978709534737, + "y": 892.3992610568729 + }, + "selected": false, + "data": { + "label": "Hypervisor", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 128, + "height": 49, + "style": { + "width": 128 + }, + "positionAbsolute": { + "x": -360.1978709534737, + "y": 892.3992610568729 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "251sxqoHggQ4sZ676iX5w", + "type": "subtopic", + "position": { + "x": -226.48697590584604, + "y": 945.3992610568729 + }, + "selected": false, + "data": { + "label": "VM", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 128, + "height": 49, + "style": { + "width": 128 + }, + "positionAbsolute": { + "x": -226.48697590584604, + "y": 945.3992610568729 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "LocGETHz6ANYinNd5ZLsS", + "type": "subtopic", + "position": { + "x": -226.48697590584604, + "y": 892.3992610568729 + }, + "selected": false, + "data": { + "label": "GuestOS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 128, + "height": 49, + "style": { + "width": 128 + }, + "positionAbsolute": { + "x": -226.48697590584604, + "y": 892.3992610568729 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "p7w3C94xjLwSMm5qA8XlL", + "type": "subtopic", + "position": { + "x": -360.1978709534737, + "y": 945.3992610568729 + }, + "selected": false, + "data": { + "label": "HostOS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 128, + "height": 49, + "style": { + "width": 128 + }, + "positionAbsolute": { + "x": -360.1978709534737, + "y": 945.3992610568729 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "eDe7z_-RSBCCZBl9isKFl", + "type": "label", + "position": { + "x": -323.5663455066204, + "y": 1001.3080046415863 + }, + "selected": false, + "data": { + "label": "Basics of Virtualization", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 190, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -323.5663455066204, + "y": 1001.3080046415863 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "OdqcE-If6coh0i2C2ob4Z", + "type": "label", + "position": { + "x": -318.27990812357274, + "y": 1372.2339170325572 + }, + "selected": false, + "data": { + "label": "Troubleshooting Tools", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 184, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -318.27990812357274, + "y": 1372.2339170325572 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "tk4iG5i1Ml9w9KRO1tGJU", + "type": "subtopic", + "position": { + "x": -292.87569401982097, + "y": 1159.977230118865 + }, + "selected": false, + "data": { + "label": "nslookup", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 90, + "height": 49, + "style": { + "width": 90, + "height": 49 + }, + "positionAbsolute": { + "x": -292.87569401982097, + "y": 1159.977230118865 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "jr8JlyqmN3p7Ol3_kD9AH", + "type": "subtopic", + "position": { + "x": -198.63821789482625, + "y": 1159.4987159982743 + }, + "selected": false, + "data": { + "label": "iptables", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 113, + "height": 49, + "style": { + "width": 113, + "height": 49 + }, + "positionAbsolute": { + "x": -198.63821789482625, + "y": 1159.4987159982743 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "k6UX0BJho5arjGD2RWPgH", + "type": "subtopic", + "position": { + "x": -374.08322195494287, + "y": 1212.4987159982743 + }, + "selected": false, + "data": { + "label": "Packet Sniffers", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 287, + "height": 49, + "style": { + "width": 287, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": -374.08322195494287, + "y": 1212.4987159982743 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "u-6xuZUyOrogh1bU4cwER", + "type": "subtopic", + "position": { + "x": -374.08322195494287, + "y": 1053.977230118865 + }, + "selected": false, + "data": { + "label": "ipconfig", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 85, + "height": 49, + "style": { + "width": 85, + "height": 49 + }, + "positionAbsolute": { + "x": -374.08322195494287, + "y": 1053.977230118865 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "2M3PRbGzo14agbEPe32ww", + "type": "subtopic", + "position": { + "x": -165.58322195494276, + "y": 1053.4987159982743 + }, + "selected": false, + "data": { + "label": "netstat", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 84, + "height": 49, + "style": { + "width": 84, + "height": 49 + }, + "positionAbsolute": { + "x": -165.58322195494276, + "y": 1053.4987159982743 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "iJRQHzh5HXADuWpCouwxv", + "type": "subtopic", + "position": { + "x": -374.08322195494287, + "y": 1265.4987159982743 + }, + "selected": false, + "data": { + "label": "Port Scanners", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 287, + "height": 49, + "style": { + "width": 287, + "height": 49 + }, + "positionAbsolute": { + "x": -374.08322195494287, + "y": 1265.4987159982743 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "GuuY-Q6FZzfspB3wrH64r", + "type": "subtopic", + "position": { + "x": -282.87569401982097, + "y": 1053.977230118865 + }, + "selected": false, + "data": { + "label": "ping", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": -282.87569401982097, + "y": 1053.977230118865 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "D2YYv1iTRGken75sHO0Gt", + "type": "subtopic", + "position": { + "x": -218.87569401982097, + "y": 1053.4987159982743 + }, + "selected": false, + "data": { + "label": "dig", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 50, + "height": 49, + "style": { + "width": 50, + "height": 49 + }, + "positionAbsolute": { + "x": -218.87569401982097, + "y": 1053.4987159982743 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "hkO3Ga6KctKODr4gos6qX", + "type": "subtopic", + "position": { + "x": -132.87569401982097, + "y": 1106.977230118865 + }, + "selected": false, + "data": { + "label": "arp", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 50, + "height": 49, + "style": { + "width": 50, + "height": 49 + }, + "positionAbsolute": { + "x": -132.87569401982097, + "y": 1106.977230118865 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "K05mEAsjImyPge0hDtsU0", + "type": "subtopic", + "position": { + "x": -374.08322195494287, + "y": 1318.4987159982743 + }, + "selected": false, + "data": { + "label": "Protocol Analyzers", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 287, + "height": 49, + "style": { + "width": 287, + "height": 49 + }, + "positionAbsolute": { + "x": -374.08322195494287, + "y": 1318.4987159982743 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "xqwIEyGfdZFxk6QqbPswe", + "type": "subtopic", + "position": { + "x": -303.87569401982097, + "y": 1106.977230118865 + }, + "selected": false, + "data": { + "label": "nmap", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 65, + "height": 49, + "style": { + "width": 65, + "height": 49 + }, + "positionAbsolute": { + "x": -303.87569401982097, + "y": 1106.977230118865 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "xFuWk7M-Vctk_xb7bHbWs", + "type": "subtopic", + "position": { + "x": -374.08322195494287, + "y": 1106.977230118865 + }, + "selected": false, + "data": { + "label": "route", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 65, + "height": 49, + "style": { + "width": 65, + "height": 49 + }, + "positionAbsolute": { + "x": -374.08322195494287, + "y": 1106.977230118865 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "y8GaUNpaCT1Ai88wPOk6d", + "type": "subtopic", + "position": { + "x": -235.8756940198209, + "y": 1106.4987159982743 + }, + "selected": false, + "data": { + "label": "tcpdump", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -235.8756940198209, + "y": 1106.4987159982743 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "cSz9Qx3PGwmhq3SSKYKfg", + "type": "subtopic", + "position": { + "x": -374.08322195494287, + "y": 1159.977230118865 + }, + "selected": false, + "data": { + "label": "tracert", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 75, + "height": 49, + "style": { + "width": 75, + "height": 49 + }, + "positionAbsolute": { + "x": -374.08322195494287, + "y": 1159.977230118865 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "lG6afUOx3jSQFxbH92otL", + "type": "subtopic", + "position": { + "x": -378.9678393462476, + "y": 1433.102464459639 + }, + "selected": false, + "data": { + "label": "Kerberos", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 93, + "height": 49, + "style": { + "width": 93, + "height": 49 + }, + "positionAbsolute": { + "x": -378.9678393462476, + "y": 1433.102464459639 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "lV3swvD6QGLmD9iVfbKIF", + "type": "subtopic", + "position": { + "x": -197.96783934624762, + "y": 1433.102464459639 + }, + "selected": false, + "data": { + "label": "LDAP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": -197.96783934624762, + "y": 1433.102464459639 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "xL32OqDKm6O043TYgVV1r", + "type": "subtopic", + "position": { + "x": -133.96783934624762, + "y": 1433.102464459639 + }, + "selected": false, + "data": { + "label": "SSO", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "tH3RLnJseqOzRIbZMklHD" + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": -133.96783934624762, + "y": 1433.102464459639 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "tH3RLnJseqOzRIbZMklHD", + "type": "subtopic", + "position": { + "x": -281.9678393462476, + "y": 1433.102464459639 + }, + "selected": false, + "data": { + "label": "RADIUS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 80, + "height": 49, + "style": { + "width": 80, + "height": 49 + }, + "positionAbsolute": { + "x": -281.9678393462476, + "y": 1433.102464459639 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "WXRaVCYwuGQsjJ5wyvbea", + "type": "subtopic", + "position": { + "x": -378.9678393462476, + "y": 1486.102464459639 + }, + "selected": false, + "data": { + "label": "Certificates", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "vYvFuz7lAJXZ1vK_4999a" + }, + "zIndex": 999, + "width": 133, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": -378.9678393462476, + "y": 1486.102464459639 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "vYvFuz7lAJXZ1vK_4999a", + "type": "subtopic", + "position": { + "x": -243.52256827022848, + "y": 1486.102464459639 + }, + "selected": false, + "data": { + "label": "Local Auth", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 168, + "height": 49, + "style": { + "width": 168, + "height": 49 + }, + "positionAbsolute": { + "x": -243.52256827022848, + "y": 1486.102464459639 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "RB-mm3jkLiiEbUthZ3iAt", + "type": "label", + "position": { + "x": -355.9371056176701, + "y": 1547.6076210179635 + }, + "selected": false, + "data": { + "label": "Authentication Methodologies", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 245, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -355.9371056176701, + "y": 1547.6076210179635 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "width": 273, + "height": 49, + "id": "_hYN0gEi9BL24nptEtXWU", + "type": "topic", + "position": { + "x": 347.8530388610519, + "y": 1648.4704602802167 + }, + "selected": false, + "data": { + "label": "Security Skills and Knowledge", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "c1edrcSmHO_L2e9DGh7st" + }, + "zIndex": 999, + "style": { + "width": 273, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": 347.8530388610519, + "y": 1648.4704602802167 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "2g3Y0RAgXF0UWpJ-PadMR", + "type": "horizontal", + "position": { + "x": 236.71759906901679, + "y": 86.75104790092138 + }, + "selected": false, + "data": { + "label": "horizontal node", + "style": { + "stroke": "#2B78E4", + "strokeWidth": 3.5 + } + }, + "zIndex": 999, + "width": 429, + "height": 20, + "style": { + "width": 429, + "height": 20 + }, + "positionAbsolute": { + "x": 236.71759906901679, + "y": 86.75104790092138 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "C53zF5OsU-kO96-MiMDFW", + "type": "vertical", + "position": { + "x": 654.5851719007879, + "y": 94.44149485811568 + }, + "selected": false, + "data": { + "label": "vertical node", + "style": { + "stroke": "#2B78E4", + "strokeWidth": 3.5 + } + }, + "zIndex": 999, + "width": 20, + "height": 3464, + "style": { + "width": 20, + "height": 3464 + }, + "positionAbsolute": { + "x": 654.5851719007879, + "y": 94.44149485811568 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "rzY_QsvnC1shDTPQ-til0", + "type": "subtopic", + "position": { + "x": -386.3067776144529, + "y": 1708.2039959406125 + }, + "selected": false, + "data": { + "label": "Understand Common Hacking Tools", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 366, + "height": 49, + "style": { + "width": 366 + }, + "positionAbsolute": { + "x": -386.3067776144529, + "y": 1708.2039959406125 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "Lg7mz4zeCToEzZBFxYuaU", + "type": "subtopic", + "position": { + "x": -386.3067776144529, + "y": 1761.2039959406125 + }, + "selected": false, + "data": { + "label": "Understand Common Exploit Frameworks", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 366, + "height": 49, + "style": { + "width": 366 + }, + "positionAbsolute": { + "x": -386.3067776144529, + "y": 1761.2039959406125 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "Rae-f9DHDZuwIwW6eRtKF", + "type": "subtopic", + "position": { + "x": -386.3067776144529, + "y": 1814.2039959406125 + }, + "selected": false, + "data": { + "label": "Understand Concept of Defense in Depth", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 366, + "height": 49, + "style": { + "width": 366 + }, + "positionAbsolute": { + "x": -386.3067776144529, + "y": 1814.2039959406125 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "Ec6EairjFJLCHc7b-1xxe", + "type": "subtopic", + "position": { + "x": -386.3067776144529, + "y": 1867.2039959406125 + }, + "selected": false, + "data": { + "label": "Understand Concept of Runbooks", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 366, + "height": 49, + "style": { + "width": 366 + }, + "positionAbsolute": { + "x": -386.3067776144529, + "y": 1867.2039959406125 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "7KLGFfco-hw7a62kXtS3d", + "type": "subtopic", + "position": { + "x": -386.3067776144529, + "y": 1920.2039959406125 + }, + "selected": false, + "data": { + "label": "Understand Basics of Forensics", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 366, + "height": 49, + "style": { + "width": 366 + }, + "positionAbsolute": { + "x": -386.3067776144529, + "y": 1920.2039959406125 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "_x3BgX93N-Pt1_JK7wk0p", + "type": "subtopic", + "position": { + "x": -386.3067776144529, + "y": 1973.2039959406125 + }, + "selected": false, + "data": { + "label": "Basics and Concepts of Threat Hunting", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 366, + "height": 49, + "style": { + "width": 366 + }, + "positionAbsolute": { + "x": -386.3067776144529, + "y": 1973.2039959406125 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "lcxAXtO6LoGd85nOFnLo8", + "type": "subtopic", + "position": { + "x": -386.3067776144529, + "y": 2026.2039959406125 + }, + "selected": false, + "data": { + "label": "Basics of Vulnerability Management", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 366, + "height": 49, + "style": { + "width": 366 + }, + "positionAbsolute": { + "x": -386.3067776144529, + "y": 2026.2039959406125 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "uoGA4T_-c-2ip_zfEUcJJ", + "type": "subtopic", + "position": { + "x": -386.3067776144529, + "y": 2079.2039959406125 + }, + "selected": false, + "data": { + "label": "Basics of Reverse Engineering", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 366, + "height": 49, + "style": { + "width": 366 + }, + "positionAbsolute": { + "x": -386.3067776144529, + "y": 2079.2039959406125 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "NkAAQikwH-A6vrF8fWpuB", + "type": "subtopic", + "position": { + "x": -386.3067776144529, + "y": 2132.203995940613 + }, + "selected": false, + "data": { + "label": "Penetration Testing Rules of Engagement", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 366, + "height": 49, + "style": { + "width": 366, + "height": 49 + }, + "positionAbsolute": { + "x": -386.3067776144529, + "y": 2132.203995940613 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "PUgPgpKio4Npzs86qEXa7", + "type": "subtopic", + "position": { + "x": -386.3067776144529, + "y": 2185.203995940613 + }, + "selected": false, + "data": { + "label": "Perimiter vs DMZ vs Segmentation", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 366, + "height": 49, + "style": { + "width": 366 + }, + "positionAbsolute": { + "x": -386.3067776144529, + "y": 2185.203995940613 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "HavEL0u65ZxHt92TfbLzk", + "type": "subtopic", + "position": { + "x": -12.821574094976086, + "y": 1705.3736998096438 + }, + "selected": false, + "data": { + "label": "Core Concepts of Zero Trust", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 328, + "height": 49, + "style": { + "width": 328 + }, + "positionAbsolute": { + "x": -12.821574094976086, + "y": 1705.3736998096438 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "kqT0FRLt9Ak9P8PhHldO-", + "type": "subtopic", + "position": { + "x": -12.821574094976086, + "y": 1758.3736998096438 + }, + "selected": false, + "data": { + "label": "Roles of Compliance and Auditors", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 328, + "height": 49, + "style": { + "width": 328 + }, + "positionAbsolute": { + "x": -12.821574094976086, + "y": 1758.3736998096438 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "ggAja18sBUUdCfVsT0vCv", + "type": "subtopic", + "position": { + "x": -12.821574094976086, + "y": 1811.3736998096438 + }, + "selected": false, + "data": { + "label": "Understand the Definition of Risk", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 328, + "height": 49, + "style": { + "width": 328 + }, + "positionAbsolute": { + "x": -12.821574094976086, + "y": 1811.3736998096438 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "9asy3STW4oTYYHcUazaRj", + "type": "subtopic", + "position": { + "x": -12.821574094976086, + "y": 1864.3736998096438 + }, + "selected": false, + "data": { + "label": "Understand Backups and Resiliency", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 328, + "height": 49, + "style": { + "width": 328, + "height": 49 + }, + "positionAbsolute": { + "x": -12.821574094976086, + "y": 1864.3736998096438 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "H38Vb7xvuBJXVzgPBdRdT", + "type": "subtopic", + "position": { + "x": -12.821574094976086, + "y": 1917.3736998096438 + }, + "selected": false, + "data": { + "label": "Cyber Kill Chain", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 328, + "height": 49, + "style": { + "width": 328 + }, + "positionAbsolute": { + "x": -12.821574094976086, + "y": 1917.3736998096438 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "pnfVrOjDeG1uYAeqHxhJP", + "type": "subtopic", + "position": { + "x": -12.821574094976086, + "y": 1970.3736998096438 + }, + "selected": false, + "data": { + "label": "MFA & 2FA", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 147, + "height": 49, + "style": { + "width": 147, + "height": 49 + }, + "positionAbsolute": { + "x": -12.821574094976086, + "y": 1970.3736998096438 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "_S25EOGS3P8647zLM5i-g", + "type": "subtopic", + "position": { + "x": -12.821574094976086, + "y": 2023.3736998096438 + }, + "selected": false, + "data": { + "label": "Operating System Hardening", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 328, + "height": 49, + "style": { + "width": 328 + }, + "positionAbsolute": { + "x": -12.821574094976086, + "y": 2023.3736998096438 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "aDF7ZcOX9uR8l0W4aqhYn", + "type": "subtopic", + "position": { + "x": -12.821574094976086, + "y": 2076.3736998096438 + }, + "selected": false, + "data": { + "label": "Understand Concept of Isolation", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 328, + "height": 49, + "style": { + "width": 328 + }, + "positionAbsolute": { + "x": -12.821574094976086, + "y": 2076.3736998096438 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "FJsEBOFexbDyAj86XWBCc", + "type": "subtopic", + "position": { + "x": -12.821574094976086, + "y": 2129.3736998096438 + }, + "selected": false, + "data": { + "label": "Basics of IDS and IPS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 328, + "height": 49, + "style": { + "width": 328 + }, + "positionAbsolute": { + "x": -12.821574094976086, + "y": 2129.3736998096438 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "bj5YX8zhlam0yoNckL8e4", + "type": "subtopic", + "position": { + "x": 139.17842590502391, + "y": 1970.3736998096438 + }, + "selected": false, + "data": { + "label": "Honeypots", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 176, + "height": 49, + "style": { + "width": 176, + "height": 49 + }, + "positionAbsolute": { + "x": 139.17842590502391, + "y": 1970.3736998096438 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "WG7DdsxESm31VcLFfkVTz", + "type": "subtopic", + "position": { + "x": -12.821574094976086, + "y": 2185.203995940613 + }, + "selected": false, + "data": { + "label": "Authentication vs Authorization", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 328, + "height": 49, + "style": { + "width": 328 + }, + "positionAbsolute": { + "x": -12.821574094976086, + "y": 2185.203995940613 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "7tDxTcKJNAUxbHLPCnPFO", + "type": "subtopic", + "position": { + "x": 321.3530388610519, + "y": 1760.4414948581157 + }, + "selected": false, + "data": { + "label": "Blue / Red / Purple Teams", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 326, + "height": 49, + "style": { + "width": 326, + "height": 49 + }, + "positionAbsolute": { + "x": 321.3530388610519, + "y": 1760.4414948581157 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "XwRCZf-yHJsXVjaRfb3R4", + "type": "subtopic", + "position": { + "x": 321.3530388610519, + "y": 1813.4414948581157 + }, + "selected": false, + "data": { + "label": "False Negative / False Positive", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 326, + "height": 49, + "style": { + "width": 326, + "height": 49 + }, + "positionAbsolute": { + "x": 321.3530388610519, + "y": 1813.4414948581157 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "M6uwyD4ibguxytf1od-og", + "type": "subtopic", + "position": { + "x": 321.3530388610519, + "y": 1866.4414948581157 + }, + "selected": false, + "data": { + "label": "True Negative / True Positive", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 326, + "height": 49, + "style": { + "width": 326, + "height": 49 + }, + "positionAbsolute": { + "x": 321.3530388610519, + "y": 1866.4414948581157 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "wN5x5pY53B8d0yopa1z8F", + "type": "subtopic", + "position": { + "x": 321.3530388610519, + "y": 1919.4414948581157 + }, + "selected": false, + "data": { + "label": "Basics of Threat Intel, OSINT", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 326, + "height": 49, + "style": { + "width": 326, + "height": 49 + }, + "positionAbsolute": { + "x": 321.3530388610519, + "y": 1919.4414948581157 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "zQx_VUS1zRmF4zCGjJD5-", + "type": "subtopic", + "position": { + "x": 321.3530388610519, + "y": 1972.4414948581157 + }, + "selected": false, + "data": { + "label": "Understand Handshakes", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 326, + "height": 49, + "style": { + "width": 326, + "height": 49 + }, + "positionAbsolute": { + "x": 321.3530388610519, + "y": 1972.4414948581157 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "uz6ELaLEu9U4fHVfnQiOa", + "type": "subtopic", + "position": { + "x": 321.3530388610519, + "y": 2025.4414948581157 + }, + "selected": false, + "data": { + "label": "Understand CIA Triad", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 326, + "height": 49, + "style": { + "width": 326, + "height": 49 + }, + "positionAbsolute": { + "x": 321.3530388610519, + "y": 2025.4414948581157 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "cvI8-sxY5i8lpelW9iY_5", + "type": "subtopic", + "position": { + "x": 321.3530388610519, + "y": 2078.4414948581157 + }, + "selected": false, + "data": { + "label": "Privilege Escalation", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 326, + "height": 49, + "style": { + "width": 326, + "height": 49 + }, + "positionAbsolute": { + "x": 321.3530388610519, + "y": 2078.4414948581157 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "fyOYVqiBqyKC4aqc6-y0q", + "type": "subtopic", + "position": { + "x": 321.3530388610519, + "y": 2131.4414948581157 + }, + "selected": false, + "data": { + "label": "Web Based Attacks and OWASP10", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 326, + "height": 49, + "style": { + "width": 326, + "height": 49 + }, + "positionAbsolute": { + "x": 321.3530388610519, + "y": 2131.4414948581157 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "v7CD_sHqLWbm9ibXXESIK", + "type": "subtopic", + "position": { + "x": 321.3530388610519, + "y": 2184.4414948581157 + }, + "selected": false, + "data": { + "label": "Learn how Malware works and Types", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 326, + "height": 49, + "style": { + "width": 326, + "height": 49 + }, + "positionAbsolute": { + "x": 321.3530388610519, + "y": 2184.4414948581157 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "i4OwpsvRGbZWIo237UK4b", + "type": "label", + "position": { + "x": -397.4653099623346, + "y": 2252.0833191122806 + }, + "selected": false, + "data": { + "label": "Tools for Incident Response and Discovery", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 345, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -397.4653099623346, + "y": 2252.0833191122806 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "Hoou7kWyfB2wx_yFHug_H", + "type": "subtopic", + "position": { + "x": -338.4653099623346, + "y": 2290.2063949914645 + }, + "selected": false, + "data": { + "label": "nmap", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 65, + "height": 49, + "style": { + "width": 65, + "height": 49 + }, + "positionAbsolute": { + "x": -338.4653099623346, + "y": 2290.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "jJtS0mgCYc0wbjuXssDRO", + "type": "subtopic", + "position": { + "x": -390.6094413103564, + "y": 2396.2063949914645 + }, + "selected": false, + "data": { + "label": "tracert", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 93, + "height": 49, + "style": { + "width": 93, + "height": 49 + }, + "positionAbsolute": { + "x": -390.6094413103564, + "y": 2396.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "OUarb1oS1-PX_3OXNR0rV", + "type": "subtopic", + "position": { + "x": -153.32232134723506, + "y": 2343.2063949914645 + }, + "selected": false, + "data": { + "label": "nslookup", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 103, + "height": 49, + "style": { + "width": 103, + "height": 49 + }, + "positionAbsolute": { + "x": -153.32232134723506, + "y": 2343.2063949914645 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "W7iQUCjODGYgE4PjC5TZI", + "type": "subtopic", + "position": { + "x": -390.7265354509867, + "y": 2449.2063949914645 + }, + "selected": false, + "data": { + "label": "curl", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "IXNGFF4sOFbQ_aND-ELK0" + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -390.7265354509867, + "y": 2449.2063949914645 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "Cclbt4bNfkHwFwZOvJuLK", + "type": "subtopic", + "position": { + "x": -337.58651732554733, + "y": 2343.2063949914645 + }, + "selected": false, + "data": { + "label": "hping", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 67, + "height": 49, + "style": { + "width": 67, + "height": 49 + }, + "dragging": false, + "positionAbsolute": { + "x": -337.58651732554733, + "y": 2343.2063949914645 + }, + "selectable": true, + "focusable": true + }, + { + "id": "yfTpp-ePuDB931FnvNB-Y", + "type": "subtopic", + "position": { + "x": -269.4653099623346, + "y": 2290.2063949914645 + }, + "selected": false, + "data": { + "label": "ping", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 65, + "height": 49, + "style": { + "width": 65, + "height": 49 + }, + "positionAbsolute": { + "x": -269.4653099623346, + "y": 2290.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "fzdZF-nzIL69kaA7kwOCn", + "type": "subtopic", + "position": { + "x": -200.46530996233457, + "y": 2290.2063949914645 + }, + "selected": false, + "data": { + "label": "arp", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "XyaWZZ45axJMKXoWwsyFj" + }, + "zIndex": 999, + "width": 50, + "height": 49, + "style": { + "width": 50, + "height": 49 + }, + "positionAbsolute": { + "x": -200.46530996233457, + "y": 2290.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "D2ptX6ja_HvFEafMIzWOy", + "type": "subtopic", + "position": { + "x": -146.46530996233457, + "y": 2290.2063949914645 + }, + "selected": false, + "data": { + "label": "cat", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 50, + "height": 49, + "style": { + "width": 50, + "height": 49 + }, + "positionAbsolute": { + "x": -146.46530996233457, + "y": 2290.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "9xbU_hrEOUtMm-Q09Fe6t", + "type": "subtopic", + "position": { + "x": -92.46530996233457, + "y": 2290.2063949914645 + }, + "selected": false, + "data": { + "label": "dd", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 40, + "height": 49, + "style": { + "width": 40, + "height": 49 + }, + "positionAbsolute": { + "x": -92.46530996233457, + "y": 2290.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "VNmrb5Dm4UKUgL8JBfhnE", + "type": "subtopic", + "position": { + "x": -266.58651732554733, + "y": 2343.2063949914645 + }, + "selected": false, + "data": { + "label": "head", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 55, + "height": 49, + "style": { + "width": 55, + "height": 49 + }, + "positionAbsolute": { + "x": -266.58651732554733, + "y": 2343.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "Dfz-6aug0juUpMmOJLCJ9", + "type": "subtopic", + "position": { + "x": -207.58651732554733, + "y": 2343.2063949914645 + }, + "selected": false, + "data": { + "label": "grep", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "762Wf_Eh-3zq69CZZiIjR" + }, + "zIndex": 999, + "width": 50, + "height": 49, + "style": { + "width": 50, + "height": 49 + }, + "positionAbsolute": { + "x": -207.58651732554733, + "y": 2343.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "Sm9bxKUElINHND8FdZ5f2", + "type": "subtopic", + "position": { + "x": -287.4144666736619, + "y": 2449.2063949914645 + }, + "selected": false, + "data": { + "label": "wireshark", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 115, + "height": 49, + "style": { + "width": 115, + "height": 49 + }, + "positionAbsolute": { + "x": -287.4144666736619, + "y": 2449.2063949914645 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "gNan93Mg9Ym2AF3Q2gqoi", + "type": "subtopic", + "position": { + "x": -293.0339026025639, + "y": 2396.2063949914645 + }, + "selected": false, + "data": { + "label": "winhex", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 75, + "height": 49, + "style": { + "width": 75, + "height": 49 + }, + "positionAbsolute": { + "x": -293.0339026025639, + "y": 2396.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "wspNQPmqWRjKoFm6x_bVw", + "type": "subtopic", + "position": { + "x": -167.0339026025639, + "y": 2449.2063949914645 + }, + "selected": false, + "data": { + "label": "memdump", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 117, + "height": 49, + "style": { + "width": 117, + "height": 49 + }, + "positionAbsolute": { + "x": -167.0339026025639, + "y": 2449.2063949914645 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "_jJhL1RtaqHJmlcWrd-Ak", + "type": "subtopic", + "position": { + "x": -392.4653099623346, + "y": 2503.2063949914645 + }, + "selected": false, + "data": { + "label": "FTK Imager", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 343, + "height": 49, + "style": { + "width": 343, + "height": 49 + }, + "positionAbsolute": { + "x": -392.4653099623346, + "y": 2503.2063949914645 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "bIwpjIoxSUZloxDuQNpMu", + "type": "subtopic", + "position": { + "x": -214.0339026025639, + "y": 2396.2063949914645 + }, + "selected": false, + "data": { + "label": "autopsy", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 80, + "height": 49, + "style": { + "width": 80, + "height": 49 + }, + "positionAbsolute": { + "x": -214.0339026025639, + "y": 2396.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "XyaWZZ45axJMKXoWwsyFj", + "type": "subtopic", + "position": { + "x": -394.18744148438975, + "y": 2290.2063949914645 + }, + "selected": false, + "data": { + "label": "dig", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 50, + "height": 49, + "style": { + "width": 50, + "height": 49 + }, + "positionAbsolute": { + "x": -394.18744148438975, + "y": 2290.