From a33018de1d257897fbb03d71f8f23326a0486f87 Mon Sep 17 00:00:00 2001 From: Vedansh Date: Sun, 27 Apr 2025 18:38:05 +0530 Subject: [PATCH] fix(cybersecurity): resource link adjustments (#8544) * adjustments. * Squashed commit of the following: commit ab55b0972edca0ea36bd87e93a54e38750b15208 Author: Vedansh Date: Tue Apr 22 17:32:07 2025 +0530 adjust remaining topics. * Update src/data/roadmaps/cyber-security/content/dig@D2YYv1iTRGken75sHO0Gt.md --------- Co-authored-by: Arik Chakma --- .../content/default-gateway@5rKaFtjYx0n2iF8uTLs8X.md | 2 +- .../cyber-security/content/dig@D2YYv1iTRGken75sHO0Gt.md | 3 +-- .../cyber-security/content/dlp@iolsTC-63d_1wzKGul-cT.md | 3 ++- .../cyber-security/content/dmz@gfpvDQz61I3zTB7tGu7vp.md | 2 +- .../content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md | 5 ++--- .../cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md | 4 ++-- .../cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md | 4 +++- .../content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md | 3 ++- .../content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md | 2 +- .../cyber-security/content/esxi@BisNooct1vJDKaBKsGR7_.md | 2 +- .../content/event-logs@KbFwL--xF-eYjGy8PZdrM.md | 2 +- .../false-negative--false-positive@XwRCZf-yHJsXVjaRfb3R4.md | 1 + .../firewall--nextgen-firewall@tWDo5R3KU5KOjDdtv801x.md | 2 +- .../content/firewall-logs@np0PwKy-EvIa_f_LC6Eem.md | 4 ++-- .../cyber-security/content/ftp@ftYYMxRpVer-jgSswHLNa.md | 1 + .../content/fundamental-it-skills@oimYzZYFXKjgvc7D4c-2u.md | 4 +++- .../cyber-security/content/gcp@tOLA5QPKi6LHl1ljsOMwX.md | 3 ++- .../cyber-security/content/giac@ZiUT-lyIBfHTzG-dwSy96.md | 3 ++- .../cyber-security/content/go@jehVvdz8BnruKjqHMKu5v.md | 4 ++-- .../content/google-drive@fTZ4PqH-AMhYA_65w4wFO.md | 2 +- .../content/google-suite@IOK_FluAv34j3Tj_NvwdO.md | 2 +- .../cyber-security/content/gpen@t4h9rEKWz5Us0qJKXhxlX.md | 2 +- .../cyber-security/content/gsec@nlmATCTgHoIoMcEOW8bUW.md | 2 +- .../cyber-security/content/gwapt@rwniCTWfYpKP5gi02Pa9f.md | 2 +- 24 files changed, 36 insertions(+), 28 deletions(-) diff --git a/src/data/roadmaps/cyber-security/content/default-gateway@5rKaFtjYx0n2iF8uTLs8X.md b/src/data/roadmaps/cyber-security/content/default-gateway@5rKaFtjYx0n2iF8uTLs8X.md index 1e93ca9bf..3513e71e9 100644 --- a/src/data/roadmaps/cyber-security/content/default-gateway@5rKaFtjYx0n2iF8uTLs8X.md +++ b/src/data/roadmaps/cyber-security/content/default-gateway@5rKaFtjYx0n2iF8uTLs8X.md @@ -4,5 +4,5 @@ A default gateway is a network node, typically a router or a firewall, that serv Learn more from the following resources: -- [@article@What is a default gateway?](https://nordvpn.com/blog/what-is-a-default-gateway/?srsltid=AfmBOoosi5g4acnT9Gv_B86FMGr72hWDhk8J-4jr1HvxPCSu96FikCyw) +- [@article@What is a Default Gateway?](https://nordvpn.com/blog/what-is-a-default-gateway/?srsltid=AfmBOoosi5g4acnT9Gv_B86FMGr72hWDhk8J-4jr1HvxPCSu96FikCyw) - [@video@Routers and Default Gateways](https://www.youtube.com/watch?v=JOomC1wFrbU) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/dig@D2YYv1iTRGken75sHO0Gt.md b/src/data/roadmaps/cyber-security/content/dig@D2YYv1iTRGken75sHO0Gt.md index ef43082f7..935d08569 100644 --- a/src/data/roadmaps/cyber-security/content/dig@D2YYv1iTRGken75sHO0Gt.md +++ b/src/data/roadmaps/cyber-security/content/dig@D2YYv1iTRGken75sHO0Gt.md @@ -4,5 +4,4 @@ Learn more from the following resources: -- [@video@How to look up DNS records with dig](https://www.youtube.com/watch?v=3AOKomsmeUY) -- [@article@How to use Linux dig command](https://www.google.com/search?client=firefox-b-d&q=linux+dig+command) \ No newline at end of file +- [@video@How to look up DNS records with