refactor(cybersecurity): adjust topic content (#8527)

pull/8548/head
Vedansh 2 days ago committed by GitHub
parent 0a2e098c44
commit 599da5a153
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 3
      src/data/roadmaps/cyber-security/content/c@8jj9hpe9jQIgCc8Txyw3O.md
  2. 1
      src/data/roadmaps/cyber-security/content/cat@D2ptX6ja_HvFEafMIzWOy.md
  3. 4
      src/data/roadmaps/cyber-security/content/ccna@4RD22UZATfL8dc71YkJwQ.md
  4. 3
      src/data/roadmaps/cyber-security/content/ceh@AAo7DXB7hyBzO6p05gx1i.md
  5. 4
      src/data/roadmaps/cyber-security/content/certificates@WXRaVCYwuGQsjJ5wyvbea.md
  6. 4
      src/data/roadmaps/cyber-security/content/cis@sSihnptkoEqUsHjDpckhG.md
  7. 2
      src/data/roadmaps/cyber-security/content/cisa@lqFp4VLY_S-5tAbhNQTew.md
  8. 2
      src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md
  9. 4
      src/data/roadmaps/cyber-security/content/cissp@BqvijNoRzSGYLCMP-6hhr.md
  10. 2
      src/data/roadmaps/cyber-security/content/cloud-skills-and-knowledge@vVaBQ5VtsE_ZeXbCOF8ux.md
  11. 1
      src/data/roadmaps/cyber-security/content/common-commands@WDrSO7wBNn-2jB8mcyT7j.md
  12. 2
      src/data/roadmaps/cyber-security/content/common-ports-and-their-uses@0tx2QYDYXhm85iYrCWd9U.md
  13. 2
      src/data/roadmaps/cyber-security/content/common-protocols-and-their-uses@ViF-mpR17MB3_KJ1rV8mS.md
  14. 4
      src/data/roadmaps/cyber-security/content/comptia-a@lbAgU5lR1O7L_5mCbNz_D.md
  15. 2
      src/data/roadmaps/cyber-security/content/comptia-linux@p34Qwlj2sjwEPR2ay1WOK.md
  16. 6
      src/data/roadmaps/cyber-security/content/comptia-network@4RGbNOfMPDbBcvUFWTTCV.md
  17. 2
      src/data/roadmaps/cyber-security/content/connection-types-and-their-function@F1QVCEmGkgvz-_H5lTxY2.md
  18. 2
      src/data/roadmaps/cyber-security/content/containment@l7WnKuR2HTD4Vf9U2TxkK.md
  19. 4
      src/data/roadmaps/cyber-security/content/core-concepts-of-zero-trust@HavEL0u65ZxHt92TfbLzk.md
  20. 4
      src/data/roadmaps/cyber-security/content/crest@rA1skdztev3-8VmAtIlmr.md
  21. 2
      src/data/roadmaps/cyber-security/content/curl@W7iQUCjODGYgE4PjC5TZI.md
  22. 10
      src/data/roadmaps/cyber-security/content/cyber-kill-chain@H38Vb7xvuBJXVzgPBdRdT.md

@ -4,5 +4,6 @@ C++ is a widely-used, high-level programming language that evolved from the earl
Learn more form the following resources: Learn more form the following resources:
- [@course@C++ Full Course - BroCode](https://www.youtube.com/watch?v=-TkoO8Z07hI) - [@roadmap@Visit Dedicated C++ Roadmap](https://roadmap.sh/cpp)
- [@video@C++ Full Course - BroCode](https://www.youtube.com/watch?v=-TkoO8Z07hI)
- [@article@C++ Introduction](https://www.w3schools.com/cpp/cpp_intro.asp) - [@article@C++ Introduction](https://www.w3schools.com/cpp/cpp_intro.asp)

@ -4,5 +4,6 @@
Learn more from the following resources: Learn more from the following resources:
- [@article@Cat Command in Linux](https://linuxize.com/post/linux-cat-command/)
- [@article@Linux cat command](https://phoenixnap.com/kb/linux-cat-command) - [@article@Linux cat command](https://phoenixnap.com/kb/linux-cat-command)
- [@video@The cat command](https://www.youtube.com/shorts/lTOje2weu_o?app=desktop) - [@video@The cat command](https://www.youtube.com/shorts/lTOje2weu_o?app=desktop)

@ -4,5 +4,5 @@ The Cisco Certified Network Associate (CCNA) certification is an entry-level cer
Learn more from the following resources: Learn more from the following resources:
- [@Network Chuck Free CCNA Course](https://www.youtube.com/playlist?list=PLIhvC56v63IJVXv0GJcl9vO5Z6znCVb1P) - [@official@CCNA Certification](https://www.cisco.com/site/us/en/learn/training-certifications/certifications/enterprise/ccna/index.html)
- [@official@CCNA Certification Website](https://www.cisco.com/site/us/en/learn/training-certifications/certifications/enterprise/ccna/index.html) - [@video@Network Chuck Free CCNA Course](https://www.youtube.com/playlist?list=PLIhvC56v63IJVXv0GJcl9vO5Z6znCVb1P)