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "762Wf_Eh-3zq69CZZiIjR", + "type": "subtopic", + "position": { + "x": -393.3086488476025, + "y": 2343.2063949914645 + }, + "selected": false, + "data": { + "label": "tail", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 50, + "height": 49, + "style": { + "width": 50, + "height": 49 + }, + "positionAbsolute": { + "x": -393.3086488476025, + "y": 2343.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "IXNGFF4sOFbQ_aND-ELK0", + "type": "subtopic", + "position": { + "x": -130.0339026025639, + "y": 2396.2063949914645 + }, + "selected": false, + "data": { + "label": "ipconfig", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 80, + "height": 49, + "style": { + "width": 80, + "height": 49 + }, + "positionAbsolute": { + "x": -130.0339026025639, + "y": 2396.2063949914645 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "P_-Fdgkjhzxniq3KW8PlP", + "type": "label", + "position": { + "x": 37.30493408913787, + "y": 2250.510869531745 + }, + "selected": false, + "data": { + "label": "Basics of Cryptography", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 194, + "height": 36, + "style": { + "width": 194 + }, + "positionAbsolute": { + "x": 37.30493408913787, + "y": 2250.510869531745 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "jqWhR6oTyX6yolUBv71VC", + "type": "subtopic", + "position": { + "x": -32.088771536615354, + "y": 2288.2039836635786 + }, + "selected": false, + "data": { + "label": "Salting", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 85, + "height": 49, + "style": { + "width": 85, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": -32.088771536615354, + "y": 2288.2039836635786 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "0UZmAECMnfioi-VeXcvg8", + "type": "subtopic", + "position": { + "x": 55.911228463384646, + "y": 2288.2039836635786 + }, + "selected": false, + "data": { + "label": "Hashing", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": 55.911228463384646, + "y": 2288.2039836635786 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "rmR6HJqEhHDgX55Xy5BAW", + "type": "subtopic", + "position": { + "x": 158.91122846338465, + "y": 2288.2039836635786 + }, + "selected": false, + "data": { + "label": "Key Exchange", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 176, + "height": 49, + "style": { + "width": 176, + "height": 49 + }, + "positionAbsolute": { + "x": 158.91122846338465, + "y": 2288.2039836635786 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "fxyJxrf3mnFTa3wXk1MCW", + "type": "subtopic", + "position": { + "x": -29.76962993617201, + "y": 2394.2039836635786 + }, + "selected": false, + "data": { + "label": "PKI", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -29.76962993617201, + "y": 2394.2039836635786 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "7svh9qaaPp0Hz23yinIye", + "type": "subtopic", + "position": { + "x": -31.088771536615354, + "y": 2341.2039836635786 + }, + "selected": false, + "data": { + "label": "Private vs Public Keys", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 366, + "height": 49, + "style": { + "width": 366, + "height": 49 + }, + "positionAbsolute": { + "x": -31.088771536615354, + "y": 2341.2039836635786 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "kxlg6rpfqqoBfmMMg3EkJ", + "type": "subtopic", + "position": { + "x": 73.29933557865638, + "y": 2394.2039836635786 + }, + "selected": false, + "data": { + "label": "Obfuscation", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 262, + "height": 49, + "style": { + "width": 262, + "height": 49 + }, + "positionAbsolute": { + "x": 73.29933557865638, + "y": 2394.2039836635786 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "wb3Wc9be7bJ_Xr5p-Pnvm", + "type": "label", + "position": { + "x": 38.826457096334934, + "y": 2453.243819102248 + }, + "selected": false, + "data": { + "label": "Understand Frameworks", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + }, + "oldId": "ck93KaGoD_sGLp2Y-DvIR" + }, + "zIndex": 999, + "width": 205, + "height": 36, + "style": {}, + "dragging": false, + "positionAbsolute": { + "x": 38.826457096334934, + "y": 2453.243819102248 + }, + "selectable": true, + "focusable": true + }, + { + "id": "auR7fNyd77W2UA-PjXeJS", + "type": "subtopic", + "position": { + "x": -31.094399224729955, + "y": 2548.5997297616595 + }, + "selected": false, + "data": { + "label": "ATT&CK", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 369, + "height": 49, + "style": { + "width": 369, + "height": 49 + }, + "positionAbsolute": { + "x": -31.094399224729955, + "y": 2548.5997297616595 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "7Bmp4x6gbvWMuVDdGRUGj", + "type": "subtopic", + "position": { + "x": 142.74695349177136, + "y": 2494.243819102248 + }, + "selected": false, + "data": { + "label": "Kill Chain", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 194, + "height": 49, + "style": { + "width": 194, + "height": 49 + }, + "positionAbsolute": { + "x": 142.74695349177136, + "y": 2494.243819102248 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "AY-hoPGnAZSd1ExaYX8LR", + "type": "subtopic", + "position": { + "x": -29.253046508228294, + "y": 2494.243819102248 + }, + "selected": false, + "data": { + "label": "Diamond Model", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 167, + "height": 49, + "style": { + "width": 167, + "height": 49 + }, + "positionAbsolute": { + "x": -29.253046508228294, + "y": 2494.243819102248 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "zruYWobdu1xW9lTDUZk4-", + "type": "label", + "position": { + "x": -360.95613538933264, + "y": 2562.1620246644734 + }, + "selected": false, + "data": { + "label": "Understand Common Standards", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 263, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -360.95613538933264, + "y": 2562.1620246644734 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "oRssaVG-K-JwlL6TAHhXw", + "type": "subtopic", + "position": { + "x": -384.91598845744454, + "y": 2598.1620246644734 + }, + "selected": false, + "data": { + "label": "ISO", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 154, + "height": 50, + "dragging": false, + "positionAbsolute": { + "x": -384.91598845744454, + "y": 2598.1620246644734 + }, + "style": { + "width": 154, + "height": 50 + }, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "SOkJUTd1NUKSwYMIprv4m", + "type": "subtopic", + "position": { + "x": -386.0128034325229, + "y": 2652.981221365879 + }, + "selected": false, + "data": { + "label": "NIST", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": -386.0128034325229, + "y": 2652.981221365879 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "fjEdufrZAfW4Rl6yDU8Hk", + "type": "subtopic", + "position": { + "x": -226.11295342651772, + "y": 2599.4860956375887 + }, + "selected": false, + "data": { + "label": "RMF", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 148, + "height": 49, + "style": { + "width": 148, + "height": 49 + }, + "positionAbsolute": { + "x": -226.11295342651772, + "y": 2599.4860956375887 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "sSihnptkoEqUsHjDpckhG", + "type": "subtopic", + "position": { + "x": -282.0128034325229, + "y": 2652.981221365879 + }, + "selected": false, + "data": { + "label": "CIS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -282.0128034325229, + "y": 2652.981221365879 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "HjfgaSEZjW9BOXy_Ixzkk", + "type": "subtopic", + "position": { + "x": -178.0128034325229, + "y": 2652.981221365879 + }, + "selected": false, + "data": { + "label": "CSF", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -178.0128034325229, + "y": 2652.981221365879 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "ILAZCecheh0RHHitBx7B2", + "type": "label", + "position": { + "x": 47.08525598386245, + "y": 2703.053685572214 + }, + "selected": false, + "data": { + "label": "Understand the following", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 206, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 47.08525598386245, + "y": 2703.053685572214 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "c2kY3wZVFKZYxMARhLIwO", + "type": "subtopic", + "position": { + "x": -37.4002781040698, + "y": 2740.7296145990986 + }, + "selected": false, + "data": { + "label": "SIEM", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 183, + "height": 49, + "style": { + "width": 183, + "height": 49 + }, + "positionAbsolute": { + "x": -37.4002781040698, + "y": 2740.7296145990986 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "i0ulrA-GJrNhIVmzdWDrn", + "type": "subtopic", + "position": { + "x": 149.9278798192786, + "y": 2740.7296145990986 + }, + "selected": false, + "data": { + "label": "SOAR", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 185, + "height": 49, + "style": { + "width": 185, + "height": 49 + }, + "positionAbsolute": { + "x": 149.9278798192786, + "y": 2740.7296145990986 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "Kg9vI3skbes7-UqApDWq0", + "type": "label", + "position": { + "x": 35.42728088457284, + "y": 2607.976059656408 + }, + "selected": false, + "data": { + "label": "Common Distros for hacking", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 233, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 35.42728088457284, + "y": 2607.976059656408 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "zR6djXnfTSFVEfvJonQjf", + "type": "subtopic", + "position": { + "x": -33.57271911542716, + "y": 2648.0174045771755 + }, + "selected": false, + "data": { + "label": "ParrotOS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 179, + "height": 49, + "style": { + "width": 179, + "height": 49 + }, + "positionAbsolute": { + "x": -33.57271911542716, + "y": 2648.0174045771755 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "w6wXkoLrv0_d-Ah0txUHd", + "type": "subtopic", + "position": { + "x": 151.42728088457295, + "y": 2648.0174045771755 + }, + "selected": false, + "data": { + "label": "Kali Linux", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 181, + "height": 49, + "style": { + "width": 181, + "height": 49 + }, + "positionAbsolute": { + "x": 151.42728088457295, + "y": 2648.0174045771755 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "10qbxX8DCrfyH7tgYexxQ", + "type": "subtopic", + "position": { + "x": -388.85457362646355, + "y": 2743.5549352589032 + }, + "selected": false, + "data": { + "label": "LOLBAS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 317, + "height": 49, + "style": { + "width": 317, + "height": 49 + }, + "positionAbsolute": { + "x": -388.85457362646355, + "y": 2743.5549352589032 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "3Q030CQumukKTg3YessCN", + "type": "label", + "position": { + "x": -375.35457362646355, + "y": 2707.5549352589032 + }, + "selected": false, + "data": { + "label": "Using tools for Unintended Purposes", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 298, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -375.35457362646355, + "y": 2707.5549352589032 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "JAEDRu2Vg-0M_TJi2cnPg", + "type": "label", + "position": { + "x": -367.75778399033004, + "y": 2798.7107069230883 + }, + "selected": false, + "data": { + "label": "Learn how to find and use these logs", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 297, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -367.75778399033004, + "y": 2798.7107069230883 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "KbFwL--xF-eYjGy8PZdrM", + "type": "subtopic", + "position": { + "x": -388.6044451290735, + "y": 2838.7107069230883 + }, + "selected": false, + "data": { + "label": "Event Logs", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 131, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": -388.6044451290735, + "y": 2838.7107069230883 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "7oFwRkmoZom8exMDtMslX", + "type": "subtopic", + "position": { + "x": -253.6044451290735, + "y": 2838.7107069230883 + }, + "selected": false, + "data": { + "label": "syslogs", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 80, + "height": 49, + "style": { + "width": 80, + "height": 49 + }, + "positionAbsolute": { + "x": -253.6044451290735, + "y": 2838.7107069230883 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "xXz-SwvXA2cLfdCd-hLtW", + "type": "subtopic", + "position": { + "x": -169.6044451290735, + "y": 2838.7107069230883 + }, + "selected": false, + "data": { + "label": "netflow", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -169.6044451290735, + "y": 2838.7107069230883 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "TIxEkfBrN6EXQ3IKP1B7u", + "type": "subtopic", + "position": { + "x": -388.6044451290735, + "y": 2891.7107069230883 + }, + "selected": false, + "data": { + "label": "Packet Captures", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 172, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": -388.6044451290735, + "y": 2891.7107069230883 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "np0PwKy-EvIa_f_LC6Eem", + "type": "subtopic", + "position": { + "x": -213.26336243433695, + "y": 2891.7107069230883 + }, + "selected": false, + "data": { + "label": "Firewall Logs", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 145, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": -213.26336243433695, + "y": 2891.7107069230883 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "H1RC3OllZeqe_NvNcS1pU", + "type": "label", + "position": { + "x": -357.64456633552516, + "y": 2951.981221365879 + }, + "selected": false, + "data": { + "label": "Understand Hardening Concepts", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 270, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -357.64456633552516, + "y": 2951.981221365879 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "OAukNfV5T0KTnIF9jKYRF", + "type": "subtopic", + "position": { + "x": -390.489702350469, + "y": 2987.981221365879 + }, + "selected": false, + "data": { + "label": "MAC-based", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 136, + "height": 49, + "style": { + "width": 136, + "height": 49 + }, + "positionAbsolute": { + "x": -390.489702350469, + "y": 2987.981221365879 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "6oAzYfwsHQYNVbi7c2Tly", + "type": "subtopic", + "position": { + "x": -250.09048932508256, + "y": 2987.981221365879 + }, + "selected": false, + "data": { + "label": "NAC-based", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 186, + "height": 49, + "style": { + "width": 186, + "height": 49 + }, + "positionAbsolute": { + "x": -250.09048932508256, + "y": 2987.981221365879 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "W7bcydXdwlubXF2PHKOuq", + "type": "subtopic", + "position": { + "x": -388.87214999228615, + "y": 3040.981221365879 + }, + "selected": false, + "data": { + "label": "Port Blocking", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 147, + "height": 49, + "style": { + "width": 147, + "height": 49 + }, + "positionAbsolute": { + "x": -388.87214999228615, + "y": 3040.981221365879 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "FxuMJmDoDkIsPFp2iocFg", + "type": "subtopic", + "position": { + "x": -237.64861965573243, + "y": 3040.981221365879 + }, + "selected": false, + "data": { + "label": "Group Policy", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 175, + "height": 49, + "style": { + "width": 175, + "height": 49 + }, + "positionAbsolute": { + "x": -237.64861965573243, + "y": 3040.981221365879 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "8JM95sonFUhZCdaynUA_M", + "type": "subtopic", + "position": { + "x": -285.148619655732, + "y": 3093.981221365879 + }, + "selected": false, + "data": { + "label": "ACLs", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": -285.148619655732, + "y": 3093.981221365879 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "oFgyQYL3Ws-l7B5AF-bTR", + "type": "subtopic", + "position": { + "x": -388.87214999228615, + "y": 3093.981221365879 + }, + "selected": false, + "data": { + "label": "Sinkholes", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -388.87214999228615, + "y": 3093.981221365879 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "e-MDyUR3GEv-e4Qsx_5vV", + "type": "subtopic", + "position": { + "x": -220.49844999825234, + "y": 3093.981221365879 + }, + "selected": false, + "data": { + "label": "Patching", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 