fix(cybersecurity): resource link adjustments (#8544)

* adjustments.

* Squashed commit of the following:

commit ab55b0972edca0ea36bd87e93a54e38750b15208
Author: Vedansh <superuser.ntsystems@outlook.com>
Date:   Tue Apr 22 17:32:07 2025 +0530

    adjust remaining topics.

* Update src/data/roadmaps/cyber-security/content/dig@D2YYv1iTRGken75sHO0Gt.md

---------

Co-authored-by: Arik Chakma <arikchangma@gmail.com>
master
Vedansh 2 days ago committed by GitHub
parent c236e863a0
commit a33018de1d
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 2
      src/data/roadmaps/cyber-security/content/default-gateway@5rKaFtjYx0n2iF8uTLs8X.md
  2. 1
      src/data/roadmaps/cyber-security/content/dig@D2YYv1iTRGken75sHO0Gt.md
  3. 3
      src/data/roadmaps/cyber-security/content/dlp@iolsTC-63d_1wzKGul-cT.md
  4. 2
      src/data/roadmaps/cyber-security/content/dmz@gfpvDQz61I3zTB7tGu7vp.md
  5. 5
      src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md
  6. 2
      src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md
  7. 4
      src/data/roadmaps/cyber-security/content/dropbox@9OastXVfiG1YRMm68ecnn.md
  8. 3
      src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md
  9. 2
      src/data/roadmaps/cyber-security/content/endpoint-security@LEgJtu1GZKOtoAXyOGWLE.md
  10. 2
      src/data/roadmaps/cyber-security/content/esxi@BisNooct1vJDKaBKsGR7_.md
  11. 2
      src/data/roadmaps/cyber-security/content/event-logs@KbFwL--xF-eYjGy8PZdrM.md
  12. 1
      src/data/roadmaps/cyber-security/content/false-negative--false-positive@XwRCZf-yHJsXVjaRfb3R4.md
  13. 2
      src/data/roadmaps/cyber-security/content/firewall--nextgen-firewall@tWDo5R3KU5KOjDdtv801x.md
  14. 4
      src/data/roadmaps/cyber-security/content/firewall-logs@np0PwKy-EvIa_f_LC6Eem.md
  15. 1
      src/data/roadmaps/cyber-security/content/ftp@ftYYMxRpVer-jgSswHLNa.md
  16. 4
      src/data/roadmaps/cyber-security/content/fundamental-it-skills@oimYzZYFXKjgvc7D4c-2u.md
  17. 3
      src/data/roadmaps/cyber-security/content/gcp@tOLA5QPKi6LHl1ljsOMwX.md
  18. 3
      src/data/roadmaps/cyber-security/content/giac@ZiUT-lyIBfHTzG-dwSy96.md
  19. 4
      src/data/roadmaps/cyber-security/content/go@jehVvdz8BnruKjqHMKu5v.md
  20. 2
      src/data/roadmaps/cyber-security/content/google-drive@fTZ4PqH-AMhYA_65w4wFO.md
  21. 2
      src/data/roadmaps/cyber-security/content/google-suite@IOK_FluAv34j3Tj_NvwdO.md
  22. 2
      src/data/roadmaps/cyber-security/content/gpen@t4h9rEKWz5Us0qJKXhxlX.md
  23. 2
      src/data/roadmaps/cyber-security/content/gsec@nlmATCTgHoIoMcEOW8bUW.md
  24. 2
      src/data/roadmaps/cyber-security/content/gwapt@rwniCTWfYpKP5gi02Pa9f.md

@ -4,5 +4,5 @@ A default gateway is a network node, typically a router or a firewall, that serv
Learn more from the following resources:
- [@article@What is a default gateway?](https://nordvpn.com/blog/what-is-a-default-gateway/?srsltid=AfmBOoosi5g4acnT9Gv_B86FMGr72hWDhk8J-4jr1HvxPCSu96FikCyw)
- [@article@What is a Default Gateway?](https://nordvpn.com/blog/what-is-a-default-gateway/?srsltid=AfmBOoosi5g4acnT9Gv_B86FMGr72hWDhk8J-4jr1HvxPCSu96FikCyw)
- [@video@Routers and Default Gateways](https://www.youtube.com/watch?v=JOomC1wFrbU)