@ -4,4 +4,5 @@
Learn more from the following resources: Learn more from the following resources:
- [@official@CEH Website](https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/) - [@official@CEH](https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/)
- [@article@Certified Ethical Hacker Online Training](https://iclass.eccouncil.org/our-courses/certified-ethical-hacker-ceh/)

@ -6,5 +6,5 @@ Digital certificates provide a crucial layer of security and trust for online co
Learn more from the following resources: Learn more from the following resources:
- [@article@What is an SSL certificate?](https://www.cloudflare.com/en-gb/learning/ssl/what-is-an-ssl-certificate/) - [@article@What is an SSL Certificate?](https://www.cloudflare.com/en-gb/learning/ssl/what-is-an-ssl-certificate/)
- [@article@What is a certificate authority](https://www.ssl.com/article/what-is-a-certificate-authority-ca/) - [@article@What is a Certificate Authority](https://www.ssl.com/article/what-is-a-certificate-authority-ca/)

@ -4,5 +4,5 @@ The **Center for Internet Security (CIS)** is a non-profit organization that foc
Learn more from the following resources: Learn more from the following resources:
- [@video@CIS Overview](https://www.youtube.com/watch?v=f-Z7h5dI6uQ) - [@official@CIS](https://www.cisecurity.org/)
- [@official@CIS Website](https://www.cisecurity.org/) - [@video@CIS Overview](https://www.youtube.com/watch?v=f-Z7h5dI6uQ)

@ -6,5 +6,5 @@ CISA was established by the Information Systems Audit and Control Association (I
Learn more from the following resources: Learn more from the following resources:
- [@official@CISA Website](https://www.isaca.org/credentialing/cisa) - [@official@CISA](https://www.isaca.org/credentialing/cisa)
- [@article@What is a Certified Information Systems Auditor?](https://www.investopedia.com/terms/c/certified-information-systems-auditor.asp) - [@article@What is a Certified Information Systems Auditor?](https://www.investopedia.com/terms/c/certified-information-systems-auditor.asp)

@ -4,5 +4,5 @@ The Certified Information Security Manager (CISM) is an advanced cybersecurity c
Learn more from the following resources: Learn more from the following resources:
- [@official@CISM Website](https://www.isaca.org/credentialing/cism) - [@official@CISM](https://www.isaca.org/credentialing/cism)
- [@article@Certified Information Security Manager (CISM)](https://www.techtarget.com/searchsecurity/definition/certified-information-security-manager-CISM) - [@article@Certified Information Security Manager (CISM)](https://www.techtarget.com/searchsecurity/definition/certified-information-security-manager-CISM)

@ -4,5 +4,5 @@ The Certified Information Systems Security Professional (CISSP) is a globally re
Learn more from the following resources: Learn more from the following resources:
- [@official@CISSP Certification Website](https://www.isc2.org/certifications/cissp) - [@official@CISSP Certification](https://www.isc2.org/certifications/cissp)
- [@course@CISSP Certification course](https://www.youtube.com/watch?v=M1_v5HBVHWo) - [@video@CISSP Certification Course](https://www.youtube.com/watch?v=M1_v5HBVHWo)

@ -7,4 +7,4 @@ Security in the cloud is a vital skill, encompassing encryption, identity and ac
Learn more from the following resources: Learn more from the following resources:
- [@article@7 Cloud Computing skills to know](https://www.coursera.org/articles/cloud-computing-skills) - [@article@7 Cloud Computing skills to know](https://www.coursera.org/articles/cloud-computing-skills)
- [@video@What cloud skills are essential?](https://www.youtube.com/watch?v=udKBDRcj178) - [@video@What Cloud Skills are Essential?](https://www.youtube.com/watch?v=udKBDRcj178)

@ -26,5 +26,6 @@ These commands form the foundation of interacting with and managing an OS via th
Learn more from the following resources: Learn more from the following resources:
- [@article@Essential Unix Commands](https://www.geeksforgeeks.org/essential-linuxunix-commands/)
- [@video@60 Linux commands you must know](https://www.youtube.com/watch?v=gd7BXuUQ91w) - [@video@60 Linux commands you must know](https://www.youtube.com/watch?v=gd7BXuUQ91w)
- [@video@Top 40 Windows commands to know](https://www.youtube.com/watch?v=Jfvg3CS1X3A) - [@video@Top 40 Windows commands to know](https://www.youtube.com/watch?v=Jfvg3CS1X3A)