dig](https://www.youtube.com/watch?v=3AOKomsmeUY) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/dlp@iolsTC-63d_1wzKGul-cT.md b/src/data/roadmaps/cyber-security/content/dlp@iolsTC-63d_1wzKGul-cT.md index 23cf1237f..7b19d0434 100644 --- a/src/data/roadmaps/cyber-security/content/dlp@iolsTC-63d_1wzKGul-cT.md +++ b/src/data/roadmaps/cyber-security/content/dlp@iolsTC-63d_1wzKGul-cT.md @@ -3,5 +3,6 @@ Data Loss Prevention (DLP) refers to a set of strategies, tools, and processes used by organizations to ensure that sensitive data is not lost, accessed, or misused by unauthorized users. DLP solutions monitor, detect, and block the movement of critical information outside an organization’s network, helping to prevent data breaches, leaks, and other security incidents. Visit the following resources to learn more: -- [@article@What is data loss prevention (DLP)?](https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP) + - [@article@What is DLP (data loss prevention)?](https://www.cloudflare.com/es-es/learning/access-management/what-is-dlp/) +- [@article@What is Data Loss Prevention (DLP)?](https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP) diff --git a/src/data/roadmaps/cyber-security/content/dmz@gfpvDQz61I3zTB7tGu7vp.md b/src/data/roadmaps/cyber-security/content/dmz@gfpvDQz61I3zTB7tGu7vp.md index 433e4629d..aaa4c902e 100644 --- a/src/data/roadmaps/cyber-security/content/dmz@gfpvDQz61I3zTB7tGu7vp.md +++ b/src/data/roadmaps/cyber-security/content/dmz@gfpvDQz61I3zTB7tGu7vp.md @@ -4,5 +4,5 @@ A **DMZ**, also known as a **Demilitarized Zone**, is a specific part of a netwo Learn more from the following resources: -- [@article@What is a DMZ network?](https://www.fortinet.com/resources/cyberglossary/what-is-dmz) +- [@article@What is a DMZ Network?](https://www.fortinet.com/resources/cyberglossary/what-is-dmz) - [@video@DMZ explained](https://www.youtube.com/watch?v=48QZfBeU4ps) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md b/src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md index f46313fe9..61b897e54 100644 --- a/src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md +++ b/src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md @@ -1,10 +1,9 @@ -# DNS(Domain Name System) Poisoning/DNS Spoofing/DNS Cache Poisoning +# DNS Poisoning/DNS Spoofing/DNS Cache Poisoning DNS spoofing or DNS cache poisoning, occurs when fake information is inserted into a DNS server’s cache.This causes DNS queries to return incorrect IP addresses, directing users to the wrong websites. Hackers exploit this to reroute traffic to malicious sites. The issue persists until the cached information is corrected.When the cache is poisoned, it misdirects traffic until the incorrect information is fixed. This technique exploits vulnerabilities in the DNS system and can spread to other servers, causing widespread issues. Visit the following resources to learn more: -- [@article@What is DNS cache poisoning? | DNS spoofing](https://www.cloudflare.com/learning/dns/dns-cache-poisoning/) - +- [@article@What is DNS Cache Poisoning? | DNS spoofing](https://www.cloudflare.com/learning/dns/dns-cache-poisoning/) - [@article@What Is DNS Poisoning?](https://www.fortinet.com/resources/cyberglossary/dns-poisoning) - [@article@DNS Poisoning (DNS Spoofing): Definition, Technique & Defense](https://www.okta.com/identity-101/dns-poisoning/) diff --git a/src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md b/src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md index 2cdc9d0ff..d11ec548e 100644 --- a/src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md +++ b/src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md @@ -4,6 +4,6 @@ The Domain Name System (DNS) is a fundamental protocol of the internet that tran Learn more from the following resources: +- [@article@What