@ -5,4 +5,3 @@
Learn more from the following resources:
- [@video@How to look up DNS records with dig](https://www.youtube.com/watch?v=3AOKomsmeUY)
- [@article@How to use Linux dig command](https://www.google.com/search?client=firefox-b-d&q=linux+dig+command)

@ -3,5 +3,6 @@
Data Loss Prevention (DLP) refers to a set of strategies, tools, and processes used by organizations to ensure that sensitive data is not lost, accessed, or misused by unauthorized users. DLP solutions monitor, detect, and block the movement of critical information outside an organization’s network, helping to prevent data breaches, leaks, and other security incidents.
Visit the following resources to learn more:
- [@article@What is data loss prevention (DLP)?](https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP)
- [@article@What is DLP (data loss prevention)?](https://www.cloudflare.com/es-es/learning/access-management/what-is-dlp/)
- [@article@What is Data Loss Prevention (DLP)?](https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP)

@ -4,5 +4,5 @@ A **DMZ**, also known as a **Demilitarized Zone**, is a specific part of a netwo
Learn more from the following resources:
- [@article@What is a DMZ network?](https://www.fortinet.com/resources/cyberglossary/what-is-dmz)
- [@article@What is a DMZ Network?](https://www.fortinet.com/resources/cyberglossary/what-is-dmz)
- [@video@DMZ explained](https://www.youtube.com/watch?v=48QZfBeU4ps)

@ -1,10 +1,9 @@
# DNS(Domain Name System) Poisoning/DNS Spoofing/DNS Cache Poisoning
# DNS Poisoning/DNS Spoofing/DNS Cache Poisoning
DNS spoofing or DNS cache poisoning, occurs when fake information is inserted into a DNS server’s cache.This causes DNS queries to return incorrect IP addresses, directing users to the wrong websites. Hackers exploit this to reroute traffic to malicious sites. The issue persists until the cached information is corrected.When the cache is poisoned, it misdirects traffic until the incorrect information is fixed. This technique exploits vulnerabilities in the DNS system and can spread to other servers, causing widespread issues.
Visit the following resources to learn more:
- [@article@What is DNS cache poisoning? | DNS spoofing](https://www.cloudflare.com/learning/dns/dns-cache-poisoning/)
- [@article@What is DNS Cache Poisoning? | DNS spoofing](https://www.cloudflare.com/learning/dns/dns-cache-poisoning/)
- [@article@What Is DNS Poisoning?](https://www.fortinet.com/resources/cyberglossary/dns-poisoning)
- [@article@DNS Poisoning (DNS Spoofing): Definition, Technique & Defense](https://www.okta.com/identity-101/dns-poisoning/)

@ -4,6 +4,6 @@ The Domain Name System (DNS) is a fundamental protocol of the internet that tran
Learn more from the following resources:
- [@article@What is DNS?](https://www.cloudflare.com/en-gb/learning/dns/what-is-dns/)
- [@video@DNS Explained in 100 Seconds](https://www.youtube.com/watch?v=UVR9lhUGAyU)
- [@video@What is DNS?](https://www.youtube.com/watch?v=nyH0nYhMW9M)
- [@article@What is DNS?](https://www.cloudflare.com/en-gb/learning/dns/what-is-dns/)

@ -4,4 +4,6 @@ Dropbox is a widely used cloud storage service that allows you to store, access,
Learn more from the following resources:
- [@official@Dropbox Website](https://dropbox.com)
- [@official@Dropbox](https://dropbox.com)
- [@official@How to Use Dropbox - a guide to your account](https://learn.dropbox.com/self-guided-learning/dropbox-fundamentals-course/how-to-use-dropbox)
- [@video@Dropbox Tutorial for Beginners](https://www.youtube.com/watch?v=b0Nk9muiUcQ)