@ -4,5 +4,5 @@ Common ports are standardized communication endpoints used by various network pr
Learn more from the following resources: Learn more from the following resources:
- [@video@Common network ports](https://www.youtube.com/watch?v=dh8h-4u7Wak) - [@video@Common Network Ports](https://www.youtube.com/watch?v=dh8h-4u7Wak)
- [@article@Common network ports you should know](https://opensource.com/article/18/10/common-network-ports) - [@article@Common network ports you should know](https://opensource.com/article/18/10/common-network-ports)

@ -5,4 +5,4 @@ Networking protocols are essential for facilitating communication between device
Learn more from the following resources: Learn more from the following resources:
- [@video@Networking For Hackers! (Common Network Protocols)](https://www.youtube.com/watch?v=p3vaaD9pn9I) - [@video@Networking For Hackers! (Common Network Protocols)](https://www.youtube.com/watch?v=p3vaaD9pn9I)
- [@article@12 common network protocols](https://www.techtarget.com/searchnetworking/feature/12-common-network-protocols-and-their-functions-explained) - [@article@12 Common Network Protocols](https://www.techtarget.com/searchnetworking/feature/12-common-network-protocols-and-their-functions-explained)

@ -4,5 +4,5 @@ CompTIA A+ is an entry-level certification for IT professionals that focuses on
Learn more from the following resources: Learn more from the following resources:
- [@official@Comptia A+ Website](https://www.comptia.org/certifications/a) - [@official@CompTIA A+](https://www.comptia.org/certifications/a)
- [@course@Comptia A+ Course](https://www.youtube.com/watch?v=1CZXXNKAY5o) - [@video@CompTIA A+ Course](https://www.youtube.com/watch?v=1CZXXNKAY5o)

@ -4,5 +4,5 @@ The CompTIA Linux+ certification is an entry-level certification aimed at indivi
Learn more from the following resources: Learn more from the following resources:
- [@official@Linux+ Website](https://www.comptia.org/certifications/linux) - [@official@CompTIA Linux+](https://www.comptia.org/certifications/linux)
- [@video@Linux+ Exam Prep](https://www.youtube.com/watch?v=niPWk7tgD2Q&list=PL78ppT-_wOmuwT9idLvuoKOn6UYurFKCp) - [@video@Linux+ Exam Prep](https://www.youtube.com/watch?v=niPWk7tgD2Q&list=PL78ppT-_wOmuwT9idLvuoKOn6UYurFKCp)

@ -1,8 +1,8 @@
# CompTIA Network+ # CompTIA Network+
The CompTIA Network+ is a highly sought-after certification for IT professionals who aim to build a solid foundation in networking concepts and practices. This certification is vendor-neutral, meaning that it covers a broad range of knowledge that can be applied to various network technologies, products, and solutions. The Network+ certification is designed for beginners in the world of IT networking, and it is recommended that you first obtain the [CompTIA A+ certification](#) before moving on to Network+. The CompTIA Network+ is a highly sought-after certification for IT professionals who aim to build a solid foundation in networking concepts and practices. This certification is vendor-neutral, meaning that it covers a broad range of knowledge that can be applied to various network technologies, products, and solutions. The Network+ certification is designed for beginners in the world of IT networking, and it is recommended that you first obtain the CompTIA A+ certification before moving on to Network+.
Learn more from the following resources: Learn more from the following resources:
- [@official@CompTIA Network+ Website](https://www.comptia.org/certifications/network) - [@official@CompTIA Network+](https://www.comptia.org/certifications/network)
- [@course@CompTIA Network+ Course](https://www.youtube.com/watch?v=xmpYfyNmWbw) - [@video@CompTIA Network+ Course](https://www.youtube.com/watch?v=xmpYfyNmWbw)

@ -14,6 +14,6 @@ Each connection type plays a specific role, balancing factors like speed, distan
Learn more from the following resources: Learn more from the following resources:
- [@article@What is ethernet?](https://www.techtarget.com/searchnetworking/definition/Ethernet) - [@article@What is Ethernet?](https://www.techtarget.com/searchnetworking/definition/Ethernet)
- [@article@What is WiFi and how does it work?](https://computer.howstuffworks.com/wireless-network.htm) - [@article@What is WiFi and how does it work?](https://computer.howstuffworks.com/wireless-network.htm)
- [@article@How bluetooth works](https://electronics.howstuffworks.com/bluetooth.htm) - [@article@How bluetooth works](https://electronics.howstuffworks.com/bluetooth.htm)

