diff --git a/src/data/roadmaps/cyber-security/content/c@8jj9hpe9jQIgCc8Txyw3O.md b/src/data/roadmaps/cyber-security/content/c@8jj9hpe9jQIgCc8Txyw3O.md index 1c390481b..080262d93 100644 --- a/src/data/roadmaps/cyber-security/content/c@8jj9hpe9jQIgCc8Txyw3O.md +++ b/src/data/roadmaps/cyber-security/content/c@8jj9hpe9jQIgCc8Txyw3O.md @@ -4,5 +4,6 @@ C++ is a widely-used, high-level programming language that evolved from the earl Learn more form the following resources: -- [@course@C++ Full Course - BroCode](https://www.youtube.com/watch?v=-TkoO8Z07hI) +- [@roadmap@Visit Dedicated C++ Roadmap](https://roadmap.sh/cpp) +- [@video@C++ Full Course - BroCode](https://www.youtube.com/watch?v=-TkoO8Z07hI) - [@article@C++ Introduction](https://www.w3schools.com/cpp/cpp_intro.asp) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/cat@D2ptX6ja_HvFEafMIzWOy.md b/src/data/roadmaps/cyber-security/content/cat@D2ptX6ja_HvFEafMIzWOy.md index 8a94f4a7b..a25b82054 100644 --- a/src/data/roadmaps/cyber-security/content/cat@D2ptX6ja_HvFEafMIzWOy.md +++ b/src/data/roadmaps/cyber-security/content/cat@D2ptX6ja_HvFEafMIzWOy.md @@ -4,5 +4,6 @@ Learn more from the following resources: +- [@article@Cat Command in Linux](https://linuxize.com/post/linux-cat-command/) - [@article@Linux cat command](https://phoenixnap.com/kb/linux-cat-command) - [@video@The cat command](https://www.youtube.com/shorts/lTOje2weu_o?app=desktop) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/ccna@4RD22UZATfL8dc71YkJwQ.md b/src/data/roadmaps/cyber-security/content/ccna@4RD22UZATfL8dc71YkJwQ.md index 25a02cbc7..7f5ce2ba1 100644 --- a/src/data/roadmaps/cyber-security/content/ccna@4RD22UZATfL8dc71YkJwQ.md +++ b/src/data/roadmaps/cyber-security/content/ccna@4RD22UZATfL8dc71YkJwQ.md @@ -4,5 +4,5 @@ The Cisco Certified Network Associate (CCNA) certification is an entry-level cer Learn more from the following resources: -- [@Network Chuck Free CCNA Course](https://www.youtube.com/playlist?list=PLIhvC56v63IJVXv0GJcl9vO5Z6znCVb1P) -- [@official@CCNA Certification Website](https://www.cisco.com/site/us/en/learn/training-certifications/certifications/enterprise/ccna/index.html) \ No newline at end of file +- [@official@CCNA Certification](https://www.cisco.com/site/us/en/learn/training-certifications/certifications/enterprise/ccna/index.html) +- [@video@Network Chuck Free CCNA Course](https://www.youtube.com/playlist?list=PLIhvC56v63IJVXv0GJcl9vO5Z6znCVb1P) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/ceh@AAo7DXB7hyBzO6p05gx1i.md b/src/data/roadmaps/cyber-security/content/ceh@AAo7DXB7hyBzO6p05gx1i.md index 3fe6950ab..46068a6a8 100644 --- a/src/data/roadmaps/cyber-security/content/ceh@AAo7DXB7hyBzO6p05gx1i.md +++ b/src/data/roadmaps/cyber-security/content/ceh@AAo7DXB7hyBzO6p05gx1i.md @@ -4,4 +4,5 @@ Learn more from the following resources: -- [@official@CEH Website](https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/) \ No newline at end of file +- [@official@CEH](https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/) +- [@article@Certified Ethical Hacker Online Training](https://iclass.eccouncil.org/our-courses/certified-ethical-hacker-ceh/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/certificates@WXRaVCYwuGQsjJ5wyvbea.md b/src/data/roadmaps/cyber-security/content/certificates@WXRaVCYwuGQsjJ5wyvbea.md index 9a89829dd..973ad4df9 100644 --- a/src/data/roadmaps/cyber-security/content/certificates@WXRaVCYwuGQsjJ5wyvbea.md +++ b/src/data/roadmaps/cyber-security/content/certificates@WXRaVCYwuGQsjJ5wyvbea.md @@ -6,5 +6,5 @@ Digital certificates provide a crucial layer of security and trust for online co Learn more from the following resources: -- [@article@What is an SSL