159, + "height": 49, + "style": { + "width": 159, + "height": 49 + }, + "positionAbsolute": { + "x": -220.49844999825234, + "y": 3093.981221365879 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "UF3BV1sEEOrqh5ilnfM1B", + "type": "subtopic", + "position": { + "x": -388.87214999228615, + "y": 3146.981221365879 + }, + "selected": false, + "data": { + "label": "Jump Server", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 144, + "height": 49, + "style": { + "width": 144, + "height": 49 + }, + "positionAbsolute": { + "x": -388.87214999228615, + "y": 3146.981221365879 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "LEgJtu1GZKOtoAXyOGWLE", + "type": "subtopic", + "position": { + "x": -241.48970235046897, + "y": 3146.981221365879 + }, + "selected": false, + "data": { + "label": "Endpoint Security", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 180, + "height": 49, + "style": { + "width": 180, + "height": 49 + }, + "positionAbsolute": { + "x": -241.48970235046897, + "y": 3146.981221365879 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "ck93KaGoD_sGLp2Y-DvIR", + "type": "label", + "position": { + "x": 17.490706786434203, + "y": 2796.281557042384 + }, + "selected": false, + "data": { + "label": "Secure vs Unsecure Protocols", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 248, + "height": 36, + "style": {}, + "dragging": false, + "positionAbsolute": { + "x": 17.490706786434203, + "y": 2796.281557042384 + }, + "selectable": true, + "focusable": true + }, + { + "id": "9Z6HPHPj4escSVDWftFEx", + "type": "subtopic", + "position": { + "x": -44.902998839319025, + "y": 2838.322637378838 + }, + "selected": false, + "data": { + "label": "FTP vs SFTP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 143, + "height": 49, + "style": { + "width": 143, + "height": 49 + }, + "positionAbsolute": { + "x": -44.902998839319025, + "y": 2838.322637378838 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "6ILPXeUDDmmYRiA_gNTSr", + "type": "subtopic", + "position": { + "x": 102.09700116068097, + "y": 2838.322637378838 + }, + "selected": false, + "data": { + "label": "SSL vs TLS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 132, + "height": 49, + "style": { + "width": 132, + "height": 49 + }, + "positionAbsolute": { + "x": 102.09700116068097, + "y": 2838.322637378838 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "gNFVtBxSYP5Uw3o3tlJ0M", + "type": "subtopic", + "position": { + "x": 237.09700116068097, + "y": 2838.322637378838 + }, + "selected": false, + "data": { + "label": "IPSEC", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": 237.09700116068097, + "y": 2838.322637378838 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "LLGXONul7JfZGUahnK0AZ", + "type": "subtopic", + "position": { + "x": -43.902998839319025, + "y": 2893.322637378838 + }, + "selected": false, + "data": { + "label": "DNSSEC", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": -43.902998839319025, + "y": 2893.322637378838 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "z_fDvTgKw51Uepo6eMQd9", + "type": "subtopic", + "position": { + "x": 60.097001160680975, + "y": 2893.322637378838 + }, + "selected": false, + "data": { + "label": "LDAPS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": { + "width": 70, + "height": 49 + }, + "positionAbsolute": { + "x": 60.097001160680975, + "y": 2893.322637378838 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "_9lQSG6fn69Yd9rs1pQdL", + "type": "subtopic", + "position": { + "x": 134.09700116068097, + "y": 2893.322637378838 + }, + "selected": false, + "data": { + "label": "SRTP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 88, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 134.09700116068097, + "y": 2893.322637378838 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "9rmDvycXFcsGOq3v-_ziD", + "type": "subtopic", + "position": { + "x": 226.09700116068097, + "y": 2893.322637378838 + }, + "selected": false, + "data": { + "label": "S/MIME", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 109, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 226.09700116068097, + "y": 2893.322637378838 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "217hzGfJmj6rLNjOGKx9q", + "type": "label", + "position": { + "x": 1.4413708711549589, + "y": 2944.404798051745 + }, + "selected": false, + "data": { + "label": "Understand the following Terms", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 258, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 1.4413708711549589, + "y": 2944.404798051745 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "3140n5prZYySsuBHjqGOJ", + "type": "subtopic", + "position": { + "x": -43.979485449910044, + "y": 2983.404798051745 + }, + "selected": false, + "data": { + "label": "Antivirus", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 132, + "height": 49, + "style": { + "width": 132, + "height": 49 + }, + "positionAbsolute": { + "x": -43.979485449910044, + "y": 2983.404798051745 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "9QtY1hMJ7NKLFztYK-mHY", + "type": "subtopic", + "position": { + "x": 91.11930413931702, + "y": 2983.404798051745 + }, + "selected": false, + "data": { + "label": "Antimalware", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 122, + "height": 49, + "style": { + "width": 122, + "height": 49 + }, + "positionAbsolute": { + "x": 91.11930413931702, + "y": 2983.404798051745 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "QvHWrmMzO8IvNQ234E_wf", + "type": "subtopic", + "position": { + "x": 217.02051455009007, + "y": 2983.404798051745 + }, + "selected": false, + "data": { + "label": "EDR", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": 217.02051455009007, + "y": 2983.404798051745 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "iolsTC-63d_1wzKGul-cT", + "type": "subtopic", + "position": { + "x": 281.02051455009007, + "y": 2983.404798051745 + }, + "selected": false, + "data": { + "label": "DLP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 60, + "height": 49, + "style": { + "width": 60, + "height": 49 + }, + "positionAbsolute": { + "x": 281.02051455009007, + "y": 2983.404798051745 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "35oCRzhzpVfitQPL4K9KC", + "type": "subtopic", + "position": { + "x": 238.02051455009007, + "y": 3142.404798051745 + }, + "selected": false, + "data": { + "label": "ACL", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 102, + "height": 49, + "style": { + "width": 102, + "height": 49 + }, + "positionAbsolute": { + "x": 238.02051455009007, + "y": 3142.404798051745 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "tWDo5R3KU5KOjDdtv801x", + "type": "subtopic", + "position": { + "x": -42.979485449910044, + "y": 3036.404798051745 + }, + "selected": false, + "data": { + "label": "Firwall & Nextgen Firewall", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 242, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": -42.979485449910044, + "y": 3036.404798051745 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "l5EnhOCnkN-RKvgrS9ylH", + "type": "subtopic", + "position": { + "x": 203.02051455009007, + "y": 3036.404798051745 + }, + "selected": false, + "data": { + "label": "HIPS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 65, + "height": 49, + "style": { + "width": 65, + "height": 49 + }, + "positionAbsolute": { + "x": 203.02051455009007, + "y": 3036.404798051745 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "LIPtxl_oKZRcbvXT4EdNf", + "type": "subtopic", + "position": { + "x": 272.02051455009007, + "y": 3036.404798051745 + }, + "selected": false, + "data": { + "label": "NIDS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": { + "width": 70, + "height": 49 + }, + "positionAbsolute": { + "x": 272.02051455009007, + "y": 3036.404798051745 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "7w9qj16OD4pUzq-ItdxeK", + "type": "subtopic", + "position": { + "x": -41.979485449910044, + "y": 3089.404798051745 + }, + "selected": false, + "data": { + "label": "NIPS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": { + "width": 70, + "height": 49 + }, + "positionAbsolute": { + "x": -41.979485449910044, + "y": 3089.404798051745 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "jWl1VWkZn3n1G2eHq6EnX", + "type": "subtopic", + "position": { + "x": 31.02051455009007, + "y": 3089.404798051745 + }, + "selected": false, + "data": { + "label": "Host Based Firwall", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 188, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 31.02051455009007, + "y": 3089.404798051745 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "SLKwuLHHpC7D1FqrpPRAe", + "type": "subtopic", + "position": { + "x": 222.02051455009007, + "y": 3089.404798051745 + }, + "selected": false, + "data": { + "label": "Sandboxing", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 119, + "height": 49, + "style": { + "width": 119, + "height": 49 + }, + "positionAbsolute": { + "x": 222.02051455009007, + "y": 3089.404798051745 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "1jwtExZzR9ABKvD_S9zFG", + "type": "subtopic", + "position": { + "x": -41.51099093222729, + "y": 3142.404798051745 + }, + "selected": false, + "data": { + "label": "EAP vs PEAP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 146, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": -41.51099093222729, + "y": 3142.404798051745 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "HSCGbM2-aTnJWUX6jGaDP", + "type": "subtopic", + "position": { + "x": 106.4142201758433, + "y": 3142.404798051745 + }, + "selected": false, + "data": { + "label": "WPS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + }, + "oldId": "MBnDE0VyVh2u2p-r90jVk" + }, + "zIndex": 999, + "width": 128, + "height": 49, + "style": { + "width": 128, + "height": 49 + }, + "positionAbsolute": { + "x": 106.4142201758433, + "y": 3142.404798051745 + }, + "selectable": true, + "focusable": true, + "dragging": false, + "resizing": false + }, + { + "id": "MBnDE0VyVh2u2p-r90jVk", + "type": "subtopic", + "position": { + "x": -41.51099093222729, + "y": 3195.404798051745 + }, + "selected": false, + "data": { + "label": "WPA vs WPA2 vs WPA3 vs WEP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 382, + "height": 49, + "style": { + "width": 382, + "height": 49 + }, + "positionAbsolute": { + "x": -41.51099093222729, + "y": 3195.404798051745 + }, + "selectable": true, + "focusable": true, + "dragging": false, + "resizing": false + }, + { + "id": "cs_xQZ5Z0IFbqYy6Zkuwp", + "type": "label", + "position": { + "x": -23.8699925629752, + "y": 3254.9867405192167 + }, + "selected": false, + "data": { + "label": "Understand the Incident Response Process", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 352, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -23.8699925629752, + "y": 3254.9867405192167 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "w6V4JOtXKCMPAkKIQxvMg", + "type": "subtopic", + "position": { + "x": -45.8699925629752, + "y": 3291.9867405192167 + }, + "selected": false, + "data": { + "label": "Preparation", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 115, + "height": 49, + "style": { + "width": 115, + "height": 49 + }, + "positionAbsolute": { + "x": -45.8699925629752, + "y": 3291.9867405192167 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "XsRoldaBXUSiGbvY1TjQd", + "type": "subtopic", + "position": { + "x": 72.13000743702469, + "y": 3291.9867405192167 + }, + "selected": false, + "data": { + "label": "Identification", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 136, + "height": 49, + "style": { + "width": 136, + "height": 49 + }, + "positionAbsolute": { + "x": 72.13000743702469, + "y": 3291.9867405192167 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "l7WnKuR2HTD4Vf9U2TxkK", + "type": "subtopic", + "position": { + "x": 211.1300074370247, + "y": 3291.9867405192167 + }, + "selected": false, + "data": { + "label": "Containment", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 134, + "height": 49, + "style": { + "width": 134, + "height": 49 + }, + "positionAbsolute": { + "x": 211.1300074370247, + "y": 3291.9867405192167 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "N17xAIo7sgbB0nrIDMWju", + "type": "subtopic", + "position": { + "x": -46.8699925629752, + "y": 3343.9867405192167 + }, + "selected": false, + "data": { + "label": "Eradication", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 108, + "height": 49, + "style": { + "width": 108, + "height": 49 + }, + "positionAbsolute": { + "x": -46.8699925629752, + "y": 3343.9867405192167 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "vFjbZAJq8OfLb3_tsc7oT", + "type": "subtopic", + "position": { + "x": 64.13000743702457, + "y": 3343.9867405192167 + }, + "selected": false, + "data": { + "label": "Recovery", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": 64.13000743702457, + "y": 3343.9867405192167 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "ErRol7AT02HTn3umsPD_0", + "type": "subtopic", + "position": { + "x": 167.13000743702457, + "y": 3343.9867405192167 + }, + "selected": false, + "data": { + "label": "Lessons Learned", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 178, + "height": 49, + "style": { + "width": 178, + "height": 49 + }, + "positionAbsolute": { + "x": 167.13000743702457, + "y": 3343.9867405192167 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "t5IarTzpQONANS6ReNlNR", + "type": "label", + "position": { + "x": 34.512440489979895, + "y": 3404.176158112092 + }, + "selected": false, + "data": { + "label": "Understand Threat Classification", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 267, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 34.512440489979895, + "y": 3404.176158112092 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "zqRaMmqcLfx400kJ-h0LO", + "type": "subtopic", + "position": { + "x": -36.98755951002022, + "y": 3445.176158112092 + }, + "selected": false, + "data": { + "label": "Zero Day", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 115, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": -36.98755951002022, + "y": 3445.176158112092 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "HPlPGKs7NLqmBidHJkOZg", + "type": "subtopic", + "position": { + "x": 82.0124404899799, + "y": 3445.176158112092 + }, + "selected": false, + "data": { + "label": "Known vs Unknown", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 192, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 82.0124404899799, + "y": 3445.176158112092 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "l0BvDtwWoRSEjm6O0WDPy", + "type": "subtopic", + "position": { + "x": 278.0124404899799, + "y": 3445.176158112092 + }, + "selected": false, + "data": { + "label": "APT", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 55, + "height": 49, + "style": { + "width": 55, + "height": 49 + }, + "positionAbsolute": { + "x": 278.0124404899799, + "y": 3445.176158112092 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "vDjRijJm5bwqBsIhtWtK6", + "type": "label", + "position": { + "x": -327.3151442757461, + "y": 3205.725893479619 + }, + "selected": false, + "data": { + "label": "Understand Common Tools", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 225, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -327.3151442757461, + "y": 3205.725893479619 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "rxzcAzHjzIc9lkWSw0fef", + "type": "subtopic", + "position": { + "x": -391.2531259423894, + "y": 3246.128361959861 + }, + "selected": false, + "data": { + "label": "VirusTotal", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 144, + "height": 49, + "style": { + "width": 144 + }, + "positionAbsolute": { + "x": -391.2531259423894, + "y": 3246.128361959861 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "h__KxKa0Q74_egY7GOe-L", + "type": "subtopic", + "position": { + "x": -391.2531259423894, + "y": 3299.128361959861 + }, + "selected": false, + "data": { + "label": "Joe Sandbox", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 145, + "height": 49, + "style": { + "width": 145, + "height": 49 + }, + "positionAbsolute": { + "x": -391.2531259423894, + "y": 3299.128361959861 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "GZHFR43UzN0WIIxGKZOdX", + "type": "subtopic", + "position": { + "x": -149.25312594238892, + "y": 3246.128361959861 + }, + "selected": false, + "data": { + "label": "any.run", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 90, + "height": 49, + "style": { + "width": 90, + "height": 49 + }, + "positionAbsolute": { + "x": -149.25312594238892, + "y": 3246.128361959861 