is DNS?](https://www.cloudflare.com/en-gb/learning/dns/what-is-dns/) - [@video@DNS Explained in 100 Seconds](https://www.youtube.com/watch?v=UVR9lhUGAyU) -- [@video@What is DNS?](https://www.youtube.com/watch?v=nyH0nYhMW9M) -- [@article@What is DNS?](https://www.cloudflare.com/en-gb/learning/dns/what-is-dns/) \ No newline at end of file +- [@video@What is DNS?](https://www.youtube.com/watch?v=nyH0nYhMW9M) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md b/src/data/roadmaps/cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md index 935ef8b95..001684479 100644 --- a/src/data/roadmaps/cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md +++ b/src/data/roadmaps/cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md @@ -4,4 +4,6 @@ Dropbox is a widely used cloud storage service that allows you to store, access, Learn more from the following resources: -- [@official@Dropbox Website](https://dropbox.com) \ No newline at end of file +- [@official@Dropbox](https://dropbox.com) +- [@official@How to Use Dropbox - a guide to your account](https://learn.dropbox.com/self-guided-learning/dropbox-fundamentals-course/how-to-use-dropbox) +- [@video@Dropbox Tutorial for Beginners](https://www.youtube.com/watch?v=b0Nk9muiUcQ) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md b/src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md index d3223c981..3081ee36a 100644 --- a/src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md +++ b/src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md @@ -4,5 +4,6 @@ Dumpster Diving in the context of cybersecurity refers to the practice of search Visit the following resources to learn more: +- [@article@Dumpster Diving](https://www.techtarget.com/searchsecurity/definition/dumpster-diving) - [@article@What is Dumpster Diving](https://powerdmarc.com/dumpster-diving-in-cybersecurity/) -- [@video@Dumpster diving for sensitive information](https://www.youtube.com/watch?v=Pom86gq4mk4) \ No newline at end of file +- [@video@Dumpster Diving for Sensitive Information](https://www.youtube.com/watch?v=Pom86gq4mk4) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md b/src/data/roadmaps/cyber-security/content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md index a28e64011..d79ef60eb 100644 --- a/src/data/roadmaps/cyber-security/content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md +++ b/src/data/roadmaps/cyber-security/content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md @@ -5,4 +5,4 @@ Endpoint security focuses on protecting individual devices that connect to a net Learn more from the following resources: - [@article@What is Endpoint Security?](https://www.crowdstrike.com/cybersecurity-101/endpoint-security/) -- [@video@Endpoints are the IT frontdoor - Gaurd them!](https://www.youtube.com/watch?v=Njqid_JpqTs) \ No newline at end of file +- [@video@Endpoints are the IT Frontdoor - Guard them!](https://www.youtube.com/watch?v=Njqid_JpqTs) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/esxi@BisNooct1vJDKaBKsGR7_.md b/src/data/roadmaps/cyber-security/content/esxi@BisNooct1vJDKaBKsGR7_.md index de4466dcb..0fbae7227 100644 --- a/src/data/roadmaps/cyber-security/content/esxi@BisNooct1vJDKaBKsGR7_.md +++ b/src/data/roadmaps/cyber-security/content/esxi@BisNooct1vJDKaBKsGR7_.md @@ -1,4 +1,4 @@ -# esxi +# ESXi VMware ESXi is a Type 1 hypervisor and the core building block for VMware's virtualization technology. It represents a bare-metal hypervisor, which means it is installed directly onto your physical server's hardware, without the need for a supporting operating system. This results in elevated performance, reduced overhead, and efficient resource allocation. diff --git a/src/data/roadmaps/cyber-security/content/event-logs@KbFwL--xF-eYjGy8PZdrM.md