certificate?](https://www.cloudflare.com/en-gb/learning/ssl/what-is-an-ssl-certificate/) -- [@article@What is a certificate authority](https://www.ssl.com/article/what-is-a-certificate-authority-ca/) \ No newline at end of file +- [@article@What is an SSL Certificate?](https://www.cloudflare.com/en-gb/learning/ssl/what-is-an-ssl-certificate/) +- [@article@What is a Certificate Authority](https://www.ssl.com/article/what-is-a-certificate-authority-ca/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/cis@sSihnptkoEqUsHjDpckhG.md b/src/data/roadmaps/cyber-security/content/cis@sSihnptkoEqUsHjDpckhG.md index 989108fa2..b8ef8be9f 100644 --- a/src/data/roadmaps/cyber-security/content/cis@sSihnptkoEqUsHjDpckhG.md +++ b/src/data/roadmaps/cyber-security/content/cis@sSihnptkoEqUsHjDpckhG.md @@ -4,5 +4,5 @@ The **Center for Internet Security (CIS)** is a non-profit organization that foc Learn more from the following resources: -- [@video@CIS Overview](https://www.youtube.com/watch?v=f-Z7h5dI6uQ) -- [@official@CIS Website](https://www.cisecurity.org/) \ No newline at end of file +- [@official@CIS](https://www.cisecurity.org/) +- [@video@CIS Overview](https://www.youtube.com/watch?v=f-Z7h5dI6uQ) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/cisa@lqFp4VLY_S-5tAbhNQTew.md b/src/data/roadmaps/cyber-security/content/cisa@lqFp4VLY_S-5tAbhNQTew.md index 5c1b093ba..d97503d0a 100644 --- a/src/data/roadmaps/cyber-security/content/cisa@lqFp4VLY_S-5tAbhNQTew.md +++ b/src/data/roadmaps/cyber-security/content/cisa@lqFp4VLY_S-5tAbhNQTew.md @@ -6,5 +6,5 @@ CISA was established by the Information Systems Audit and Control Association (I Learn more from the following resources: -- [@official@CISA Website](https://www.isaca.org/credentialing/cisa) +- [@official@CISA](https://www.isaca.org/credentialing/cisa) - [@article@What is a Certified Information Systems Auditor?](https://www.investopedia.com/terms/c/certified-information-systems-auditor.asp) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md b/src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md index 5a7d7aa1c..e62ba3ccf 100644 --- a/src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md +++ b/src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md @@ -4,5 +4,5 @@ The Certified Information Security Manager (CISM) is an advanced cybersecurity c Learn more from the following resources: -- [@official@CISM Website](https://www.isaca.org/credentialing/cism) +- [@official@CISM](https://www.isaca.org/credentialing/cism) - [@article@Certified Information Security Manager (CISM)](https://www.techtarget.com/searchsecurity/definition/certified-information-security-manager-CISM) diff --git a/src/data/roadmaps/cyber-security/content/cissp@BqvijNoRzSGYLCMP-6hhr.md b/src/data/roadmaps/cyber-security/content/cissp@BqvijNoRzSGYLCMP-6hhr.md index eb364966d..9e714f6bc 100644 --- a/src/data/roadmaps/cyber-security/content/cissp@BqvijNoRzSGYLCMP-6hhr.md +++ b/src/data/roadmaps/cyber-security/content/cissp@BqvijNoRzSGYLCMP-6hhr.md @@ -4,5 +4,5 @@ The Certified Information Systems Security Professional (CISSP) is a globally re Learn more from the following resources: -- [@official@CISSP Certification Website](https://www.isc2.org/certifications/cissp) -- [@course@CISSP Certification course](https://www.youtube.com/watch?v=M1_v5HBVHWo) \ No newline at end of file +- [@official@CISSP Certification](https://www.isc2.org/certifications/cissp) +- [@video@CISSP Certification Course](https://www.youtube.com/watch?v=M1_v5HBVHWo) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/cloud-skills-and-knowledge@vVaBQ5VtsE_ZeXbCOF8ux.md b/src/data/roadmaps/cyber-security/content/cloud-skills-and-knowledge@vVaBQ5VtsE_ZeXbCOF8ux.md index 743ea275b..adbe3144d 100644 --- a/src/data/roadmaps/cyber-security/content/cloud-skills-and-knowledge@vVaBQ5VtsE_ZeXbCOF8ux.md +++ b/src/data/roadmaps/cyber-security/content/cloud-skills-and-knowledge@vVaBQ5VtsE_ZeXbCOF8ux.md @@ -7,4 +7,4 @@ Security in the cloud is a vital skill, encompassing encryption, identity and ac Learn more from the following resources: - [@article@7 Cloud Computing skills to know](https://www.coursera.org/articles/cloud-computing-skills) -- [@video@What cloud skills are essential?](https://www.youtube.com/watch?v=udKBDRcj178) \ No newline at end of file +- [@video@What Cloud Skills are Essential?](https://www.youtube.com/watch?v=udKBDRcj178) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/common-commands@WDrSO7wBNn-2jB8mcyT7j.md b/src/data/roadmaps/cyber-security/content/common-commands@WDrSO7wBNn-2jB8mcyT7j.md index b89897f57..ad83a8adf 100644 --- a/src/data/roadmaps/cyber-security/content/common-commands@WDrSO7wBNn-2jB8mcyT7j.md +++ b/src/data/roadmaps/cyber-security/content/common-commands@WDrSO7wBNn-2jB8mcyT7j.md @@ -26,5 +26,6 @@ These commands form the foundation of interacting with and managing an OS via th Learn more from the following resources: +- [@article@Essential Unix Commands](https://www.geeksforgeeks.org/essential-linuxunix-commands/) - [@video@60 Linux commands you must know](https://www.youtube.com/watch?v=gd7BXuUQ91w) - [@video@Top 40 Windows commands to know](https://www.youtube.com/watch?v=Jfvg3CS1X3A) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/common-ports-and-their-uses@0tx2QYDYXhm85iYrCWd9U.md b/src/data/roadmaps/cyber-security/content/common-ports-and-their-uses@0tx2QYDYXhm85iYrCWd9U.md index c11a7385b..fcc28c017 100644 --- a/src/data/roadmaps/cyber-security/content/common-ports-and-their-uses@0tx2QYDYXhm85iYrCWd9U.md +++ b/src/data/roadmaps/cyber-security/content/common-ports-and-their-uses@0tx2QYDYXhm85iYrCWd9U.md @@ -4,5 +4,5 @@ Common ports are standardized communication endpoints used by various network pr Learn more from the following resources: -- [@video@Common network ports](https://www.youtube.com/watch?v=dh8h-4u7Wak) +- [@video@Common Network Ports](https://www.youtube.com/watch?v=dh8h-4u7Wak) - [@article@Common network ports you should know](https://opensource.com/article/18/10/common-network-ports) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/common-protocols-and-their-uses@ViF-mpR17MB3_KJ1rV8mS.md b/src/data/roadmaps/cyber-security/content/common-protocols-and-their-uses@ViF-mpR17MB3_KJ1rV8mS.md index 05be68557..dbad1814a 100644 --- a/src/data/roadmaps/cyber-security/content/common-protocols-and-their-uses@ViF-mpR17MB3_KJ1rV8mS.md +++ b/src/data/roadmaps/cyber-security/content/common-protocols-and-their-uses@ViF-mpR17MB3_KJ1rV8mS.md @@ -5,4 +5,4 @@ Networking protocols are essential for facilitating communication between device Learn more from the following resources: - [@video@Networking For Hackers! (Common Network Protocols)](https://www.youtube.com/watch?v=p3vaaD9pn9I) -- [@article@12 common network protocols](https://www.techtarget.com/searchnetworking/feature/12-common-network-protocols-and-their-functions-explained) \ No newline at end of file +- [@article@12 Common Network Protocols](https://www.techtarget.com/searchnetworking/feature/12-common-network-protocols-and-their-functions-explained) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/comptia-a@lbAgU5lR1O7L_5mCbNz_D.md b/src/data/roadmaps/cyber-security/content/comptia-a@lbAgU5lR1O7L_5mCbNz_D.md index 030b26d58..6579fab64 100644 --- a/src/data/roadmaps/cyber-security/content/comptia-a@lbAgU5lR1O7L_5mCbNz_D.md +++ b/src/data/roadmaps/cyber-security/content/comptia-a@lbAgU5lR1O7L_5mCbNz_D.md @@ -4,5 +4,5 @@ CompTIA A+ is an entry-level certification