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "lFt1k1Q-NlWWqyDA3gWD1", + "type": "subtopic", + "position": { + "x": -242.25312594238892, + "y": 3299.128361959861 + }, + "selected": false, + "data": { + "label": "urlvoid", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 90, + "height": 49, + "style": { + "width": 90, + "height": 49 + }, + "positionAbsolute": { + "x": -242.25312594238892, + "y": 3299.128361959861 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "lMiW2q-b72KUl-2S7M6Vb", + "type": "subtopic", + "position": { + "x": -243.25312594238892, + "y": 3246.128361959861 + }, + "selected": false, + "data": { + "label": "urlscan", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 90, + "height": 49, + "style": { + "width": 90, + "height": 49 + }, + "positionAbsolute": { + "x": -243.25312594238892, + "y": 3246.128361959861 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "-RnlvUltJ9IDtH0HEnMbN", + "type": "subtopic", + "position": { + "x": -148.25312594238892, + "y": 3299.128361959861 + }, + "selected": false, + "data": { + "label": "WHOIS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 90, + "height": 49, + "style": { + "width": 90, + "height": 49 + }, + "positionAbsolute": { + "x": -148.25312594238892, + "y": 3299.128361959861 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "3giWhwHHgeNJLz5Nf99zC", + "type": "label", + "position": { + "x": 383.8469469943278, + "y": 2250.510869531745 + }, + "selected": false, + "data": { + "label": "Attack Types and Differences", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 239, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 383.8469469943278, + "y": 2250.510869531745 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "7obusm5UtHwWMcMMEB3lt", + "type": "subtopic", + "position": { + "x": 352.98420930100326, + "y": 2287.395572977175 + }, + "selected": false, + "data": { + "label": "Phishing", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 90, + "height": 49, + "style": { + "width": 90, + "height": 49 + }, + "positionAbsolute": { + "x": 352.98420930100326, + "y": 2287.395572977175 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "M65fCl72qlF0VTbGNT6du", + "type": "subtopic", + "position": { + "x": 445.98420930100326, + "y": 2287.9985721764524 + }, + "selected": false, + "data": { + "label": "Whishing", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 98, + "height": 49, + "style": { + "width": 98, + "height": 49 + }, + "positionAbsolute": { + "x": 445.98420930100326, + "y": 2287.9985721764524 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "KSwl6sX2W47vUmytpm8LH", + "type": "subtopic", + "position": { + "x": 546.1233039027528, + "y": 2287.1274970529876 + }, + "selected": false, + "data": { + "label": "Whaling", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 90, + "height": 49, + "style": { + "width": 90, + "height": 49 + }, + "positionAbsolute": { + "x": 546.1233039027528, + "y": 2287.1274970529876 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "d4U6Jq-CUB1nNN2OCFoum", + "type": "subtopic", + "position": { + "x": 354.150252911777, + "y": 2340.0510104423965 + }, + "selected": false, + "data": { + "label": "Smishing", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 119, + "height": 49, + "style": { + "width": 119, + "height": 49 + }, + "positionAbsolute": { + "x": 354.150252911777, + "y": 2340.0510104423965 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "cbEMUyg_btIPjdx-XqIM5", + "type": "subtopic", + "position": { + "x": 478.1502529117769, + "y": 2340.0510104423965 + }, + "selected": false, + "data": { + "label": "Spam vs Spim", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 158, + "height": 49, + "style": { + "width": 158, + "height": 49 + }, + "positionAbsolute": { + "x": 478.1502529117769, + "y": 2340.0510104423965 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "FD0bkmxNpPXiUB_NevEUf", + "type": "subtopic", + "position": { + "x": 355.3694615873112, + "y": 2393.4942600143736 + }, + "selected": false, + "data": { + "label": "Shoulder Surfing", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 172, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 355.3694615873112, + "y": 2393.4942600143736 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "Iu0Qtk13RjrhHpSlm0uyh", + "type": "subtopic", + "position": { + "x": 355.8027138407715, + "y": 2447.3726171714725 + }, + "selected": false, + "data": { + "label": "Dumpster Diving", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 282, + "height": 49, + "style": { + "width": 282 + }, + "positionAbsolute": { + "x": 355.8027138407715, + "y": 2447.3726171714725 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "o-keJgF9hmifQ_hUD91iN", + "type": "subtopic", + "position": { + "x": 531.1638539442414, + "y": 2393.4942600143736 + }, + "selected": false, + "data": { + "label": "Tailgating", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 106, + "height": 49, + "style": { + "width": 106, + "height": 49 + }, + "positionAbsolute": { + "x": 531.1638539442414, + "y": 2393.4942600143736 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "v9njgIxZyabJZ5iND3JGc", + "type": "subtopic", + "position": { + "x": 355.8027138407715, + "y": 2500.3726171714725 + }, + "selected": false, + "data": { + "label": "Zero day", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 282, + "height": 49, + "style": { + "width": 282, + "height": 49 + }, + "positionAbsolute": { + "x": 355.8027138407715, + "y": 2500.3726171714725 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "O1VceThdxRlgQ6DcGyY7Y", + "type": "subtopic", + "position": { + "x": 355.8027138407715, + "y": 2553.3726171714725 + }, + "selected": false, + "data": { + "label": "Social Engineering", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 282, + "height": 49, + "style": { + "width": 282 + }, + "positionAbsolute": { + "x": 355.8027138407715, + "y": 2553.3726171714725 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "UU_inxa8Y2lLP2BRhdLDT", + "type": "subtopic", + "position": { + "x": 355.8027138407715, + "y": 2606.3726171714725 + }, + "selected": false, + "data": { + "label": "Reconnaissance", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 145, + "height": 49, + "style": { + "width": 145, + "height": 49 + }, + "positionAbsolute": { + "x": 355.8027138407715, + "y": 2606.3726171714725 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "ZEgxmvjWPp5NofLFz_FTJ", + "type": "subtopic", + "position": { + "x": 503.5864782329346, + "y": 2606.3726171714725 + }, + "selected": false, + "data": { + "label": "Impersonation", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 135, + "height": 49, + "style": { + "width": 135, + "height": 49 + }, + "positionAbsolute": { + "x": 503.5864782329346, + "y": 2606.3726171714725 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "dcvuKHq0nHgHLcLwtl4IJ", + "type": "subtopic", + "position": { + "x": 355.8027138407715, + "y": 2659.3726171714725 + }, + "selected": false, + "data": { + "label": "Watering Hole Attack", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 282, + "height": 49, + "style": { + "width": 282 + }, + "positionAbsolute": { + "x": 355.8027138407715, + "y": 2659.3726171714725 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "cO70zHvHgBAH29khF-hBW", + "type": "subtopic", + "position": { + "x": 355.8027138407715, + "y": 2712.3726171714725 + }, + "selected": false, + "data": { + "label": "Drive by Attack", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 282, + "height": 49, + "style": { + "width": 282 + }, + "positionAbsolute": { + "x": 355.8027138407715, + "y": 2712.3726171714725 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "0LeDwj_tMaXjQBBOUJ5CL", + "type": "subtopic", + "position": { + "x": 355.8027138407715, + "y": 2765.3726171714725 + }, + "selected": false, + "data": { + "label": "Typo Squatting", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 282, + "height": 49, + "style": { + "width": 282 + }, + "positionAbsolute": { + "x": 355.8027138407715, + "y": 2765.3726171714725 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "Q0i-plPQkb_NIvOQBVaDd", + "type": "subtopic", + "position": { + "x": 355.8027138407715, + "y": 2818.3726171714725 + }, + "selected": false, + "data": { + "label": "Brute Force vs Password Spray", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 284, + "height": 49, + "style": { + "width": 284, + "height": 49 + }, + "positionAbsolute": { + "x": 355.8027138407715, + "y": 2818.3726171714725 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "resizing": false + }, + { + "id": "xa62u-IX7efTGnKZRQp9a", + "type": "label", + "position": { + "x": 418.4347638543662, + "y": 2878.4514780856343 + }, + "selected": false, + "data": { + "label": "Common Attacks", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 146, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 418.4347638543662, + "y": 2878.4514780856343 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "IF5H0ZJ72XnqXti3jRWYF", + "type": "subtopic", + "position": { + "x": 352.3715014677115, + "y": 2914.3658407653543 + }, + "selected": false, + "data": { + "label": "DoS vs DDoS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 149, + "height": 49, + "style": { + "width": 149, + "height": 49 + }, + "positionAbsolute": { + "x": 352.3715014677115, + "y": 2914.3658407653543 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "ODlVT6MhV-RVUbRMG0mHi", + "type": "subtopic", + "position": { + "x": 504.3715014677115, + "y": 2914.3658407653543 + }, + "selected": false, + "data": { + "label": "MITM", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 62, + "height": 49, + "style": { + "width": 62, + "height": 49 + }, + "dragging": false, + "positionAbsolute": { + "x": 504.3715014677115, + "y": 2914.3658407653543 + }, + "focusable": true, + "selectable": true + }, + { + "id": "LteSouUtAj3JWWOzcjQPl", + "type": "subtopic", + "position": { + "x": 354.616259314598, + "y": 2968.3658407653543 + }, + "selected": false, + "data": { + "label": "Spoofing", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 85, + "height": 49, + "style": { + "width": 85, + "height": 49 + }, + "positionAbsolute": { + "x": 354.616259314598, + "y": 2968.3658407653543 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "O1fY2n40yjZtJUEeoItKr", + "type": "subtopic", + "position": { + "x": 355.31770919950895, + "y": 3021.2980372212155 + }, + "selected": false, + "data": { + "label": "Evil Twin", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 112, + "height": 49, + "style": { + "width": 112, + "height": 49 + }, + "positionAbsolute": { + "x": 355.31770919950895, + "y": 3021.2980372212155 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "urtsyYWViEzbqYLoNfQAh", + "type": "subtopic", + "position": { + "x": 356.97017012850347, + "y": 3074.2215506106245 + }, + "selected": false, + "data": { + "label": "DNS Poisoning", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 290, + "height": 49, + "style": { + "width": 290, + "height": 49 + }, + "positionAbsolute": { + "x": 356.97017012850347, + "y": 3074.2215506106245 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "LfWJJaT3fv0p6fUeS8b84", + "type": "subtopic", + "position": { + "x": 356.97017012850347, + "y": 3127.2215506106245 + }, + "selected": false, + "data": { + "label": "Deauth Attack", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 290, + "height": 49, + "style": { + "width": 290, + "height": 49 + }, + "positionAbsolute": { + "x": 356.97017012850347, + "y": 3127.2215506106245 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "u4hySof6if5hiONSaW-Uf", + "type": "subtopic", + "position": { + "x": 471.86582740539484, + "y": 3021.2980372212155 + }, + "selected": false, + "data": { + "label": "VLAN Hopping", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 176, + "height": 49, + "style": { + "width": 176, + "height": 49 + }, + "positionAbsolute": { + "x": 471.86582740539484, + "y": 3021.2980372212155 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "Ee7LfbhwJbiWjJ3b_bbni", + "type": "subtopic", + "position": { + "x": 356.97017012850347, + "y": 3233.2215506106245 + }, + "selected": false, + "data": { + "label": "Rogue Access Point", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 290, + "height": 49, + "style": { + "width": 290, + "height": 49 + }, + "positionAbsolute": { + "x": 356.97017012850347, + "y": 3233.2215506106245 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "n8ZOZxNhlnw7DpzoXe_f_", + "type": "subtopic", + "position": { + "x": 356.97017012850347, + "y": 3286.2215506106245 + }, + "selected": false, + "data": { + "label": "Buffer Overflow", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 290, + "height": 49, + "style": { + "width": 290, + "height": 49 + }, + "positionAbsolute": { + "x": 356.97017012850347, + "y": 3286.2215506106245 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "nOND14t7ISgSH3zNpV3F8", + "type": "subtopic", + "position": { + "x": 356.97017012850347, + "y": 3339.2215506106245 + }, + "selected": false, + "data": { + "label": "Memory Leak", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 290, + "height": 49, + "style": { + "width": 290, + "height": 49 + }, + "positionAbsolute": { + "x": 356.97017012850347, + "y": 3339.2215506106245 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "2jo1r9O_rCnDwRv1_4Wo-", + "type": "subtopic", + "position": { + "x": 598.1726629484747, + "y": 2968.3658407653543 + }, + "selected": false, + "data": { + "label": "XSS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 50, + "height": 49, + "style": { + "width": 50, + "height": 49 + }, + "positionAbsolute": { + "x": 598.1726629484747, + "y": 2968.3658407653543 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "P-Am25WJV8cFd_KsX7cdj", + "type": "subtopic", + "position": { + "x": 444.1516655887352, + "y": 2968.3658407653543 + }, + "selected": false, + "data": { + "label": "SQL Injection", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 151, + "height": 49, + "style": { + "width": 151, + "height": 49 + }, + "positionAbsolute": { + "x": 444.1516655887352, + "y": 2968.3658407653543 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "pK2iRArULlK-B3iSVo4-n", + "type": "subtopic", + "position": { + "x": 569.983412221404, + "y": 2914.4514780856343 + }, + "selected": false, + "data": { + "label": "CSRF", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 80, + "height": 49, + "style": { + "width": 80, + "height": 49 + }, + "positionAbsolute": { + "x": 569.983412221404, + "y": 2914.4514780856343 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "mIX8PsIGuwgPCGQZ6ok2H", + "type": "subtopic", + "position": { + "x": 356.97017012850347, + "y": 3180.2215506106245 + }, + "selected": false, + "data": { + "label": "Replay Attack", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 290, + "height": 49, + "style": { + "width": 290, + "height": 49 + }, + "positionAbsolute": { + "x": 356.97017012850347, + "y": 3180.2215506106245 + }, + "dragging": false, + "resizing": false, + "focusable": true, + "selectable": true + }, + { + "id": "sMuKqf27y4iG0GrCdF5DN", + "type": "subtopic", + "position": { + "x": 356.97017012850347, + "y": 3392.2215506106245 + }, + "selected": false, + "data": { + "label": "Pass the Hash", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 290, + "height": 49, + "style": { + "width": 290, + "height": 49 + }, + "positionAbsolute": { + "x": 356.97017012850347, + "y": 3392.2215506106245 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "L0ROYh2DNlkybNDO2ezJY", + "type": "subtopic", + "position": { + "x": 355.89368351791245, + "y": 3447.3745238318065 + }, + "selected": false, + "data": { + "label": "Directory Traversal", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 290, + "height": 49, + "style": { + "width": 290, + "height": 49 + }, + "positionAbsolute": { + "x": 355.89368351791245, + "y": 3447.3745238318065 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "44mOl6aMZ_hrCvBtbjeF9", + "type": "label", + "position": { + "x": -324.75869500947636, + "y": 3352.4940622417894 + }, + "selected": false, + "data": { + "label": "Understand Audience", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 183, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": -324.75869500947636, + "y": 3352.4940622417894 + }, + "dragging": false, + "focusable": true, + "selectable": true + }, + { + "id": "lv6fI3WeJawuCbwKtMRIh", + "type": "subtopic", + "position": { + "x": -393.71989686954646, + "y": 3392.349728065271 + }, + "selected": false, + "data": { + "label": "Stakeholders", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 