Add content for certs and ctfs

pull/3529/head
Kamran Ahmed 2 years ago
parent 1a3265295c
commit 7993f12d12
  1. 13461
      public/jsons/roadmaps/cyber-security.json
  2. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/100-salting.md
  3. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/101-hashing.md
  4. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/102-key-exchange.md
  5. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/103-pki.md
  6. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/104-private-vs-public-key.md
  7. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/105-obfuscation.md
  8. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/index.md
  9. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/100-preparation.md
  10. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/101-identification.md
  11. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/102-containment.md
  12. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/103-eradication.md
  13. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/104-recovery.md
  14. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/105-lessons-learned.md
  15. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/101-incident-response-process/index.md
  16. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/100-zero-day.md
  17. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/101-known-vs-unknown.md
  18. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/102-apt.md
  19. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/102-threat-classification/index.md
  20. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/100-mac-based.md
  21. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/101-nac-based.md
  22. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/102-port-blocking.md
  23. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/103-group-policy.md
  24. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/104-acls.md
  25. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/105-sinkholes.md
  26. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/106-patching.md
  27. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/107-jump-server.md
  28. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/108-endpoint-security.md
  29. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/103-hardening-concepts/index.md
  30. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/100-parrot-os.md
  31. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md
  32. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/index.md
  33. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/100-iso.md
  34. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/101-nist.md
  35. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/102-rmf.md
  36. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/103-cis.md
  37. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/104-csf.md
  38. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-standards/index.md
  39. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/100-event-logs.md
  40. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/101-syslogs.md
  41. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/102-netflow.md
  42. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/103-packet-captures.md
  43. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/104-firewall-logs.md
  44. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/find-and-use-logs/index.md
  45. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/100-nmap.md
  46. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/101-tracert.md
  47. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/102-nslookup.md
  48. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/103-dig.md
  49. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/104-curl.md
  50. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/105-ipconfig.md
  51. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/106-hping.md
  52. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/107-ping.md
  53. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/108-arp.md
  54. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/109-cat.md
  55. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/110-dd.md
  56. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/111-head.md
  57. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/112-tail.md
  58. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/113-grep.md
  59. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/114-wireshark.md
  60. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/115-winhex.md
  61. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/116-memdump.md
  62. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/117-ftk-imager.md
  63. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/118-autopsy.md
  64. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/incident-response-and-discovery-tools/index.md
  65. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/100-ftp-vs-sftp.md
  66. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/101-ssl-vs-tls.md
  67. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/102-ipsec.md
  68. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/103-dnssec.md
  69. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/104-ldaps.md
  70. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/105-srtp.md
  71. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/106-s-mime.md
  72. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/secure-vs-unsecure-protocols/index.md
  73. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/tools-for-unintended-purposes/100-lolbas.md
  74. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/tools-for-unintended-purposes/index.md
  75. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/100-attck.md
  76. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/101-kill-chain.md
  77. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/102-diamond-model.md
  78. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/uderstand-frameworks/index.md
  79. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/100-virus-total.md
  80. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/101-joe-sandbox.md
  81. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/102-any-run.md
  82. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/103-urlvoid.md
  83. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/104-urlscan.md
  84. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/105-whois.md
  85. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-common-tools/index.md
  86. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/100-antivirus.md
  87. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/101-antimalware.md
  88. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/102-edr.md
  89. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/103-dlp.md
  90. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/104-firewall-nextgen-firewall.md
  91. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/105-hips.md
  92. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/106-nids.md
  93. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/107-nips.md
  94. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/108-host-based-firewall.md
  95. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/109-sandboxing.md
  96. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/110-acl.md
  97. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/111-eap-vs-peap.md
  98. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/112-wpa-vs-wpa2-vs-wpa3-vs-wep.md
  99. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/113-wps.md
  100. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/understand-the-following-terms/index.md
  101. Some files were not shown because too many files have changed in this diff Show More

File diff suppressed because one or more lines are too long

Some files were not shown because too many files have changed in this diff Show More

Loading…
Cancel
Save