fix: topic links and content (#8536)

refactor/red-teaming
Vedansh 4 days ago committed by GitHub
parent be1b041acb
commit bb0df94afa
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 3
      src/data/roadmaps/cyber-security/content/learn-how-malware-works-and-types@v7CD_sHqLWbm9ibXXESIK.md
  2. 2
      src/data/roadmaps/cyber-security/content/legal@C5bCIdPi0gGkY_r4qqoXZ.md
  3. 2
      src/data/roadmaps/cyber-security/content/linux@4frVcjYI1VlVU9hQgpwcT.md
  4. 3
      src/data/roadmaps/cyber-security/content/local-auth@vYvFuz7lAJXZ1vK_4999a.md
  5. 2
      src/data/roadmaps/cyber-security/content/lolbas@10qbxX8DCrfyH7tgYexxQ.md
  6. 2
      src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md
  7. 3
      src/data/roadmaps/cyber-security/content/macos@dztwr-DSckggQbcNIi4_2.md
  8. 2
      src/data/roadmaps/cyber-security/content/memdump@wspNQPmqWRjKoFm6x_bVw.md
  9. 2
      src/data/roadmaps/cyber-security/content/memory-leak@nOND14t7ISgSH3zNpV3F8.md
  10. 4
      src/data/roadmaps/cyber-security/content/mesh@PYeF15e7iVB9seFrrO7W6.md
  11. 2
      src/data/roadmaps/cyber-security/content/mitm@ODlVT6MhV-RVUbRMG0mHi.md
  12. 2
      src/data/roadmaps/cyber-security/content/nac-based@6oAzYfwsHQYNVbi7c2Tly.md
  13. 2
      src/data/roadmaps/cyber-security/content/netflow@xXz-SwvXA2cLfdCd-hLtW.md
  14. 1
      src/data/roadmaps/cyber-security/content/nids@LIPtxl_oKZRcbvXT4EdNf.md
  15. 2
      src/data/roadmaps/cyber-security/content/nist@SOkJUTd1NUKSwYMIprv4m.md
  16. 4
      src/data/roadmaps/cyber-security/content/nmap@Hoou7kWyfB2wx_yFHug_H.md
  17. 1
      src/data/roadmaps/cyber-security/content/ntp@tf0TymdPHbplDHvuVIIh4.md

@ -34,4 +34,5 @@ A rootkit is a type of malware designed to hide or obscure the presence of other
Keyloggers are a type of malware that monitor and record users' keystrokes, allowing attackers to capture sensitive information, such as login credentials or financial information entered on a keyboard.
Understanding the different types of malware can help you better identify and protect against various cyber threats. As the cyber landscape continues to evolve, it's essential to stay informed about emerging malware and equip yourself with the necessary security skills and knowledge.
Learn more from the following resources:

@ -4,5 +4,5 @@ A legal department within an organization is responsible for handling all legal
Learn more from the following resources:
- [@article@Key functions of a legal team](https://uk.practicallaw.thomsonreuters.com/w-009-3932?transitionType=Default&contextData=(sc.Default)&firstPage=true)
- [@article@Key Functions of a Legal Team](https://uk.practicallaw.thomsonreuters.com/w-009-3932?transitionType=Default&contextData=(sc.Default)&firstPage=true)
- [@article@The Legal Team’s Responsibility in Corporate Cybersecurity](https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/expert-insight-the-legal-teams-responsibility-in-corporate-cybersecurity/)

@ -4,7 +4,7 @@ Linux is an open-source, Unix-like operating system kernel first released by Lin
Learn more from the following resources:
- [@roadmap@Linux Roadmap](https://roadmap.sh/linux)
- [@roadmap@Visit Linux Roadmap](https://roadmap.sh/linux)
- [@article@Linux Commands Cheat Sheet](https://cdn.hostinger.com/tutorials/pdf/Linux-Commands-Cheat-Sheet.pdf)
- [@course@Linux from scratch - Cisco](https://www.netacad.com/courses/os-it/ndg-linux-unhatched)
- [@video@Linux in 100 Seconds](https://www.youtube.com/watch?v=rrB13utjYV4)

@ -2,3 +2,6 @@
Local authentication refers to the process of verifying a user's identity on a specific device or system without relying on external servers or networks. It typically involves storing and checking credentials directly on the device itself. Common methods include username/password combinations, biometrics (fingerprint, face recognition), or PIN codes. Local authentication is often used for device access, offline applications, or as a fallback when network-based authentication is unavailable. While it offers quick access and works without internet connectivity, it can be less secure than centralized authentication systems and more challenging to manage across multiple devices. Local authentication is commonly used in personal devices, standalone systems, and scenarios where network-based authentication is impractical or unnecessary.
Learn more from the following resources:
- [@article@Local authentication, registration, and other settings](https://learn.microsoft.com/en-us/power-pages/security/authentication/set-authentication-identity)