145, + "height": 49, + "style": {}, + "focusable": true, + "dragging": false, + "positionAbsolute": { + "x": -393.71989686954646, + "y": 3392.349728065271 + }, + "selectable": true + }, + { + "id": "05tH6WhToC615JTFN-TPc", + "type": "subtopic", + "position": { + "x": -245.71989686954646, + "y": 3392.349728065271 + }, + "selected": false, + "data": { + "label": "HR", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 70, + "height": 49, + "style": {}, + "focusable": true, + "dragging": false, + "positionAbsolute": { + "x": -245.71989686954646, + "y": 3392.349728065271 + }, + "selectable": true + }, + { + "id": "C5bCIdPi0gGkY_r4qqoXZ", + "type": "subtopic", + "position": { + "x": -172.71989686954646, + "y": 3392.349728065271 + }, + "selected": false, + "data": { + "label": "Legal", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 108, + "height": 49, + "style": { + "width": 108, + "height": 49 + }, + "focusable": true, + "dragging": false, + "positionAbsolute": { + "x": -172.71989686954646, + "y": 3392.349728065271 + }, + "resizing": false, + "selectable": true + }, + { + "id": "05Gbgy6aawYlYIx38u8DE", + "type": "subtopic", + "position": { + "x": -393.901013940946, + "y": 3446.1740585948232 + }, + "selected": false, + "data": { + "label": "Compliance", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 137, + "height": 49, + "style": {}, + "focusable": true, + "dragging": false, + "positionAbsolute": { + "x": -393.901013940946, + "y": 3446.1740585948232 + }, + "selectable": true + }, + { + "id": "s9tHpzYRj2HCImwQhnjFM", + "type": "subtopic", + "position": { + "x": -253.90101394094597, + "y": 3446.1740585948232 + }, + "selected": false, + "data": { + "label": "Management", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 190, + "height": 49, + "style": { + "width": 190, + "height": 49 + }, + "focusable": true, + "dragging": false, + "positionAbsolute": { + "x": -253.90101394094597, + "y": 3446.1740585948232 + }, + "resizing": false, + "selectable": true + }, + { + "id": "pGVjAG7bRay7w5viG1ggu", + "type": "horizontal", + "position": { + "x": 186.43476385436622, + "y": 3548.7191769883557 + }, + "selected": false, + "data": { + "label": "horizontal node", + "style": { + "stroke": "#2B78E4", + "strokeWidth": 3.5 + } + }, + "zIndex": 999, + "width": 479, + "height": 20, + "style": { + "width": 479, + "height": 20 + }, + "positionAbsolute": { + "x": 186.43476385436622, + "y": 3548.7191769883557 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "vVaBQ5VtsE_ZeXbCOF8ux", + "type": "topic", + "position": { + "x": -87.48736734753959, + "y": 3534.2191769883557 + }, + "selected": false, + "data": { + "label": "Cloud Skills and Knowledge", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 281, + "height": 49, + "style": { + "width": 281, + "height": 49 + }, + "positionAbsolute": { + "x": -87.48736734753959, + "y": 3534.2191769883557 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "ThLsXkqLw--uddHz0spCH", + "type": "subtopic", + "position": { + "x": -221.07902321451058, + "y": 3620.5468893358407 + }, + "selected": false, + "data": { + "label": "Understand the Concept of Security in the Cloud", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 546, + "height": 49, + "style": { + "width": 546, + "height": 49 + }, + "positionAbsolute": { + "x": -221.07902321451058, + "y": 3620.5468893358407 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "XL3FVeGFDhAl_gSol6Tjt", + "type": "subtopic", + "position": { + "x": -220.07902321451058, + "y": 3832.5468893358407 + }, + "selected": false, + "data": { + "label": "Understand the basics and general flow of deploying in the cloud", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 544, + "height": 49, + "style": { + "width": 544, + "height": 49 + }, + "positionAbsolute": { + "x": -220.07902321451058, + "y": 3832.5468893358407 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "KGjYM4Onr5GQf1Yv9IabI", + "type": "subtopic", + "position": { + "x": -221.07902321451058, + "y": 3673.5468893358407 + }, + "selected": false, + "data": { + "label": "Understand the differences between cloud and on-premises", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 546, + "height": 49, + "style": { + "width": 546, + "height": 49 + }, + "positionAbsolute": { + "x": -221.07902321451058, + "y": 3673.5468893358407 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "RJctUpvlUJGAdwBNtDSXw", + "type": "subtopic", + "position": { + "x": -221.07902321451058, + "y": 3726.5468893358407 + }, + "selected": false, + "data": { + "label": "Understand the concept of Infrastructure as Cloud", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 546, + "height": 49, + "style": { + "width": 546, + "height": 49 + }, + "positionAbsolute": { + "x": -221.07902321451058, + "y": 3726.5468893358407 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "-83ltMEl3le3yD68OFnTM", + "type": "subtopic", + "position": { + "x": -221.07902321451058, + "y": 3779.5468893358407 + }, + "selected": false, + "data": { + "label": "Understand the Concept of Serverless", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 546, + "height": 49, + "style": { + "width": 546, + "height": 49 + }, + "positionAbsolute": { + "x": -221.07902321451058, + "y": 3779.5468893358407 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "sVw5KVNxPEatBRKb2ZbS_", + "type": "subtopic", + "position": { + "x": 348.3703033755643, + "y": 3650.633058281362 + }, + "selected": false, + "data": { + "label": "SaaS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 85, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 348.3703033755643, + "y": 3650.633058281362 + }, + "selectable": true, + "focusable": true, + "dragging": false + }, + { + "id": "PQ_np6O-4PK2V-r5lywQg", + "type": "subtopic", + "position": { + "x": 437.3703033755643, + "y": 3650.633058281362 + }, + "selected": false, + "data": { + "label": "PaaS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 85, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 437.3703033755643, + "y": 3650.633058281362 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "1nPifNUm-udLChIqLC_uK", + "type": "subtopic", + "position": { + "x": 526.3703033755643, + "y": 3650.633058281362 + }, + "selected": false, + "data": { + "label": "IaaS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 80, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 526.3703033755643, + "y": 3650.633058281362 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "RhWmIPPDg5ajNUwyB9p0A", + "type": "label", + "position": { + "x": 364.6681674118917, + "y": 3611.9784789416267 + }, + "selected": false, + "data": { + "label": "Understand Cloud Services", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 226, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 364.6681674118917, + "y": 3611.9784789416267 + }, + "selectable": true, + "focusable": true, + "dragging": false + }, + { + "id": "rCZEv0M3YolFtqx8mKEJF", + "type": "label", + "position": { + "x": 421.98741462954285, + "y": 3720.2167500044575 + }, + "selected": false, + "data": { + "label": "Cloud Models", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 122, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 421.98741462954285, + "y": 3720.2167500044575 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "ecpMKP1cQXXsfKETDUrSf", + "type": "subtopic", + "position": { + "x": 353.0717936099714, + "y": 3758.86588043262 + }, + "selected": false, + "data": { + "label": "Private", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 80, + "height": 49, + "style": { + "width": 80, + "height": 49 + }, + "positionAbsolute": { + "x": 353.0717936099714, + "y": 3758.86588043262 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "ZDj7KBuyZsKyEMZViMoXW", + "type": "subtopic", + "position": { + "x": 437.0717936099714, + "y": 3758.86588043262 + }, + "selected": false, + "data": { + "label": "Public", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 80, + "height": 49, + "style": { + "width": 80, + "height": 49 + }, + "positionAbsolute": { + "x": 437.0717936099714, + "y": 3758.86588043262 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "ywRlTuTfh5-NHnv4ZyW1t", + "type": "subtopic", + "position": { + "x": 521.0717936099713, + "y": 3758.86588043262 + }, + "selected": false, + "data": { + "label": "Hybrid", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 80, + "height": 49, + "style": { + "width": 80, + "height": 49 + }, + "positionAbsolute": { + "x": 521.0717936099713, + "y": 3758.86588043262 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "0LztOTc3NG3OujCVwlcVU", + "type": "subtopic", + "position": { + "x": 350.7952998916654, + "y": 3865.907779285563 + }, + "selected": false, + "data": { + "label": "AWS", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 80, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 350.7952998916654, + "y": 3865.907779285563 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "tOLA5QPKi6LHl1ljsOMwX", + "type": "subtopic", + "position": { + "x": 434.7952998916654, + "y": 3865.907779285563 + }, + "selected": false, + "data": { + "label": "GCP", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 81, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 434.7952998916654, + "y": 3865.907779285563 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "GklBi7Qx1akN_cS9UMrha", + "type": "subtopic", + "position": { + "x": 519.7952998916654, + "y": 3865.907779285563 + }, + "selected": false, + "data": { + "label": "Azure", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 89, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 519.7952998916654, + "y": 3865.907779285563 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "ZHcNHw2IB3VOdO7I0lgV4", + "type": "label", + "position": { + "x": 357.95550293930967, + "y": 3829.907779285563 + }, + "selected": false, + "data": { + "label": "Common Cloud Environments", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 244, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 357.95550293930967, + "y": 3829.907779285563 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "2jsTgT7k8MeaDtx6RJhOP", + "type": "subtopic", + "position": { + "x": 352.96066721085106, + "y": 3971.506569719654 + }, + "selected": false, + "data": { + "label": "S3", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 66, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 352.96066721085106, + "y": 3971.506569719654 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "9OastXVfiG1YRMm68ecnn", + "type": "subtopic", + "position": { + "x": 421.96066721085106, + "y": 3971.506569719654 + }, + "selected": false, + "data": { + "label": "Dropbox", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 100, + "height": 49, + "style": { + "width": 100, + "height": 49 + }, + "positionAbsolute": { + "x": 421.96066721085106, + "y": 3971.506569719654 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "4Man3Bd-ySLFlAdxbLOHw", + "type": "subtopic", + "position": { + "x": 350.5776686216394, + "y": 4023.506569719654 + }, + "selected": false, + "data": { + "label": "Box", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 74, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": 350.5776686216394, + "y": 4023.506569719654 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "MWqnhDKm9jXvDDjkeVNxm", + "type": "subtopic", + "position": { + "x": 427.5776686216394, + "y": 4023.506569719654 + }, + "selected": false, + "data": { + "label": "OneDrive", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 175, + "height": 49, + "style": { + "width": 175, + "height": 49 + }, + "positionAbsolute": { + "x": 427.5776686216394, + "y": 4023.506569719654 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "fTZ4PqH-AMhYA_65w4wFO", + "type": "subtopic", + "position": { + "x": 350.985430623081, + "y": 4077.5065697196533 + }, + "selected": false, + "data": { + "label": "Google Drive", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 253, + "height": 49, + "style": { + "width": 253, + "height": 49 + }, + "positionAbsolute": { + "x": 350.985430623081, + "y": 4077.5065697196533 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "Wqy6ki13hP5c0VhGYEhHj", + "type": "subtopic", + "position": { + "x": 524.960667210851, + "y": 3971.506569719654 + }, + "selected": false, + "data": { + "label": "iCloud", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 80, + "height": 49, + "style": { + "width": 80, + "height": 49 + }, + "positionAbsolute": { + "x": 524.960667210851, + "y": 3971.506569719654 + }, + "dragging": false, + "resizing": false, + "selectable": true, + "focusable": true + }, + { + "id": "28r-hIOdH85SCDWl4y4LF", + "type": "label", + "position": { + "x": 370.0852097885363, + "y": 3935.506569719654 + }, + "selected": false, + "data": { + "label": "Common Cloud Storage", + "href": "", + "color": "#000000", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 199, + "height": 36, + "style": {}, + "positionAbsolute": { + "x": 370.0852097885363, + "y": 3935.506569719654 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "_RnuQ7952N8GWZfPD60sJ", + "type": "topic", + "position": { + "x": -372.36545692599566, + "y": 4027.724035563796 + }, + "selected": false, + "data": { + "label": "Programming Skills (Optional but Recommended)", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 424, + "height": 49, + "style": {}, + "positionAbsolute": { + "x": -372.36545692599566, + "y": 4027.724035563796 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "XiHvGy--OkPFfJeKA6-LP", + "type": "subtopic", + "position": { + "x": 164.32253339825286, + "y": 3925.724035563796 + }, + "selected": false, + "data": { + "label": "Python", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 134, + "height": 49, + "style": { + "width": 134 + }, + "positionAbsolute": { + "x": 164.32253339825286, + "y": 3925.724035563796 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "jehVvdz8BnruKjqHMKu5v", + "type": "subtopic", + "position": { + "x": 164.32253339825286, + "y": 3978.724035563796 + }, + "selected": false, + "data": { + "label": "Go", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 134, + "height": 49, + "style": { + "width": 134 + }, + "positionAbsolute": { + "x": 164.32253339825286, + "y": 3978.724035563796 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "2SThr6mHpX6rpW-gmsqxG", + "type": "subtopic", + "position": { + "x": 164.32253339825286, + "y": 4031.724035563796 + }, + "selected": false, + "data": { + "label": "JavaScript", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 134, + "height": 49, + "style": { + "width": 134 + }, + "positionAbsolute": { + "x": 164.32253339825286, + "y": 4031.724035563796 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "8jj9hpe9jQIgCc8Txyw3O", + "type": "subtopic", + "position": { + "x": 164.32253339825286, + "y": 4084.724035563796 + }, + "selected": false, + "data": { + "label": "C++", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 134, + "height": 49, + "style": { + "width": 134 + }, + "positionAbsolute": { + "x": 164.32253339825286, + "y": 4084.724035563796 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "tao0Bb_JR0Ubl62HO8plp", + "type": "subtopic", + "position": { + "x": 164.32253339825286, + "y": 4137.724035563796 + }, + "selected": false, + "data": { + "label": "Bash", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 134, + "height": 49, + "style": { + "width": 134 + }, + "positionAbsolute": { + "x": 164.32253339825286, + "y": 4137.724035563796 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "paY9x2VJA98FNGBFGRXp2", + "type": "subtopic", + "position": { + "x": 164.32253339825286, + "y": 4190.724035563796 + }, + "selected": false, + "data": { + "label": "Power Shell", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "center" + } + }, + "zIndex": 999, + "width": 134, + "height": 49, + "style": { + "width": 134 + }, + "positionAbsolute": { + "x": 164.32253339825286, + "y": 4190.724035563796 + }, + "dragging": false, + "selectable": true, + "focusable": true + }, + { + "id": "auuG7WaYMfJAiJC6kvcbW", + "type": "paragraph", + "position": { + "x": -269.4653099623346, + "y": 4190.724035563796 + }, + "selected": false, + "data": { + "label": "Keep Learning", + "style": { + "fontSize": 24, + "borderColor": "transparent", + "backgroundColor": "transparent", + "color": "#000000", + "textAlign": "center", + "justifyContent": "flex-start", + "padding": 16 + } + }, + "zIndex": 999, + "width": 217, + "height": 73, + "style": { + "width": 217, + "height": 73 + }, + "dragging": false, + "resizing": false, + "positionAbsolute": { + "x": -269.4653099623346, + "y": 