@ -4,5 +4,6 @@ Dumpster Diving in the context of cybersecurity refers to the practice of search
Visit the following resources to learn more:
- [@article@Dumpster Diving](https://www.techtarget.com/searchsecurity/definition/dumpster-diving)
- [@article@What is Dumpster Diving](https://powerdmarc.com/dumpster-diving-in-cybersecurity/)
- [@video@Dumpster diving for sensitive information](https://www.youtube.com/watch?v=Pom86gq4mk4)
- [@video@Dumpster Diving for Sensitive Information](https://www.youtube.com/watch?v=Pom86gq4mk4)

@ -5,4 +5,4 @@ Endpoint security focuses on protecting individual devices that connect to a net
Learn more from the following resources:
- [@article@What is Endpoint Security?](https://www.crowdstrike.com/cybersecurity-101/endpoint-security/)
- [@video@Endpoints are the IT frontdoor - Gaurd them!](https://www.youtube.com/watch?v=Njqid_JpqTs)
- [@video@Endpoints are the IT Frontdoor - Guard them!](https://www.youtube.com/watch?v=Njqid_JpqTs)

@ -1,4 +1,4 @@
# esxi
# ESXi
VMware ESXi is a Type 1 hypervisor and the core building block for VMware's virtualization technology. It represents a bare-metal hypervisor, which means it is installed directly onto your physical server's hardware, without the need for a supporting operating system. This results in elevated performance, reduced overhead, and efficient resource allocation.

@ -4,5 +4,5 @@ Event logs are digital records that document activities and occurrences within c
Learn more from the following resources:
- [@article@What is an event log?](https://www.crowdstrike.com/cybersecurity-101/observability/event-log/)
- [@article@What is an Event Log?](https://www.crowdstrike.com/cybersecurity-101/observability/event-log/)
- [@article@What are event logs and why do they matter?](https://www.blumira.com/blog/what-are-event-logs-and-why-do-they-matter)

@ -8,5 +8,6 @@ To have an effective cybersecurity system, security professionals aim to maximiz
Learn more from the following resources:
- [@article@Difference Between False Positive and False Negative](https://www.differencebetween.net/science/difference-between-false-positive-and-false-negative/)
- [@video@What is a false positive virus?](https://www.youtube.com/watch?v=WrcAGBvIT14)
- [@video@False positives and false negatives](https://www.youtube.com/watch?v=bUNBzMnfHLw)

@ -6,5 +6,5 @@ Next-generation firewalls (NGFWs) build upon this foundation, offering more adva
Learn more from the following resources:
- [@article@What is a firewall?](https://www.kaspersky.com/resource-center/definitions/firewall)
- [@article@What is a Firewall?](https://www.kaspersky.com/resource-center/definitions/firewall)
- [@article@What is a next-generation firewall (NGFW)?](https://www.cloudflare.com/en-gb/learning/security/what-is-next-generation-firewall-ngfw/)

@ -4,5 +4,5 @@ Firewall logs are detailed records of network traffic and security events captur
Learn more from the following resources:
- [@article@What is firewall logging and why is it important?](https://cybriant.com/what-is-firewall-logging-and-why-is-it-important/)
- [@video@Reviewing firewall logs](https://www.youtube.com/watch?v=XiJ30f8V_T4)
- [@article@What is Firewall Logging and Why is it Important?](https://cybriant.com/what-is-firewall-logging-and-why-is-it-important/)
- [@video@Reviewing Firewall Logs](https://www.youtube.com/watch?v=XiJ30f8V_T4)

@ -6,5 +6,6 @@ FTP operates on a client-server model, where one computer acts as the client (th
Learn more from the following resources:
- [@article@File Transfer Protocol](https://en.wikipedia.org/wiki/File_Transfer_Protocol)
- [@video@What is FTP?](https://www.youtube.com/watch?v=HI0Oh4NJqcI)
- [@article@FTP meaning and uses](https://www.investopedia.com/terms/f/ftp-file-transfer-protocol.asp)