b/src/data/roadmaps/cyber-security/content/event-logs@KbFwL--xF-eYjGy8PZdrM.md index 55a99a41b..f5228f106 100644 --- a/src/data/roadmaps/cyber-security/content/event-logs@KbFwL--xF-eYjGy8PZdrM.md +++ b/src/data/roadmaps/cyber-security/content/event-logs@KbFwL--xF-eYjGy8PZdrM.md @@ -4,5 +4,5 @@ Event logs are digital records that document activities and occurrences within c Learn more from the following resources: -- [@article@What is an event log?](https://www.crowdstrike.com/cybersecurity-101/observability/event-log/) +- [@article@What is an Event Log?](https://www.crowdstrike.com/cybersecurity-101/observability/event-log/) - [@article@What are event logs and why do they matter?](https://www.blumira.com/blog/what-are-event-logs-and-why-do-they-matter) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/false-negative--false-positive@XwRCZf-yHJsXVjaRfb3R4.md b/src/data/roadmaps/cyber-security/content/false-negative--false-positive@XwRCZf-yHJsXVjaRfb3R4.md index 3104cb163..5d91b885a 100644 --- a/src/data/roadmaps/cyber-security/content/false-negative--false-positive@XwRCZf-yHJsXVjaRfb3R4.md +++ b/src/data/roadmaps/cyber-security/content/false-negative--false-positive@XwRCZf-yHJsXVjaRfb3R4.md @@ -8,5 +8,6 @@ To have an effective cybersecurity system, security professionals aim to maximiz Learn more from the following resources: +- [@article@Difference Between False Positive and False Negative](https://www.differencebetween.net/science/difference-between-false-positive-and-false-negative/) - [@video@What is a false positive virus?](https://www.youtube.com/watch?v=WrcAGBvIT14) - [@video@False positives and false negatives](https://www.youtube.com/watch?v=bUNBzMnfHLw) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/firewall--nextgen-firewall@tWDo5R3KU5KOjDdtv801x.md b/src/data/roadmaps/cyber-security/content/firewall--nextgen-firewall@tWDo5R3KU5KOjDdtv801x.md index 33b45b658..3e1a989ae 100644 --- a/src/data/roadmaps/cyber-security/content/firewall--nextgen-firewall@tWDo5R3KU5KOjDdtv801x.md +++ b/src/data/roadmaps/cyber-security/content/firewall--nextgen-firewall@tWDo5R3KU5KOjDdtv801x.md @@ -6,5 +6,5 @@ Next-generation firewalls (NGFWs) build upon this foundation, offering more adva Learn more from the following resources: -- [@article@What is a firewall?](https://www.kaspersky.com/resource-center/definitions/firewall) +- [@article@What is a Firewall?](https://www.kaspersky.com/resource-center/definitions/firewall) - [@article@What is a next-generation firewall (NGFW)?](https://www.cloudflare.com/en-gb/learning/security/what-is-next-generation-firewall-ngfw/) diff --git a/src/data/roadmaps/cyber-security/content/firewall-logs@np0PwKy-EvIa_f_LC6Eem.md b/src/data/roadmaps/cyber-security/content/firewall-logs@np0PwKy-EvIa_f_LC6Eem.md index 6b3b158dd..dfdf8a0cb 100644 --- a/src/data/roadmaps/cyber-security/content/firewall-logs@np0PwKy-EvIa_f_LC6Eem.md +++ b/src/data/roadmaps/cyber-security/content/firewall-logs@np0PwKy-EvIa_f_LC6Eem.md @@ -4,5 +4,5 @@ Firewall logs are detailed records of network traffic and security events captur Learn more from the following resources: -- [@article@What is firewall logging and why is it important?](https://cybriant.com/what-is-firewall-logging-and-why-is-it-important/) -- [@video@Reviewing firewall logs](https://www.youtube.com/watch?v=XiJ30f8V_T4) \ No newline at end of file +- [@article@What is Firewall Logging and Why is it Important?](https://cybriant.com/what-is-firewall-logging-and-why-is-it-important/) +- [@video@Reviewing Firewall Logs](https://www.youtube.com/watch?v=XiJ30f8V_T4) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/ftp@ftYYMxRpVer-jgSswHLNa.md b/src/data/roadmaps/cyber-security/content/ftp@ftYYMxRpVer-jgSswHLNa.md index 7a93e5958..b8d5eb939 100644 --- a/src/data/roadmaps/cyber-security/content/ftp@ftYYMxRpVer-jgSswHLNa.md +++ b/src/data/roadmaps/cyber-security/content/ftp@ftYYMxRpVer-jgSswHLNa.md @@ -6,5 +6,6 @@ FTP operates on a client-server model, where one computer acts as the client (th Learn more from the following resources: +- [@article@File Transfer Protocol](https://en.wikipedia.org/wiki/File_Transfer_Protocol) - [@video@What is FTP?](https://www.youtube.com/watch?v=HI0Oh4NJqcI) - [@article@FTP meaning and uses](https://www.investopedia.com/terms/f/ftp-file-transfer-protocol.asp) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/fundamental-it-skills@oimYzZYFXKjgvc7D4c-2u.md b/src/data/roadmaps/cyber-security/content/fundamental-it-skills@oimYzZYFXKjgvc7D4c-2u.md index eef744c73..e3cf7e071 100644 --- a/src/data/roadmaps/cyber-security/content/fundamental-it-skills@oimYzZYFXKjgvc7D4c-2u.md +++ b/src/data/roadmaps/cyber-security/content/fundamental-it-skills@oimYzZYFXKjgvc7D4c-2u.md @@ -4,4 +4,6 @@ Fundamental IT skills form the backbone of cybersecurity proficiency and encompa Learn more from the following resources: -- [@article@Top 10 in demand IT skills](https://www.comptia.org/blog/top-it-skills-in-demand) +- [@article@7 In-Demand IT Skills to Boost Your Resume in 2025](https://www.coursera.org/articles/key-it-skills-for-your-career) +- [@article@Top 10 in Demand IT Skills](https://www.comptia.org/blog/top-it-skills-in-demand) +- [@article@IT Skills: Definition and Examples](https://www.indeed.com/career-advice/finding-a-job/it-skills) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/gcp@tOLA5QPKi6LHl1ljsOMwX.md b/src/data/roadmaps/cyber-security/content/gcp@tOLA5QPKi6LHl1ljsOMwX.md index ad4759dc6..38f418ad4 100644 --- a/src/data/roadmaps/cyber-security/content/gcp@tOLA5QPKi6LHl1ljsOMwX.md +++ b/src/data/roadmaps/cyber-security/content/gcp@tOLA5QPKi6LHl1ljsOMwX.md @@ -5,4 +5,5 @@ Google Cloud Platform (GCP) is a collection of cloud computing services offered Learn more from the following resources: - [@official@Google Cloud Platform](https://cloud.google.com) -- [@course@Google Cloud Platform Video Course](https://www.youtube.com/watch?v=fZOz13joN0o) \ No newline at end of file +- [@official@Cloud Computing, Hosting Services, and APIs](https://cloud.google.com/gcp) +- [@video@Google Cloud Platform Video Course](https://www.youtube.com/watch?v=fZOz13joN0o) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/giac@ZiUT-lyIBfHTzG-dwSy96.md b/src/data/roadmaps/cyber-security/content/giac@ZiUT-lyIBfHTzG-dwSy96.md index 794fcd297..91eddeec1 100644 --- a/src/data/roadmaps/cyber-security/content/giac@ZiUT-lyIBfHTzG-dwSy96.md +++ b/src/data/roadmaps/cyber-security/content/giac@ZiUT-lyIBfHTzG-dwSy96.md @@ -4,4 +4,5 @@ GIAC is a globally recognized organization that provides certifications for info Learn more from the following resources: -- [@official@GIAC Website](https://www.giac.org/) \ No newline at end of file +- [@official@GIAC](https://www.giac.org/) +- [@official@Get Certified - GIAC](https://www.giac.org/get-certified/?msc=main-nav) diff --git a/src/data/roadmaps/cyber-security/content/go@jehVvdz8BnruKjqHMKu5v.md b/src/data/roadmaps/cyber-security/content/go@jehVvdz8BnruKjqHMKu5v.md index 8cc70c763..1f9c88563 100644 --- a/src/data/roadmaps/cyber-security/content/go@jehVvdz8BnruKjqHMKu5v.md +++ b/src/data/roadmaps/cyber-security/content/go@jehVvdz8BnruKjqHMKu5v.md @@ -4,6 +4,6 @@ Go, also known as Golang, is an open-source programming language created by Goog Learn more from the following resources: -- [@roadmap@Go Roadmap](https://roadmap.sh/golang) +- [@roadmap@Visit Dedicated Go Roadmap](https://roadmap.sh/golang) - [@video@Go in 100 seconds](https://www.youtube.com/watch?v=446E-r0rXHI) -- [@course@Go