for IT professionals that focuses on Learn more from the following resources: -- [@official@Comptia A+ Website](https://www.comptia.org/certifications/a) -- [@course@Comptia A+ Course](https://www.youtube.com/watch?v=1CZXXNKAY5o) \ No newline at end of file +- [@official@CompTIA A+](https://www.comptia.org/certifications/a) +- [@video@CompTIA A+ Course](https://www.youtube.com/watch?v=1CZXXNKAY5o) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/comptia-linux@p34Qwlj2sjwEPR2ay1WOK.md b/src/data/roadmaps/cyber-security/content/comptia-linux@p34Qwlj2sjwEPR2ay1WOK.md index 85180e8cf..bc1fe15cf 100644 --- a/src/data/roadmaps/cyber-security/content/comptia-linux@p34Qwlj2sjwEPR2ay1WOK.md +++ b/src/data/roadmaps/cyber-security/content/comptia-linux@p34Qwlj2sjwEPR2ay1WOK.md @@ -4,5 +4,5 @@ The CompTIA Linux+ certification is an entry-level certification aimed at indivi Learn more from the following resources: -- [@official@Linux+ Website](https://www.comptia.org/certifications/linux) +- [@official@CompTIA Linux+](https://www.comptia.org/certifications/linux) - [@video@Linux+ Exam Prep](https://www.youtube.com/watch?v=niPWk7tgD2Q&list=PL78ppT-_wOmuwT9idLvuoKOn6UYurFKCp) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/comptia-network@4RGbNOfMPDbBcvUFWTTCV.md b/src/data/roadmaps/cyber-security/content/comptia-network@4RGbNOfMPDbBcvUFWTTCV.md index e0c426d2c..209cd3b6c 100644 --- a/src/data/roadmaps/cyber-security/content/comptia-network@4RGbNOfMPDbBcvUFWTTCV.md +++ b/src/data/roadmaps/cyber-security/content/comptia-network@4RGbNOfMPDbBcvUFWTTCV.md @@ -1,8 +1,8 @@ # CompTIA Network+ -The CompTIA Network+ is a highly sought-after certification for IT professionals who aim to build a solid foundation in networking concepts and practices. This certification is vendor-neutral, meaning that it covers a broad range of knowledge that can be applied to various network technologies, products, and solutions. The Network+ certification is designed for beginners in the world of IT networking, and it is recommended that you first obtain the [CompTIA A+ certification](#) before moving on to Network+. +The CompTIA Network+ is a highly sought-after certification for IT professionals who aim to build a solid foundation in networking concepts and practices. This certification is vendor-neutral, meaning that it covers a broad range of knowledge that can be applied to various network technologies, products, and solutions. The Network+ certification is designed for beginners in the world of IT networking, and it is recommended that you first obtain the CompTIA A+ certification before moving on to Network+. Learn more from the following resources: -- [@official@CompTIA Network+ Website](https://www.comptia.org/certifications/network) -- [@course@CompTIA Network+ Course](https://www.youtube.com/watch?v=xmpYfyNmWbw) \ No newline at end of file +- [@official@CompTIA Network+](https://www.comptia.org/certifications/network) +- [@video@CompTIA Network+ Course](https://www.youtube.com/watch?v=xmpYfyNmWbw) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/connection-types-and-their-function@F1QVCEmGkgvz-_H5lTxY2.md b/src/data/roadmaps/cyber-security/content/connection-types-and-their-function@F1QVCEmGkgvz-_H5lTxY2.md index d2f95e06b..67e2aa273 100644 --- a/src/data/roadmaps/cyber-security/content/connection-types-and-their-function@F1QVCEmGkgvz-_H5lTxY2.md +++ b/src/data/roadmaps/cyber-security/content/connection-types-and-their-function@F1QVCEmGkgvz-_H5lTxY2.md @@ -14,6 +14,6 @@ Each connection type plays a specific role, balancing factors like speed, distan Learn more from the following resources: -- [@article@What is ethernet?](https://www.techtarget.com/searchnetworking/definition/Ethernet) +- [@article@What