@ -4,5 +4,5 @@ Containment in cybersecurity refers to the process of limiting the impact of a s
Learn more from the following resources: Learn more from the following resources:
- [@article@Microsoft security incident management: Containment, eradication, and recovery](https://learn.microsoft.com/en-us/compliance/assurance/assurance-sim-containment-eradication-recovery) - [@article@Microsoft Security Incident Management: Containment, Eradication, and Recovery](https://learn.microsoft.com/en-us/compliance/assurance/assurance-sim-containment-eradication-recovery)
- [@article@Containment - AWS](https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/containment.html) - [@article@Containment - AWS](https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/containment.html)

@ -4,5 +4,5 @@ The core concepts of Zero Trust revolve around the principle of "never trust, al
Learn more from the following resources: Learn more from the following resources:
- [@article@What is a zero trust network?](https://www.cloudflare.com/en-gb/learning/security/glossary/what-is-zero-trust/) - [@article@What is a Zero Trust Network?](https://www.cloudflare.com/en-gb/learning/security/glossary/what-is-zero-trust/)
- [@video@Zero trust explained in 4 minutes](https://www.youtube.com/watch?v=yn6CPQ9RioA) - [@video@Zero Trust Explained in 4 minutes](https://www.youtube.com/watch?v=yn6CPQ9RioA)

@ -1,8 +1,8 @@
# CREST # CREST
CREST is a non-profit, accreditation and certification body that represents the technical information security industry. Established in 2008, its mission is to promote the development and professionalization of the cyber security sector. CREST provides certifications for individuals and accreditations for companies, helping customers find knowledgeable and experienced professionals in the field. CREST is a non-profit, accreditation and certification body that represents the technical information security industry. Established in 2008, its mission is to promote the development and professionalization of the cyber security sector. CREST provides certifications for individuals and accreditation for companies, helping customers find knowledgeable and experienced professionals in the field.
Learn more from the following resources: Learn more from the following resources:
- [@official@CREST Certifications Website](https://www.crest-approved.org/skills-certifications-careers/crest-certifications/) - [@official@CREST Certifications](https://www.crest-approved.org/skills-certifications-careers/crest-certifications/)
- [@video@A brief overview of CREST](https://www.youtube.com/watch?v=Cci5qrv8fHY) - [@video@A brief overview of CREST](https://www.youtube.com/watch?v=Cci5qrv8fHY)

@ -1,6 +1,6 @@
# curl # curl
Curl is a versatile command-line tool primarily used for transferring data using various network protocols. It is widely used in cybersecurity and development for the purpose of testing and interacting with web services, APIs, and scrutinizing web application security. Curl supports various protocols such as HTTP, HTTPS, FTP, SCP, SFTP, and many more. cURL is a versatile command-line tool primarily used for transferring data using various network protocols. It is widely used in cybersecurity and development for the purpose of testing and interacting with web services, APIs, and scrutinizing web application security. Curl supports various protocols such as HTTP, HTTPS, FTP, SCP, SFTP, and many more.
Learn more from the following resources: Learn more from the following resources:

@ -2,16 +2,6 @@
The **Cyber Kill Chain** is a model that was developed by Lockheed Martin, a major aerospace, military support, and security company, to understand and prevent cyber intrusions in various networks and systems. It serves as a framework for breaking down the stages of a cyber attack, making it easier for security professionals to identify, mitigate, and prevent threats. The **Cyber Kill Chain** is a model that was developed by Lockheed Martin, a major aerospace, military support, and security company, to understand and prevent cyber intrusions in various networks and systems. It serves as a framework for breaking down the stages of a cyber attack, making it easier for security professionals to identify, mitigate, and prevent threats.
The concept is based on a military model, where the term "kill chain" represents a series of steps needed to successfully target and engage an adversary. In the context of cybersecurity, the model breaks down the stages of a cyber attack into seven distinct phases:
- **Reconnaissance**: This initial phase involves gathering intelligence on the target, which may include researching public databases, performing network scans, or social engineering techniques.
- **Weaponization**: In this stage, the attacker creates a weapon – such as a malware, virus, or exploit – and packages it with a delivery mechanism that can infiltrate the target's system.
- **Delivery**: The attacker selects and deploys the delivery method to transmit the weapon to the target. Common methods include email attachments, malicious URLs, or infected software updates.
- **Exploitation**: This is the phase where the weapon is activated, taking advantage of vulnerabilities in the target's systems or applications to execute the attacker's code.
- **Installation**: Once the exploit is successful, the attacker installs the malware on the victim's system, setting the stage for further attacks or data exfiltration.
- **Command and Control (C2)**: The attacker establishes a communication channel with the infected system, allowing them to remotely control the malware and conduct further actions.
- **Actions on Objectives**: In this final phase, the attacker achieves their goal, which may involve stealing sensitive data, compromising systems, or disrupting services.
Learn more from the following resources: Learn more from the following resources:
- [@official@Cyber Kill Chain](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html) - [@official@Cyber Kill Chain](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html)

Loading…
Cancel
Save