Improvements to siem.md and update of smine.md (#6777)

* Update dns.md - Fix the YouTube video link error and update the video title.

* Update understand-cia-triad.md

* Update comptia-security.md

- Fix all broken links.
- Update Exam Details.
- Add new links.
- Remove outdated links.

* Update comptia-network.md

- Update Exam Details.
- Preparation Resources.
- New links.

* Update dnssec.md

- summarized content.
- relevant links.

* Update apt.md

- New section
- Added a new link

* Update comptia-a.md

- Updated Professor Messer's link
- New links added

* Apply suggestions from code review

* Update attck.md

- new content.
- relevant links.

* Update src/data/roadmaps/cyber-security/content/attck@auR7fNyd77W2UA-PjXeJS.md

* Update linux.md, comptia-linux.md and understand-the-osi-model.md

Update linux.md
- New Links
- Remove Google Analytics parameters from link

Update comptia-linux.md
- Links updated

Update understand-the-osi-model.md
- New link

* Update cissp.md

- new resources links

* Update src/data/roadmaps/cyber-security/content/cissp@BqvijNoRzSGYLCMP-6hhr.md

* update basics-of-ids-and-ips.md

- new links

* update endpoint-security.md

- new links

* update edr.md
- new text and links.

update ssl-and-tls-basics.md
- new links

update ssl--tls.md
- new links

update dropbox.md
- official link

* ipsec.md
- new content
- new link

kali-linux.md
- new content

linux.md
- fix typo

* Update src/data/roadmaps/cyber-security/content/kali-linux@w6wXkoLrv0_d-Ah0txUHd.md

* change the CEH position to CISSP

This is a suggestion, I believe that CEH appears as a highlight due to the larger space and this bothers many people.

CISSP is a top professional-level certification in the field of cybersecurity and the the most respected certificate in the IT security field. He really deserves his place in the spotlight.

* update xss.md, privilege-escalation.md, wlan.md and others

update xss.md
- new content

update privilege-escalatio.md
- new link

update core-concepts-of-zero-trust.md
- new link

update zero-day.md
- new content
Note: This second zero-day topic is a subset of the "Attack Types and Differences" topic, so the content is minimal compared to the zero-day%40zqRaMmqcLfx400kJ-h0LO.md

update wifi.md
- new video link

update wlan.md
- new video links ( professor messer )

* update vpn.md, web-based-attacks-and-owasp.md

update vpn.md
- new links

update web-based-attacks-and-owasp.md
- new links

* chore: update roadmap content json

* Improvements to siem.md and update of smine.md

Improvements to siem.md
- Paragraph referring to ELK stack (now Elastic Security) has been rewritten to mention open source projects.
- New video link from professor messer.
- Replace the article link with a video link, preference for Splunk due to higher [market share](https://6sense.com/tech/security-information-and-event-management-siem).
- Note: For better organization of the video links, I have separated the names with a prefix for the tool used in the project.

Update smine.md
- New content.

---------

Co-authored-by: dsh <daniel.s.holdsworth@gmail.com>
Co-authored-by: Kamran Ahmed <kamranahmed.se@gmail.com>
Co-authored-by: andreluis-oliveira <andreluis-oliveira@users.noreply.github.com>
pull/6778/head
André Oliveira 3 months ago committed by GitHub
parent 4576dfcbf3
commit a26e391f41
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 8
      src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md
  2. 19
      src/data/roadmaps/cyber-security/content/smime@9rmDvycXFcsGOq3v-_ziD.md

@ -5,10 +5,12 @@ It does this by monitoring, filtering, collecting, normalizing, and correlating
Organizations leverage SIEMs to monitor and thus identify, protect, and respond to potential threats in their environment. Organizations leverage SIEMs to monitor and thus identify, protect, and respond to potential threats in their environment.
For hands-on experience, you should consider setting up a SIEM in your own environment. A common stack widely used for various purposes across the industry is the ELK-stack. For hands-on experience, you should consider setting up a SIEM in your own environment. There are some commercial tools that you can try out for free, and there are also open source alternatives, such as Wazuh or LevelBlue OSSIM (AlienVault).
Visit the following resources to learn more: Visit the following resources to learn more:
- [@article@Security 101: What is a SIEM? - Microsoft](https://www.microsoft.com/security/business/security-101/what-is-siem) - [@article@Security 101: What is a SIEM? - Microsoft](https://www.microsoft.com/security/business/security-101/what-is-siem)
- [@article@Using the ELK stack for SIEM](https://logz.io/blog/elk-siem/) - [@video@SIEM Explained - Professor Messer](https://www.youtube.com/watch?v=JEcETdy5WxU)
- [@video@Build a powerful home SIEM](https://www.youtube.com/watch?v=2XLzMb9oZBI) - [@video@Wazuh | Open source SIEM](https://www.youtube.com/watch?v=3CaG2GI1kn0)
- [@video@Splunk | The Complete Beginner Tutorial](https://www.youtube.com/playlist?list=PLY2f3p7xyMiTUbUo0A_lBFEwj6KdH0nFy)
- [@video@Elastic Security | Build a powerful home SIEM](https://www.youtube.com/watch?v=2XLzMb9oZBI)

@ -0,0 +1,19 @@
# S/MIME
**S/MIME** stands for Secure/Multipurpose Internet Mail Extensions, and it is a cryptographic protocol that enhances the security of business emails through encryption and digital signatures. It allows users to encrypt emails and digitally sign them to verify the sender’s identity.
## Advantages of S/MIME
- **Verification**: Confirms the sender’s identity.
- **Confidentiality**: Protects the content from unauthorized access.
- **Integrity**: Ensures the message has not been altered.
- **Secure Data Transfer**: Safely transmits files like images, audio, videos, and documents.
- **Non-repudiation**: Prevents the sender from denying the origin of the message.
## How S/MIME Works
S/MIME enables the transmission of non-ASCII data via the Secure Mail Transfer Protocol (SMTP). It securely sends various data files, including music, video, and images, using encryption. Data encrypted with a public key can only be decrypted by the recipient’s private key, ensuring secure end-to-end communication.
Loading…
Cancel
Save