is Ethernet?](https://www.techtarget.com/searchnetworking/definition/Ethernet) - [@article@What is WiFi and how does it work?](https://computer.howstuffworks.com/wireless-network.htm) - [@article@How bluetooth works](https://electronics.howstuffworks.com/bluetooth.htm) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/containment@l7WnKuR2HTD4Vf9U2TxkK.md b/src/data/roadmaps/cyber-security/content/containment@l7WnKuR2HTD4Vf9U2TxkK.md index 1ccf57d5c..f95b7f939 100644 --- a/src/data/roadmaps/cyber-security/content/containment@l7WnKuR2HTD4Vf9U2TxkK.md +++ b/src/data/roadmaps/cyber-security/content/containment@l7WnKuR2HTD4Vf9U2TxkK.md @@ -4,5 +4,5 @@ Containment in cybersecurity refers to the process of limiting the impact of a s Learn more from the following resources: -- [@article@Microsoft security incident management: Containment, eradication, and recovery](https://learn.microsoft.com/en-us/compliance/assurance/assurance-sim-containment-eradication-recovery) +- [@article@Microsoft Security Incident Management: Containment, Eradication, and Recovery](https://learn.microsoft.com/en-us/compliance/assurance/assurance-sim-containment-eradication-recovery) - [@article@Containment - AWS](https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/containment.html) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/core-concepts-of-zero-trust@HavEL0u65ZxHt92TfbLzk.md b/src/data/roadmaps/cyber-security/content/core-concepts-of-zero-trust@HavEL0u65ZxHt92TfbLzk.md index 744085e20..d8e26cfff 100644 --- a/src/data/roadmaps/cyber-security/content/core-concepts-of-zero-trust@HavEL0u65ZxHt92TfbLzk.md +++ b/src/data/roadmaps/cyber-security/content/core-concepts-of-zero-trust@HavEL0u65ZxHt92TfbLzk.md @@ -4,5 +4,5 @@ The core concepts of Zero Trust revolve around the principle of "never trust, al Learn more from the following resources: -- [@article@What is a zero trust network?](https://www.cloudflare.com/en-gb/learning/security/glossary/what-is-zero-trust/) -- [@video@Zero trust explained in 4 minutes](https://www.youtube.com/watch?v=yn6CPQ9RioA) \ No newline at end of file +- [@article@What is a Zero Trust Network?](https://www.cloudflare.com/en-gb/learning/security/glossary/what-is-zero-trust/) +- [@video@Zero Trust Explained in 4 minutes](https://www.youtube.com/watch?v=yn6CPQ9RioA) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/crest@rA1skdztev3-8VmAtIlmr.md b/src/data/roadmaps/cyber-security/content/crest@rA1skdztev3-8VmAtIlmr.md index 7f6e18a57..58bc4b869 100644 --- a/src/data/roadmaps/cyber-security/content/crest@rA1skdztev3-8VmAtIlmr.md +++ b/src/data/roadmaps/cyber-security/content/crest@rA1skdztev3-8VmAtIlmr.md @@ -1,8 +1,8 @@ # CREST -CREST is a non-profit, accreditation and certification body that represents the technical information security industry. Established in 2008, its mission is to promote the development and professionalization of the cyber security sector. CREST provides certifications for individuals and accreditations for companies, helping customers find knowledgeable and experienced professionals in the field. +CREST is a non-profit, accreditation and certification body that represents the technical information security industry. Established in 2008, its mission is to promote the development and professionalization of the cyber security sector. CREST provides certifications for individuals and accreditation for companies, helping customers find knowledgeable and experienced professionals in the field. Learn more from the following resources: -- [@official@CREST Certifications Website](https://www.crest-approved.org/skills-certifications-careers/crest-certifications/) +- [@official@CREST