4190.724035563796 + }, + "selectable": true, + "focusable": true + }, + { + "id": "yHmHXymPNWwu8p1vvqD3o", + "type": "paragraph", + "position": { + "x": 311.38980391536484, + "y": -126.65002385737628 + }, + "selected": false, + "data": { + "label": "Find the detailed version of this roadmap along with other similar roadmaps", + "style": { + "fontSize": 17, + "justifyContent": "flex-start", + "textAlign": "left", + "borderColor": "#000000", + "backgroundColor": "#FFFFFf" + } + }, + "zIndex": 999, + "width": 353, + "height": 142, + "positionAbsolute": { + "x": 311.38980391536484, + "y": -126.65002385737628 + }, + "dragging": false, + "selectable": true, + "focusable": true, + "style": { + "width": 353, + "height": 142 + }, + "resizing": false + }, + { + "id": "2zqZkyVgigifcRS1H7F_b", + "type": "button", + "position": { + "x": 323.593178328165, + "y": -44.66446043963099 + }, + "selected": false, + "data": { + "label": "roadmap.sh", + "href": "https://roadmap.sh", + "color": "#ffffff", + "backgroundColor": "#4136D6", + "style": { + "fontSize": 17 + } + }, + "zIndex": 999, + "width": 329, + "height": 49, + "dragging": false, + "style": { + "width": 329, + "height": 49 + }, + "resizing": false, + "positionAbsolute": { + "x": 323.593178328165, + "y": -44.66446043963099 + }, + "selectable": true, + "focusable": true + } + ], + "edges": [ + { + "style": { + "strokeDasharray": "0", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "iogwMmOvub2ZF4zgg6WyF", + "sourceHandle": "x2", + "target": "oimYzZYFXKjgvc7D4c-2u", + "targetHandle": "w1", + "data": { + "edgeStyle": "solid" + }, + "selected": false, + "focusable": true, + "selectable": true, + "id": "reactflow__edge-iogwMmOvub2ZF4zgg6WyFx2-_hYN0gEi9BL24nptEtXWUw1" + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "F1QVCEmGkgvz-_H5lTxY2", + "sourceHandle": "z2", + "target": "hwAUFLYpc_ftCfXq95dey", + "targetHandle": "y1", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-F1QVCEmGkgvz-_H5lTxY2z2-hwAUFLYpc_ftCfXq95deyy1", + "selected": false, + "focusable": true, + "selectable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "F1QVCEmGkgvz-_H5lTxY2", + "sourceHandle": "z2", + "target": "fUBNKHNPXbemRYrnzH3VT", + "targetHandle": "y2", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-F1QVCEmGkgvz-_H5lTxY2z2-fUBNKHNPXbemRYrnzH3VTy2", + "selected": false, + "focusable": true, + "selectable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_7RjH4Goi0x6Noy6za0rP", + "sourceHandle": "z2", + "target": "-5haJATqlmj0SFSFAqN6A", + "targetHandle": "y2", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-_7RjH4Goi0x6Noy6za0rPz2--5haJATqlmj0SFSFAqN6Ay2", + "selected": false, + "focusable": true, + "selectable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_7RjH4Goi0x6Noy6za0rP", + "sourceHandle": "z2", + "target": "E7yfALgu9E2auOYDOTmex", + "targetHandle": "y1", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-_7RjH4Goi0x6Noy6za0rPz2-E7yfALgu9E2auOYDOTmexy1", + "selected": false, + "focusable": true, + "selectable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_7RjH4Goi0x6Noy6za0rP", + "sourceHandle": "z2", + "target": "IOK_FluAv34j3Tj_NvwdO", + "targetHandle": "y1", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-_7RjH4Goi0x6Noy6za0rPz2-IOK_FluAv34j3Tj_NvwdOy1", + "selected": false, + "focusable": true, + "selectable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "M2J4wsTcEo3IcULZDRNyM", + "sourceHandle": "z2", + "target": "gSLr-Lc119eX9Ig-kDzJ2", + "targetHandle": "y1", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-M2J4wsTcEo3IcULZDRNyMz2-_hYN0gEi9BL24nptEtXWUy1", + "selected": false, + "selectable": true, + "focusable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_hYN0gEi9BL24nptEtXWU", + "sourceHandle": "x2", + "target": "7tDxTcKJNAUxbHLPCnPFO", + "targetHandle": "w1", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-_hYN0gEi9BL24nptEtXWUx2-7tDxTcKJNAUxbHLPCnPFOw1", + "selected": false, + "selectable": true, + "focusable": true + }, + { + "style": { + "strokeDasharray": "0", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "vVaBQ5VtsE_ZeXbCOF8ux", + "sourceHandle": "y2", + "target": "_RnuQ7952N8GWZfPD60sJ", + "targetHandle": "y1", + "data": { + "edgeStyle": "solid" + }, + "selected": false, + "type": "step", + "id": "reactflow__edge-vVaBQ5VtsE_ZeXbCOF8uxy2-_RnuQ7952N8GWZfPD60sJy1", + "selectable": true, + "focusable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "vVaBQ5VtsE_ZeXbCOF8ux", + "sourceHandle": "x2", + "target": "FNyo1X9BP0v8GnBhPYXDR", + "targetHandle": "w1", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-vVaBQ5VtsE_ZeXbCOF8uxx2-FNyo1X9BP0v8GnBhPYXDRw1", + "selected": false, + "selectable": true, + "focusable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_RnuQ7952N8GWZfPD60sJ", + "sourceHandle": "z2", + "target": "XiHvGy--OkPFfJeKA6-LP", + "targetHandle": "y1", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-_RnuQ7952N8GWZfPD60sJz2-XiHvGy--OkPFfJeKA6-LPy1", + "selected": false, + "selectable": true, + "focusable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_RnuQ7952N8GWZfPD60sJ", + "sourceHandle": "z2", + "target": "jehVvdz8BnruKjqHMKu5v", + "targetHandle": "y1", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-_RnuQ7952N8GWZfPD60sJz2-jehVvdz8BnruKjqHMKu5vy1", + "selected": false, + "selectable": true, + "focusable": true + }, + { + "style": { + "strokeDasharray": "0", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_RnuQ7952N8GWZfPD60sJ", + "sourceHandle": "z2", + "target": "_RnuQ7952N8GWZfPD60sJ", + "targetHandle": "z1", + "data": { + "edgeStyle": "solid" + }, + "id": "reactflow__edge-_RnuQ7952N8GWZfPD60sJz2-_RnuQ7952N8GWZfPD60sJz1", + "selected": false, + "selectable": true, + "focusable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_RnuQ7952N8GWZfPD60sJ", + "sourceHandle": "z2", + "target": "2SThr6mHpX6rpW-gmsqxG", + "targetHandle": "y1", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-_RnuQ7952N8GWZfPD60sJz2-2SThr6mHpX6rpW-gmsqxGy1", + "selected": false, + "selectable": true, + "focusable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_RnuQ7952N8GWZfPD60sJ", + "sourceHandle": "z2", + "target": "8jj9hpe9jQIgCc8Txyw3O", + "targetHandle": "y1", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-_RnuQ7952N8GWZfPD60sJz2-8jj9hpe9jQIgCc8Txyw3Oy1", + "selected": false, + "selectable": true, + "focusable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_RnuQ7952N8GWZfPD60sJ", + "sourceHandle": "z2", + "target": "tao0Bb_JR0Ubl62HO8plp", + "targetHandle": "y2", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-_RnuQ7952N8GWZfPD60sJz2-tao0Bb_JR0Ubl62HO8plpy2", + "selected": false, + "selectable": true, + "focusable": true + }, + { + "style": { + "strokeDasharray": "0.8 8", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_RnuQ7952N8GWZfPD60sJ", + "sourceHandle": "z2", + "target": "paY9x2VJA98FNGBFGRXp2", + "targetHandle": "y1", + "data": { + "edgeStyle": "dashed" + }, + "id": "reactflow__edge-_RnuQ7952N8GWZfPD60sJz2-paY9x2VJA98FNGBFGRXp2y1", + "selected": false, + "selectable": true, + "focusable": true + }, + { + "style": { + "strokeDasharray": "0", + "strokeLinecap": "round", + "strokeWidth": 3.5, + "stroke": "#2b78e4" + }, + "source": "_RnuQ7952N8GWZfPD60sJ", + "sourceHandle": "x2", + "target": "auuG7WaYMfJAiJC6kvcbW", + "targetHandle": "w1", + "data": { + "edgeStyle": "solid" + }, + "id": "reactflow__edge-_RnuQ7952N8GWZfPD60sJx2-auuG7WaYMfJAiJC6kvcbWw1", + "selected": false, + "selectable": true, + "focusable": true + } + ] } \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/cyber-security.md b/src/data/roadmaps/cyber-security/cyber-security.md index f0543a3d2..01edd02a6 100644 --- a/src/data/roadmaps/cyber-security/cyber-security.md +++ b/src/data/roadmaps/cyber-security/cyber-security.md @@ -2,6 +2,7 @@ jsonUrl: '/jsons/roadmaps/cyber-security.json' pdfUrl: '/pdfs/roadmaps/cyber-security.pdf' order: 11 +renderer: 'editor' briefTitle: 'Cyber Security' briefDescription: 'Step by step guide to becoming a Cyber Security Expert in 2024' title: 'Cyber Security Expert' @@ -10,7 +11,7 @@ isNew: false hasTopics: true dimensions: width: 968 - height: 3316.15 + height: 4000 schema: headline: 'Cyber Security Roadmap: Learn to become a Cyber Security Expert' description: 'Learn how to become a Cyber Security expert with this interactive step by step guide in 2024. We also have resources and short descriptions attached to the roadmap items so you can get everything you want to learn in one place.' diff --git a/src/data/roadmaps/cyber-security/migration-mapping.json b/src/data/roadmaps/cyber-security/migration-mapping.json new file mode 100644 index 000000000..9a286b036 --- /dev/null +++ b/src/data/roadmaps/cyber-security/migration-mapping.json @@ -0,0 +1,292 @@ +{ + "basic-it-skills": "oimYzZYFXKjgvc7D4c-2u", + "basic-it-skills:computer-hardware-components": "Ih0YZt8u9vDwYo8y1t41n", + "basic-it-skills:connection-types": "F1QVCEmGkgvz-_H5lTxY2", + "basic-it-skills:os-independent-troubleshooting": "pJUhQin--BGMuXHPwx3JJ", + "basic-it-skills:popular-suites": "_7RjH4Goi0x6Noy6za0rP", + "basic-it-skills:basics-of-computer-networking": "T0aU8ZQGShmF9uXhWY4sD", + "basic-it-skills:connection-types:wifi": "fUBNKHNPXbemRYrnzH3VT", + "basic-it-skills:connection-types:nfc": "hwAUFLYpc_ftCfXq95dey", + "basic-it-skills:connection-types:bluetooth": "DbWf5LdqiByPiJa4xHtl_", + "basic-it-skills:connection-types:infrared": "KsZ63c3KQLLn373c5CZnp", + "basic-it-skills:popular-suites:icloud": "E7yfALgu9E2auOYDOTmex", + "basic-it-skills:popular-suites:google-suite": "IOK_FluAv34j3Tj_NvwdO", + "basic-it-skills:popular-suites:ms-office-suite": "-5haJATqlmj0SFSFAqN6A", + "extras:ctfs:hack-the-box": "wkuE_cChPZT2MHyGjUuU4", + "extras:ctfs:try-hack-me": "kht-L7_v-DbglMYUHuchp", + "extras:ctfs:vuln-hub": "W94wY_otBuvVW_-EFlKA6", + "extras:ctfs:pico-ctf": "pou5xHwnz9Zsy5J6lNlKq", + "extras:ctfs:sans-holiday-hack-challenge": "WCeJrvWl837m1BIjuA1Mu", + "extras:certifications:beginner-certifications:comptia-aplus": "lbAgU5lR1O7L_5mCbNz_D", + "extras:certifications:beginner-certifications:comptia-linuxplus": "p34Qwlj2sjwEPR2ay1WOK", + "extras:certifications:beginner-certifications:comptia-networkplus": "4RGbNOfMPDbBcvUFWTTCV", + "extras:certifications:beginner-certifications:ccna": "4RD22UZATfL8dc71YkJwQ", + "extras:certifications:beginner-certifications:comptia-securityplus": "AxeDcKK3cUtEojtHQPBw7", + "extras:certifications:advanced-certifications:cissp": "BqvijNoRzSGYLCMP-6hhr", + "extras:certifications:advanced-certifications:cisa": "lqFp4VLY_S-5tAbhNQTew", + "extras:certifications:advanced-certifications:cism": "s86x24SHPEbbOB9lYNU-w", + "extras:certifications:advanced-certifications:gsec": "nlmATCTgHoIoMcEOW8bUW", + "extras:certifications:advanced-certifications:gpen": "t4h9rEKWz5Us0qJKXhxlX", + "extras:certifications:advanced-certifications:gwapt": "rwniCTWfYpKP5gi02Pa9f", + "extras:certifications:advanced-certifications:giac": "ZiUT-lyIBfHTzG-dwSy96", + "extras:certifications:advanced-certifications:oscp": "SwVGVP2bbCFs2uNg9Qtxb", + "extras:certifications:advanced-certifications:crest": "rA1skdztev3-8VmAtIlmr", + "extras:certifications:advanced-certifications:ceh": "AAo7DXB7hyBzO6p05gx1i", + "operating-systems": "UY6xdt_V3YMkZxZ1hZLvW", + "operating-systems:windows": "BNUKEQ4YpZmIhSPQdkHgU", + "operating-systems:linux": "4frVcjYI1VlVU9hQgpwcT", + "operating-systems:macos": "dztwr-DSckggQbcNIi4_2", + "operating-systems:learn-for-each:install-and-configure": "02aaEP9E5tlefeGBxf_Rj", + "operating-systems:learn-for-each:versions-and-differences": "yXOGqlufAZ69uiBzKFfh6", + "operating-systems:learn-for-each:navigating-using-gui-and-cli": "MGitS_eJBoY99zOR-W3F4", + "operating-systems:learn-for-each:understand-permissions": "bTfL7cPOmBBFl-eHxUJI6", + "operating-systems:learn-for-each:installing-apps": "Ot3LGpM-CT_nKsNqIKIye", + "operating-systems:learn-for-each:performing-crud-on-files": "zRXyoJMap9irOYo3AdHE8", + "operating-systems:learn-for-each:troubleshooting": "xeRWOX1fWQDLNLWMAFTEe", + "operating-systems:learn-for-each:common-commands": "WDrSO7wBNn-2jB8mcyT7j", + "networking-knowledge:basics-of-subnetting": "E8Z7qFFW-I9ivr0HzoXCq", + "networking-knowledge:ip-terminology:public-vs-private-ip-addresses": "2nQfhnvBjJg1uDZ28aE4v", + "networking-knowledge:ip-terminology:localhost": "0TWwox-4pSwuXojI8ixFO", + "networking-knowledge:ip-terminology:loopback": "W_oloLu2Euz5zRSy7v_T8", + "networking-knowledge:ip-terminology:cidr": "PPIH1oHW4_ZDyD3U3shDg", + "networking-knowledge:ip-terminology:subnet-mask": "f-v8qtweWXFY_Ryo3oYUF", + "networking-knowledge:ip-terminology:default-gateway": "5rKaFtjYx0n2iF8uTLs8X", + "networking-knowledge:understand-the-terminology:vlan": "d5Cv3EXf6OXW19yPJ4x6e", + "networking-knowledge:understand-the-terminology:dmz": "gfpvDQz61I3zTB7tGu7vp", + "networking-knowledge:understand-the-terminology:arp": "M52V7hmG4ORf4TIVw3W3J", + "networking-knowledge:understand-the-terminology:vm": "ZTC5bLWEIQcdmowc7sk_E", + "networking-knowledge:understand-the-terminology:nat": "Kkd3f_0OYNCdpDgrJ-_Ju", + "networking-knowledge:understand-the-terminology:ip": "FdoqB2---uDAyz6xZjk_u", + "networking-knowledge:understand-the-terminology:dns": "ORIdKG8H97VkBUYpiDtXf", + "networking-knowledge:understand-the-terminology:dhcp": "T4312p70FqRBkzVfWKMaR", + "networking-knowledge:understand-the-terminology:router": "lwSFIbIX-xOZ0QK2sGFb1", + "networking-knowledge:understand-the-terminology:switch": "r9byGV8XuBPzoqj5ZPf2W", + "networking-knowledge:understand-the-terminology:vpn": "gTozEpxJeG1NTkVBHH-05", + "networking-knowledge:understand-these:man": "LrwTMH_1fTd8iB9wJg-0t", + "networking-knowledge:understand-these:lan": "xWxusBtMEWnd-6n7oqjHz", + "networking-knowledge:ip-terminology:wan": "vCkTJMkDXcQmwsmeNUAX5", + "networking-knowledge:understand-these:wlan": "QCVYF1rmPsMVtklBNDNaB", + "networking-knowledge:functions-of-each:dhcp": "R5HEeh6jwpQDo27rz1KSH", + "networking-knowledge:functions-of-each:dns": "r1IKvhpwg2umazLGlQZL1", + "networking-knowledge:functions-of-each:ntp": "tf0TymdPHbplDHvuVIIh4", + "networking-knowledge:functions-of-each:ipam": "hN8p5YBcSaPm-byQUIz8L", + "networking-knowledge:network-topologies:star-topology": "P0ZhAXd_H-mTOMr13Ag31", + "networking-knowledge:network-topologies:ring-topology": "9vEUVJ8NTh0wKyIE6-diY", + "networking-knowledge:network-topologies:mesh-topology": "PYeF15e7iVB9seFrrO7W6", + "networking-knowledge:network-topologies:bus-topology": "0DWh4WmLK_ENDuqQmQcu4", + "networking-knowledge:common-protocols:ssh": "8Mog890Lj-gVBpWa05EzT", + "networking-knowledge:common-protocols:rdp": "Ia6M1FKPNpqLDiWx7CwDh", + "networking-knowledge:common-protocols:ftp": "ftYYMxRpVer-jgSswHLNa", + "networking-knowledge:common-protocols:sftp": "YEy6o-clTBKZp1yOkLwNb", + "networking-knowledge:common-protocols:http-https": "3Awm221OJHxXNLiL9yxfd", + "networking-knowledge:common-protocols:ssl-tls": "LKK1A5-xawA7yCIAWHS8P", + "networking-knowledge": "gSLr-Lc119eX9Ig-kDzJ2", + "networking-knowledge:common-protocols": "ViF-mpR17MB3_KJ1rV8mS", + "networking-knowledge:osi-model": "OXUd1UPPsBhNoUGLKZJGV", + "networking-knowledge:common-ports": "0tx2QYDYXhm85iYrCWd9U", + "networking-knowledge:ssl-and-tls-basics": "dJ0NUsODFhk52W2zZxoPh", + "networking-knowledge:basics-of-nas-and-san": "umbMBQ0yYmB5PgWfY6zfO", + "networking-knowledge:virtualization-technologies:vmware": "AjywuCZdBi9atGUbetlUL", + "networking-knowledge:virtualization-technologies:virtualbox": "vGVFhZXYOZOy4qFpLLbxp", + "networking-knowledge:virtualization-technologies:esxi": "BisNooct1vJDKaBKsGR7_", + "networking-knowledge:virtualization-technologies:proxmox": "jqX1A5hFF3Qznqup4lfiF", + "networking-knowledge:virutalization-basics:hypervisor": "CIoLaRv5I3sCr9tBnZHEi", + "networking-knowledge:virutalization-basics:vm": "251sxqoHggQ4sZ676iX5w", + "networking-knowledge:virutalization-basics:guest-os": "LocGETHz6ANYinNd5ZLsS", + "networking-knowledge:virutalization-basics:host-os": "p7w3C94xjLwSMm5qA8XlL", + "networking-knowledge:troubleshooting-tools:nslookup": "tk4iG5i1Ml9w9KRO1tGJU", + "networking-knowledge:troubleshooting-tools:iptables": "jr8JlyqmN3p7Ol3_kD9AH", + "networking-knowledge:troubleshooting-tools:packet-sniffers": "k6UX0BJho5arjGD2RWPgH", + "networking-knowledge:troubleshooting-tools:ipconfig": "u-6xuZUyOrogh1bU4cwER", + "networking-knowledge:troubleshooting-tools:netstat": "2M3PRbGzo14agbEPe32ww", + "networking-knowledge:troubleshooting-tools:port-scanners": "iJRQHzh5HXADuWpCouwxv", + "networking-knowledge:troubleshooting-tools:ping": "GuuY-Q6FZzfspB3wrH64r", + "networking-knowledge:troubleshooting-tools:dig": "D2YYv1iTRGken75sHO0Gt", + "networking-knowledge:troubleshooting-tools:arp": "hkO3Ga6KctKODr4gos6qX", + "networking-knowledge:troubleshooting-tools:protocol-analyzers": "K05mEAsjImyPge0hDtsU0", + "networking-knowledge:troubleshooting-tools:nmap": "xqwIEyGfdZFxk6QqbPswe", + "networking-knowledge:troubleshooting-tools:route": "xFuWk7M-Vctk_xb7bHbWs", + "networking-knowledge:troubleshooting-tools:tcpdump": "y8GaUNpaCT1Ai88wPOk6d", + "networking-knowledge:troubleshooting-tools:tracert": "cSz9Qx3PGwmhq3SSKYKfg", + "networking-knowledge:auth-methodologies:kerberos": "lG6afUOx3jSQFxbH92otL", + "networking-knowledge:auth-methodologies:ldap": "lV3swvD6QGLmD9iVfbKIF", + "networking-knowledge:auth-methodologies:sso": "xL32OqDKm6O043TYgVV1r", + "networking-knowledge:auth-methodologies:certificates": "WXRaVCYwuGQsjJ5wyvbea", + "networking-knowledge:auth-methodologies:local-auth": "vYvFuz7lAJXZ1vK_4999a", + "networking-knowledge:auth-methodologies:radius": "tH3RLnJseqOzRIbZMklHD", + "security-skills-and-knowledge": "_hYN0gEi9BL24nptEtXWU", + "security-skills-and-knowledge:common-hacking-tools": "rzY_QsvnC1shDTPQ-til0", + "security-skills-and-knowledge:common-exploit-frameworks": "Lg7mz4zeCToEzZBFxYuaU", + "security-skills-and-knowledge:defense-in-depth": "Rae-f9DHDZuwIwW6eRtKF", + "security-skills-and-knowledge:runbooks": "Ec6EairjFJLCHc7b-1xxe", + "security-skills-and-knowledge:forensics": "7KLGFfco-hw7a62kXtS3d", + "security-skills-and-knowledge:threat-hunting": "_x3BgX93N-Pt1_JK7wk0p", + "security-skills-and-knowledge:vulnerability-management": "lcxAXtO6LoGd85nOFnLo8", + "security-skills-and-knowledge:basics-of-reverse-engineering": "uoGA4T_-c-2ip_zfEUcJJ", + "security-skills-and-knowledge:penetration-rules-of-engagement": "NkAAQikwH-A6vrF8fWpuB", + "security-skills-and-knowledge:perimiter-dmz-segmentation": "PUgPgpKio4Npzs86qEXa7", + "security-skills-and-knowledge:zero-trust": "HavEL0u65ZxHt92TfbLzk", + "security-skills-and-knowledge:compliance-and-auditors": "kqT0FRLt9Ak9P8PhHldO-", + "security-skills-and-knowledge:definition-of-risk": "ggAja18sBUUdCfVsT0vCv", + "security-skills-and-knowledge:backups-and-resiliency": "9asy3STW4oTYYHcUazaRj", + "security-skills-and-knowledge:cyber-kill-chain": "H38Vb7xvuBJXVzgPBdRdT", + "security-skills-and-knowledge:mfa-2fa": "pnfVrOjDeG1uYAeqHxhJP", + "security-skills-and-knowledge:honeypots": "bj5YX8zhlam0yoNckL8e4", + "security-skills-and-knowledge:os-hardening": "_S25EOGS3P8647zLM5i-g", + "security-skills-and-knowledge:concept-of-isolation": "aDF7ZcOX9uR8l0W4aqhYn", + "security-skills-and-knowledge:basics-of-ids-ips": "FJsEBOFexbDyAj86XWBCc", + "security-skills-and-knowledge:authentication-vs-authorization": "WG7DdsxESm31VcLFfkVTz", + "security-skills-and-knowledge:blue-team-read-team-purple-team": "7tDxTcKJNAUxbHLPCnPFO", + "security-skills-and-knowledge:false-true-negative-positive": "XwRCZf-yHJsXVjaRfb3R4", + "security-skills-and-knowledge:threat-intel-osint": "wN5x5pY53B8d0yopa1z8F", + "security-skills-and-knowledge:handshakes": "zQx_VUS1zRmF4zCGjJD5-", + "security-skills-and-knowledge:cia-triad": "uz6ELaLEu9U4fHVfnQiOa", + "security-skills-and-knowledge:privilege-escalation-attacks": "cvI8-sxY5i8lpelW9iY_5", + "security-skills-and-knowledge:owasp-top-10": "fyOYVqiBqyKC4aqc6-y0q", + "security-skills-and-knowledge:malware-and-types": "v7CD_sHqLWbm9ibXXESIK", + "security-skills-and-knowledge:incident-response-and-discovery-tools:nmap": "Hoou7kWyfB2wx_yFHug_H", + "security-skills-and-knowledge:incident-response-and-discovery-tools:nslookup": "OUarb1oS1-PX_3OXNR0rV", + "security-skills-and-knowledge:incident-response-and-discovery-tools:dig": "XyaWZZ45axJMKXoWwsyFj", + "security-skills-and-knowledge:incident-response-and-discovery-tools:curl": "W7iQUCjODGYgE4PjC5TZI", + "security-skills-and-knowledge:incident-response-and-discovery-tools:ipconfig": "IXNGFF4sOFbQ_aND-ELK0", + "security-skills-and-knowledge:incident-response-and-discovery-tools:hping": "Cclbt4bNfkHwFwZOvJuLK", + "security-skills-and-knowledge:incident-response-and-discovery-tools:ping": "yfTpp-ePuDB931FnvNB-Y", + "security-skills-and-knowledge:incident-response-and-discovery-tools:arp": "fzdZF-nzIL69kaA7kwOCn", + "security-skills-and-knowledge:incident-response-and-discovery-tools:cat": "D2ptX6ja_HvFEafMIzWOy", + "security-skills-and-knowledge:incident-response-and-discovery-tools:dd": "9xbU_hrEOUtMm-Q09Fe6t", + "security-skills-and-knowledge:incident-response-and-discovery-tools:head": "VNmrb5Dm4UKUgL8JBfhnE", + "security-skills-and-knowledge:incident-response-and-discovery-tools:tail": "762Wf_Eh-3zq69CZZiIjR", + "security-skills-and-knowledge:incident-response-and-discovery-tools:grep": "Dfz-6aug0juUpMmOJLCJ9", + "security-skills-and-knowledge:incident-response-and-discovery-tools:tracert": "jJtS0mgCYc0wbjuXssDRO", + "security-skills-and-knowledge:incident-response-and-discovery-tools:wireshark": "Sm9bxKUElINHND8FdZ5f2", + "security-skills-and-knowledge:incident-response-and-discovery-tools:winhex": "gNan93Mg9Ym2AF3Q2gqoi", + "security-skills-and-knowledge:incident-response-and-discovery-tools:memdump": "wspNQPmqWRjKoFm6x_bVw", + "security-skills-and-knowledge:incident-response-and-discovery-tools:ftk-imager": "_jJhL1RtaqHJmlcWrd-Ak", + "security-skills-and-knowledge:incident-response-and-discovery-tools:autopsy": "bIwpjIoxSUZloxDuQNpMu", + "security-skills-and-knowledge:uderstand-frameworks:attck": "auR7fNyd77W2UA-PjXeJS", + "security-skills-and-knowledge:uderstand-frameworks:kill-chain": "7Bmp4x6gbvWMuVDdGRUGj", + "security-skills-and-knowledge:uderstand-frameworks:diamond-model": "AY-hoPGnAZSd1ExaYX8LR", + "security-skills-and-knowledge:common-standards:iso": "oRssaVG-K-JwlL6TAHhXw", + "security-skills-and-knowledge:common-standards:nist": "SOkJUTd1NUKSwYMIprv4m", + "security-skills-and-knowledge:common-standards:rmf": "fjEdufrZAfW4Rl6yDU8Hk", + "security-skills-and-knowledge:common-standards:cis": "sSihnptkoEqUsHjDpckhG", + "security-skills-and-knowledge:common-standards:csf": "HjfgaSEZjW9BOXy_Ixzkk", + "security-skills-and-knowledge:tools-for-unintended-purposes:lolbas": "10qbxX8DCrfyH7tgYexxQ", + "security-skills-and-knowledge:understand:siem": "c2kY3wZVFKZYxMARhLIwO", + "security-skills-and-knowledge:understand:soar": "i0ulrA-GJrNhIVmzdWDrn", + "security-skills-and-knowledge:common-distros-for-hacking:parrot-os": "zR6djXnfTSFVEfvJonQjf", + "security-skills-and-knowledge:common-distros-for-hacking:kali-linux": "w6wXkoLrv0_d-Ah0txUHd", + "security-skills-and-knowledge:find-and-use-logs:event-logs": "KbFwL--xF-eYjGy8PZdrM", + "security-skills-and-knowledge:find-and-use-logs:syslogs": "7oFwRkmoZom8exMDtMslX", + "security-skills-and-knowledge:find-and-use-logs:netflow": "xXz-SwvXA2cLfdCd-hLtW", + "security-skills-and-knowledge:find-and-use-logs:packet-captures": "TIxEkfBrN6EXQ3IKP1B7u", + "security-skills-and-knowledge:find-and-use-logs:firewall-logs": "np0PwKy-EvIa_f_LC6Eem", + "security-skills-and-knowledge:hardening-concepts:mac-based": "OAukNfV5T0KTnIF9jKYRF", + "security-skills-and-knowledge:hardening-concepts:nac-based": "6oAzYfwsHQYNVbi7c2Tly", + "security-skills-and-knowledge:hardening-concepts:port-blocking": "W7bcydXdwlubXF2PHKOuq", + "security-skills-and-knowledge:hardening-concepts:group-policy": "FxuMJmDoDkIsPFp2iocFg", + "security-skills-and-knowledge:hardening-concepts:acls": "8JM95sonFUhZCdaynUA_M", + "security-skills-and-knowledge:hardening-concepts:sinkholes": "oFgyQYL3Ws-l7B5AF-bTR", + "security-skills-and-knowledge:hardening-concepts:patching": "e-MDyUR3GEv-e4Qsx_5vV", + "security-skills-and-knowledge:hardening-concepts:jump-server": "UF3BV1sEEOrqh5ilnfM1B", + "security-skills-and-knowledge:hardening-concepts:endpoint-security": "LEgJtu1GZKOtoAXyOGWLE", + "security-skills-and-knowledge:cryptography:salting": "jqWhR6oTyX6yolUBv71VC", + "security-skills-and-knowledge:cryptography:hashing": "0UZmAECMnfioi-VeXcvg8", + "security-skills-and-knowledge:cryptography:key-exchange": "rmR6HJqEhHDgX55Xy5BAW", + "security-skills-and-knowledge:cryptography:private-vs-public-key": "7svh9qaaPp0Hz23yinIye", + "security-skills-and-knowledge:cryptography:pki": "fxyJxrf3mnFTa3wXk1MCW", + "security-skills-and-knowledge:cryptography:obfuscation": "kxlg6rpfqqoBfmMMg3EkJ", + "security-skills-and-knowledge:secure-vs-unsecure-protocols:ftp-vs-sftp": "9Z6HPHPj4escSVDWftFEx", + "security-skills-and-knowledge:secure-vs-unsecure-protocols:ssl-vs-tls": "6ILPXeUDDmmYRiA_gNTSr", + "security-skills-and-knowledge:secure-vs-unsecure-protocols:ipsec": "gNFVtBxSYP5Uw3o3tlJ0M", + "security-skills-and-knowledge:secure-vs-unsecure-protocols:dnssec": "LLGXONul7JfZGUahnK0AZ", + "security-skills-and-knowledge:secure-vs-unsecure-protocols:ldaps": "z_fDvTgKw51Uepo6eMQd9", + "security-skills-and-knowledge:secure-vs-unsecure-protocols:srtp": "_9lQSG6fn69Yd9rs1pQdL", + "security-skills-and-knowledge:secure-vs-unsecure-protocols:s-mime": "9rmDvycXFcsGOq3v-_ziD", + "security-skills-and-knowledge:understand-the-following-terms:antivirus": "3140n5prZYySsuBHjqGOJ", + "security-skills-and-knowledge:understand-the-following-terms:firewall-nextgen-firewall": "tWDo5R3KU5KOjDdtv801x", + "security-skills-and-knowledge:understand-the-following-terms:antimalware": "9QtY1hMJ7NKLFztYK-mHY", + "security-skills-and-knowledge:understand-the-following-terms:edr": "QvHWrmMzO8IvNQ234E_wf", + "security-skills-and-knowledge:understand-the-following-terms:dlp": "iolsTC-63d_1wzKGul-cT", + "security-skills-and-knowledge:understand-the-following-terms:hips": "l5EnhOCnkN-RKvgrS9ylH", + "security-skills-and-knowledge:understand-the-following-terms:nids": "LIPtxl_oKZRcbvXT4EdNf", + "security-skills-and-knowledge:understand-the-following-terms:nips": "7w9qj16OD4pUzq-ItdxeK", + "security-skills-and-knowledge:understand-the-following-terms:host-based-firewall": "jWl1VWkZn3n1G2eHq6EnX", + "security-skills-and-knowledge:understand-the-following-terms:sandboxing": "SLKwuLHHpC7D1FqrpPRAe", + "security-skills-and-knowledge:understand-the-following-terms:acl": "35oCRzhzpVfitQPL4K9KC", + "security-skills-and-knowledge:understand-the-following-terms:eap-vs-peap": "1jwtExZzR9ABKvD_S9zFG", + "security-skills-and-knowledge:understand-the-following-terms:wpa-vs-wpa2-vs-wpa3-vs-wep": "MBnDE0VyVh2u2p-r90jVk", + "security-skills-and-knowledge:understand-the-following-terms:wps": "HSCGbM2-aTnJWUX6jGaDP", + "security-skills-and-knowledge:incident-response-process:preparation": "w6V4JOtXKCMPAkKIQxvMg", + "security-skills-and-knowledge:incident-response-process:identification": "XsRoldaBXUSiGbvY1TjQd", + "security-skills-and-knowledge:incident-response-process:containment": "l7WnKuR2HTD4Vf9U2TxkK", + "security-skills-and-knowledge:incident-response-process:recovery": "vFjbZAJq8OfLb3_tsc7oT", + "security-skills-and-knowledge:incident-response-process:eradication": "N17xAIo7sgbB0nrIDMWju", + "security-skills-and-knowledge:incident-response-process:lessons-learned": "ErRol7AT02HTn3umsPD_0", + "security-skills-and-knowledge:threat-classification:zero-day": "zqRaMmqcLfx400kJ-h0LO", + "security-skills-and-knowledge:threat-classification:known-vs-unknown": "HPlPGKs7NLqmBidHJkOZg", + "security-skills-and-knowledge:threat-classification:apt": "l0BvDtwWoRSEjm6O0WDPy", + "security-skills-and-knowledge:understand-common-tools:virus-total": "rxzcAzHjzIc9lkWSw0fef", + "security-skills-and-knowledge:understand-common-tools:joe-sandbox": "h__KxKa0Q74_egY7GOe-L", + "security-skills-and-knowledge:understand-common-tools:any-run": "GZHFR43UzN0WIIxGKZOdX", + "security-skills-and-knowledge:understand-common-tools:urlvoid": "lFt1k1Q-NlWWqyDA3gWD1", + "security-skills-and-knowledge:understand-common-tools:urlscan": "lMiW2q-b72KUl-2S7M6Vb", + "security-skills-and-knowledge:understand-common-tools:whois": "-RnlvUltJ9IDtH0HEnMbN", + "security-skills-and-knowledge:attack-types:phishing-vishing-whaling-smishing": "7obusm5UtHwWMcMMEB3lt", + "security-skills-and-knowledge:attack-types:spam-vs-spim": "cbEMUyg_btIPjdx-XqIM5", + "security-skills-and-knowledge:attack-types:shoulder-surfing": "FD0bkmxNpPXiUB_NevEUf", + "security-skills-and-knowledge:attack-types:dumpster-diving": "Iu0Qtk13RjrhHpSlm0uyh", + "security-skills-and-knowledge:attack-types:tailgating": "o-keJgF9hmifQ_hUD91iN", + "security-skills-and-knowledge:attack-types:zero-day": "v9njgIxZyabJZ5iND3JGc", + "security-skills-and-knowledge:attack-types:social-engineering": "O1VceThdxRlgQ6DcGyY7Y", + "security-skills-and-knowledge:attack-types:reconnaissance": "UU_inxa8Y2lLP2BRhdLDT", + "security-skills-and-knowledge:attack-types:impersonation": "ZEgxmvjWPp5NofLFz_FTJ", + "security-skills-and-knowledge:attack-types:watering-hole-attack": "dcvuKHq0nHgHLcLwtl4IJ", + "security-skills-and-knowledge:attack-types:drive-by-attack": "cO70zHvHgBAH29khF-hBW", + "security-skills-and-knowledge:attack-types:typo-squatting": "0LeDwj_tMaXjQBBOUJ5CL", + "security-skills-and-knowledge:attack-types:brute-force-vs-password-spray": "Q0i-plPQkb_NIvOQBVaDd", + "security-skills-and-knowledge:common-network-based-attacks:dos-vs-ddos": "IF5H0ZJ72XnqXti3jRWYF", + "security-skills-and-knowledge:common-network-based-attacks:mitm": "ODlVT6MhV-RVUbRMG0mHi", + "security-skills-and-knowledge:common-network-based-attacks:evil-twin": "O1fY2n40yjZtJUEeoItKr", + "security-skills-and-knowledge:common-network-based-attacks:dns-poisoning": "urtsyYWViEzbqYLoNfQAh", + "security-skills-and-knowledge:common-network-based-attacks:spoofing": "LteSouUtAj3JWWOzcjQPl", + "security-skills-and-knowledge:common-network-based-attacks:deauth-attack": "LfWJJaT3fv0p6fUeS8b84", + "security-skills-and-knowledge:common-network-based-attacks:vlan-hopping": "u4hySof6if5hiONSaW-Uf", + "security-skills-and-knowledge:common-network-based-attacks:rogue-access-point": "Ee7LfbhwJbiWjJ3b_bbni", + "security-skills-and-knowledge:other-attacks:buffer-overflow": "n8ZOZxNhlnw7DpzoXe_f_", + "security-skills-and-knowledge:other-attacks:memory-leak": "nOND14t7ISgSH3zNpV3F8", + "security-skills-and-knowledge:other-attacks:xss": "2jo1r9O_rCnDwRv1_4Wo-", + "security-skills-and-knowledge:other-attacks:sql-injection": "P-Am25WJV8cFd_KsX7cdj", + "security-skills-and-knowledge:other-attacks:csrf": "pK2iRArULlK-B3iSVo4-n", + "security-skills-and-knowledge:other-attacks:replay-attack": "mIX8PsIGuwgPCGQZ6ok2H", + "security-skills-and-knowledge:other-attacks:pass-the-hash": "sMuKqf27y4iG0GrCdF5DN", + "security-skills-and-knowledge:other-attacks:directory-traversal": "L0ROYh2DNlkybNDO2ezJY", + "cloud-skills-and-knowledge": "vVaBQ5VtsE_ZeXbCOF8ux", + "cloud-skills-and-knowledge:security-concept-in-the-cloud": "ThLsXkqLw--uddHz0spCH", + "cloud-skills-and-knowledge:cloud-vs-onpremises": "KGjYM4Onr5GQf1Yv9IabI", + "cloud-skills-and-knowledge:infra-as-code": "RJctUpvlUJGAdwBNtDSXw", + "cloud-skills-and-knowledge:concept-of-serverless": "-83ltMEl3le3yD68OFnTM", + "cloud-skills-and-knowledge:cloud-deployment-flow": "XL3FVeGFDhAl_gSol6Tjt", + "cloud-skills-and-knowledge:cloud-services:saas": "sVw5KVNxPEatBRKb2ZbS_", + "cloud-skills-and-knowledge:cloud-services:paas": "PQ_np6O-4PK2V-r5lywQg", + "cloud-skills-and-knowledge:cloud-services:iaas": "1nPifNUm-udLChIqLC_uK", + "cloud-skills-and-knowledge:common-cloud-environments:aws": "0LztOTc3NG3OujCVwlcVU", + "cloud-skills-and-knowledge:common-cloud-environments:gcp": "tOLA5QPKi6LHl1ljsOMwX", + "cloud-skills-and-knowledge:common-cloud-environments:azure": "GklBi7Qx1akN_cS9UMrha", + "cloud-skills-and-knowledge:cloud-models:private": "ecpMKP1cQXXsfKETDUrSf", + "cloud-skills-and-knowledge:cloud-models:public": "ZDj7KBuyZsKyEMZViMoXW", + "cloud-skills-and-knowledge:cloud-models:hybrid": "ywRlTuTfh5-NHnv4ZyW1t", + "cloud-skills-and-knowledge:common-cloud-storage:s3": "2jsTgT7k8MeaDtx6RJhOP", + "cloud-skills-and-knowledge:common-cloud-storage:dropbox": "9OastXVfiG1YRMm68ecnn", + "cloud-skills-and-knowledge:common-cloud-storage:box": "4Man3Bd-ySLFlAdxbLOHw", + "cloud-skills-and-knowledge:common-cloud-storage:one-drive": "MWqnhDKm9jXvDDjkeVNxm", + "cloud-skills-and-knowledge:common-cloud-storage:google-drive": "fTZ4PqH-AMhYA_65w4wFO", + "cloud-skills-and-knowledge:common-cloud-storage:icloud": "Wqy6ki13hP5c0VhGYEhHj", + "programming-knowledge": "_RnuQ7952N8GWZfPD60sJ", + "programming-knowledge:python": "XiHvGy--OkPFfJeKA6-LP", + "programming-knowledge:go": "jehVvdz8BnruKjqHMKu5v", + "programming-knowledge:javascript": "2SThr6mHpX6rpW-gmsqxG", + "programming-knowledge:cpp": "8jj9hpe9jQIgCc8Txyw3O", + "programming-knowledge:bash": "tao0Bb_JR0Ubl62HO8plp", + "programming-knowledge:power-shell": "paY9x2VJA98FNGBFGRXp2" +} \ No newline at end of file