tutorial for beginners](https://www.youtube.com/watch?v=yyUHQIec83I) +- [@video@Go Tutorial for beginners](https://www.youtube.com/watch?v=yyUHQIec83I) diff --git a/src/data/roadmaps/cyber-security/content/google-drive@fTZ4PqH-AMhYA_65w4wFO.md b/src/data/roadmaps/cyber-security/content/google-drive@fTZ4PqH-AMhYA_65w4wFO.md index 09dcb091c..08fea7184 100644 --- a/src/data/roadmaps/cyber-security/content/google-drive@fTZ4PqH-AMhYA_65w4wFO.md +++ b/src/data/roadmaps/cyber-security/content/google-drive@fTZ4PqH-AMhYA_65w4wFO.md @@ -4,4 +4,4 @@ Google Drive is a cloud-based storage solution provided by Google, which offers Learn more from the following resources: -- [@official@Google Drive Website](https://drive.google.com) \ No newline at end of file +- [@official@Google Drive](https://drive.google.com) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/google-suite@IOK_FluAv34j3Tj_NvwdO.md b/src/data/roadmaps/cyber-security/content/google-suite@IOK_FluAv34j3Tj_NvwdO.md index af45a9046..ee116848f 100644 --- a/src/data/roadmaps/cyber-security/content/google-suite@IOK_FluAv34j3Tj_NvwdO.md +++ b/src/data/roadmaps/cyber-security/content/google-suite@IOK_FluAv34j3Tj_NvwdO.md @@ -4,4 +4,4 @@ Google Workspace, formerly known as G Suite, is a collection of cloud-based prod Learn more from the following resources: -- [@official@Google Workspace Website](https://workspace.google.com/intl/en_uk/) \ No newline at end of file +- [@official@Google Workspace](https://workspace.google.com/intl/en_uk/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/gpen@t4h9rEKWz5Us0qJKXhxlX.md b/src/data/roadmaps/cyber-security/content/gpen@t4h9rEKWz5Us0qJKXhxlX.md index 3993f80cd..9369ba315 100644 --- a/src/data/roadmaps/cyber-security/content/gpen@t4h9rEKWz5Us0qJKXhxlX.md +++ b/src/data/roadmaps/cyber-security/content/gpen@t4h9rEKWz5Us0qJKXhxlX.md @@ -4,5 +4,5 @@ The GIAC Penetration Tester (GPEN) certification is an advanced-level credential Learn more from the following resources: -- [@official@GPEN Certification Website](https://www.giac.org/certifications/penetration-tester-gpen/) +- [@official@GPEN Certification](https://www.giac.org/certifications/penetration-tester-gpen/) - [@article@What is the GPEN Certification?](https://hackernoon.com/what-is-the-giac-penetration-tester-gpen-certification) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/gsec@nlmATCTgHoIoMcEOW8bUW.md b/src/data/roadmaps/cyber-security/content/gsec@nlmATCTgHoIoMcEOW8bUW.md index a586e3ea6..010fee04b 100644 --- a/src/data/roadmaps/cyber-security/content/gsec@nlmATCTgHoIoMcEOW8bUW.md +++ b/src/data/roadmaps/cyber-security/content/gsec@nlmATCTgHoIoMcEOW8bUW.md @@ -4,4 +4,4 @@ The GIAC Security Essentials Certification (GSEC) is an advanced cybersecurity c Learn more from the following resources: -- [@official@GSEC Certification Website](https://www.giac.org/certifications/security-essentials-gsec/) \ No newline at end of file +- [@official@GSEC Certification](https://www.giac.org/certifications/security-essentials-gsec/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/gwapt@rwniCTWfYpKP5gi02Pa9f.md b/src/data/roadmaps/cyber-security/content/gwapt@rwniCTWfYpKP5gi02Pa9f.md index 43638675c..7060a8a4b 100644 --- a/src/data/roadmaps/cyber-security/content/gwapt@rwniCTWfYpKP5gi02Pa9f.md +++ b/src/data/roadmaps/cyber-security/content/gwapt@rwniCTWfYpKP5gi02Pa9f.md @@ -4,4 +4,4 @@ The GIAC Web Application Penetration Tester (GWAPT) certification validates an i Learn more from the following resources: -- [@official@GWAPT Certification Website](https://www.giac.org/certifications/web-application-penetration-tester-gwapt/) +- [@official@GWAPT Certification](https://www.giac.org/certifications/web-application-penetration-tester-gwapt/)