Certifications](https://www.crest-approved.org/skills-certifications-careers/crest-certifications/) - [@video@A brief overview of CREST](https://www.youtube.com/watch?v=Cci5qrv8fHY) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/curl@W7iQUCjODGYgE4PjC5TZI.md b/src/data/roadmaps/cyber-security/content/curl@W7iQUCjODGYgE4PjC5TZI.md index ad8d101c2..3603b48d3 100644 --- a/src/data/roadmaps/cyber-security/content/curl@W7iQUCjODGYgE4PjC5TZI.md +++ b/src/data/roadmaps/cyber-security/content/curl@W7iQUCjODGYgE4PjC5TZI.md @@ -1,6 +1,6 @@ # curl -Curl is a versatile command-line tool primarily used for transferring data using various network protocols. It is widely used in cybersecurity and development for the purpose of testing and interacting with web services, APIs, and scrutinizing web application security. Curl supports various protocols such as HTTP, HTTPS, FTP, SCP, SFTP, and many more. +cURL is a versatile command-line tool primarily used for transferring data using various network protocols. It is widely used in cybersecurity and development for the purpose of testing and interacting with web services, APIs, and scrutinizing web application security. Curl supports various protocols such as HTTP, HTTPS, FTP, SCP, SFTP, and many more. Learn more from the following resources: diff --git a/src/data/roadmaps/cyber-security/content/cyber-kill-chain@H38Vb7xvuBJXVzgPBdRdT.md b/src/data/roadmaps/cyber-security/content/cyber-kill-chain@H38Vb7xvuBJXVzgPBdRdT.md index ff03af00a..ed4709786 100644 --- a/src/data/roadmaps/cyber-security/content/cyber-kill-chain@H38Vb7xvuBJXVzgPBdRdT.md +++ b/src/data/roadmaps/cyber-security/content/cyber-kill-chain@H38Vb7xvuBJXVzgPBdRdT.md @@ -2,16 +2,6 @@ The **Cyber Kill Chain** is a model that was developed by Lockheed Martin, a major aerospace, military support, and security company, to understand and prevent cyber intrusions in various networks and systems. It serves as a framework for breaking down the stages of a cyber attack, making it easier for security professionals to identify, mitigate, and prevent threats. -The concept is based on a military model, where the term "kill chain" represents a series of steps needed to successfully target and engage an adversary. In the context of cybersecurity, the model breaks down the stages of a cyber attack into seven distinct phases: - -- **Reconnaissance**: This initial phase involves gathering intelligence on the target, which may include researching public databases, performing network scans, or social engineering techniques. -- **Weaponization**: In this stage, the attacker creates a weapon – such as a malware, virus, or exploit – and packages it with a delivery mechanism that can infiltrate the target's system. -- **Delivery**: The attacker selects and deploys the delivery method to transmit the weapon to the target. Common methods include email attachments, malicious URLs, or infected software updates. -- **Exploitation**: This is the phase where the weapon is activated, taking advantage of vulnerabilities in the target's systems or applications to execute the attacker's code. -- **Installation**: Once the exploit is successful, the attacker installs the malware on the victim's system, setting the stage for further attacks or data exfiltration. -- **Command and Control (C2)**: The attacker establishes a communication channel with the infected system, allowing them to remotely control the malware and conduct further actions. -- **Actions on Objectives**: In this final phase, the attacker achieves their goal, which may involve stealing sensitive data, compromising systems, or disrupting services. - Learn more from the following resources: - [@official@Cyber Kill Chain](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html)