@ -4,4 +4,6 @@ Fundamental IT skills form the backbone of cybersecurity proficiency and encompa
Learn more from the following resources:
- [@article@Top 10 in demand IT skills](https://www.comptia.org/blog/top-it-skills-in-demand)
- [@article@7 In-Demand IT Skills to Boost Your Resume in 2025](https://www.coursera.org/articles/key-it-skills-for-your-career)
- [@article@Top 10 in Demand IT Skills](https://www.comptia.org/blog/top-it-skills-in-demand)
- [@article@IT Skills: Definition and Examples](https://www.indeed.com/career-advice/finding-a-job/it-skills)

@ -5,4 +5,5 @@ Google Cloud Platform (GCP) is a collection of cloud computing services offered
Learn more from the following resources:
- [@official@Google Cloud Platform](https://cloud.google.com)
- [@course@Google Cloud Platform Video Course](https://www.youtube.com/watch?v=fZOz13joN0o)
- [@official@Cloud Computing, Hosting Services, and APIs](https://cloud.google.com/gcp)
- [@video@Google Cloud Platform Video Course](https://www.youtube.com/watch?v=fZOz13joN0o)

@ -4,4 +4,5 @@ GIAC is a globally recognized organization that provides certifications for info
Learn more from the following resources:
- [@official@GIAC Website](https://www.giac.org/)
- [@official@GIAC](https://www.giac.org/)
- [@official@Get Certified - GIAC](https://www.giac.org/get-certified/?msc=main-nav)

@ -4,6 +4,6 @@ Go, also known as Golang, is an open-source programming language created by Goog
Learn more from the following resources:
- [@roadmap@Go Roadmap](https://roadmap.sh/golang)
- [@roadmap@Visit Dedicated Go Roadmap](https://roadmap.sh/golang)
- [@video@Go in 100 seconds](https://www.youtube.com/watch?v=446E-r0rXHI)
- [@course@Go tutorial for beginners](https://www.youtube.com/watch?v=yyUHQIec83I)
- [@video@Go Tutorial for beginners](https://www.youtube.com/watch?v=yyUHQIec83I)

@ -4,4 +4,4 @@ Google Drive is a cloud-based storage solution provided by Google, which offers
Learn more from the following resources:
- [@official@Google Drive Website](https://drive.google.com)
- [@official@Google Drive](https://drive.google.com)

@ -4,4 +4,4 @@ Google Workspace, formerly known as G Suite, is a collection of cloud-based prod
Learn more from the following resources:
- [@official@Google Workspace Website](https://workspace.google.com/intl/en_uk/)
- [@official@Google Workspace](https://workspace.google.com/intl/en_uk/)

@ -4,5 +4,5 @@ The GIAC Penetration Tester (GPEN) certification is an advanced-level credential
Learn more from the following resources:
- [@official@GPEN Certification Website](https://www.giac.org/certifications/penetration-tester-gpen/)
- [@official@GPEN Certification](https://www.giac.org/certifications/penetration-tester-gpen/)
- [@article@What is the GPEN Certification?](https://hackernoon.com/what-is-the-giac-penetration-tester-gpen-certification)

@ -4,4 +4,4 @@ The GIAC Security Essentials Certification (GSEC) is an advanced cybersecurity c
Learn more from the following resources:
- [@official@GSEC Certification Website](https://www.giac.org/certifications/security-essentials-gsec/)
- [@official@GSEC Certification](https://www.giac.org/certifications/security-essentials-gsec/)

@ -4,4 +4,4 @@ The GIAC Web Application Penetration Tester (GWAPT) certification validates an i
Learn more from the following resources:
- [@official@GWAPT Certification Website](https://www.giac.org/certifications/web-application-penetration-tester-gwapt/)
- [@official@GWAPT Certification](https://www.giac.org/certifications/web-application-penetration-tester-gwapt/)

Loading…
Cancel
Save