@ -4,6 +4,6 @@
Learn more from the following resources:
- [@official@LOLBAS project](https://lolbas-project.github.io/#)
- [@official@LOLBAS Project](https://lolbas-project.github.io/#)
- [@article@Understanding the risks of LOLBAS in security](https://pentera.io/blog/the-lol-isnt-so-funny-when-it-bites-you-in-the-bas/)
- [@video@LOLBAS T1105, MS Process Abuse](https://www.youtube.com/watch?v=fq2_VvAU29g)

@ -4,4 +4,4 @@
Learn more from the following resources:
- [@article@Understanding the loopback address and loopback interfaces](https://study-ccna.com/loopback-interface-loopback-address/)
- [@article@Understanding the Loopback Address and Loopback Interfaces](https://study-ccna.com/loopback-interface-loopback-address/)

@ -4,6 +4,5 @@
Learn more from the following resources:
- [@official@MacOS Website](https://www.apple.com/uk/macos/macos-sequoia/)
- [@official@macOS](https://www.apple.com/macos/macos-sequoia/)
- [@video@Mac Tutorial for Beginners 2024](https://www.youtube.com/watch?v=3jeeFc2Vo1U)

@ -5,4 +5,4 @@
Learn more from the following resources:
- [@official@memdump](https://www.kali.org/tools/memdump/)
- [@opensource@memdump - Github](https://github.com/tchebb/memdump)

@ -2,5 +2,7 @@
A Memory Leak occurs when a computer program consumes memory but fails to release it back to the operating system after it is no longer needed. Over time, this can lead to reduced system performance, increased memory usage, and, in severe cases, the program or system may crash due to the exhaustion of available memory.
Learn more from the following resources:
- [@article@What are memory leaks?](https://learn.snyk.io/lesson/memory-leaks/)
- [@video@What are memory leaks?](https://www.youtube.com/watch?v=00Kdpgl6fsY)

@ -4,5 +4,5 @@ Mesh topology is a network architecture where devices or nodes are interconnecte
Learn more from the following resources:
- [@article@What is mesh topology?](https://www.lenovo.com/gb/en/glossary/mesh-topology)
- [@article@Mesh topology explained](https://www.computerhope.com/jargon/m/mesh.htm)
- [@article@What is Mesh Topology?](https://www.lenovo.com/gb/en/glossary/mesh-topology)
- [@article@Mesh Topology explained](https://www.computerhope.com/jargon/m/mesh.htm)

@ -4,4 +4,4 @@ A Man-in-the-Middle (MITM) attack occurs when a malicious actor intercepts commu
Visit the following resources to learn more:
- [@article@Wikipedia - Man-in-the-middle attack](https://en.wikipedia.org/wiki/Man-in-the-middle_attack)
- [@article@Man-in-the-middle attack](https://en.wikipedia.org/wiki/Man-in-the-middle_attack)

@ -2,7 +2,7 @@
Network Access Control (NAC) based hardening is a crucial component in enhancing the security of your network infrastructure. NAC provides organizations with the ability to control and manage access to the network resources, ensuring that only authorized users and devices can connect to the network. It plays a vital role in reducing the attack surface and preventing unauthorized access to sensitive data and resources. By implementing NAC-based hardening in your cybersecurity strategy, you protect your organization from threats and maintain secure access to critical resources.
Learn more from the following resouces:
Learn more from the following resources:
- [@video@Network Access Control](https://www.youtube.com/watch?v=hXeFJ05J4pQ)
- [@article@What is Network Access Control](https://www.fortinet.com/resources/cyberglossary/what-is-network-access-control)

@ -4,5 +4,5 @@
Learn more from the following resources:
- [@official@Cisco NetFlow Website](https://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html)
- [@official@Cisco NetFlow](https://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html)
- [@video@What is NetFlow?](https://www.youtube.com/watch?v=aqTpUmUibB8)

@ -3,5 +3,6 @@
A Network Intrusion Detection System (NIDS) is a security solution designed to monitor and analyze network traffic for signs of suspicious activity or potential threats. NIDS operates by inspecting the data packets that flow through a network, looking for patterns that match known attack signatures or anomalies that could indicate malicious behavior. Unlike a Host Intrusion Detection System (HIDS), which focuses on individual host devices, NIDS provides a broader view by monitoring network traffic across multiple systems and devices.
Visit the following resources to learn more:
- [@article@What is an Intrusion Detection System?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids)
- [@article@What is a Network Intrusion Detection system (NIDS)?](https://bunny.net/academy/security/what-is-network-intrusion-detection-nids/)

@ -4,5 +4,5 @@
Learn more from the following resources:
- [@official@NIST Website](https://www.nist.gov/)
- [@official@NIST](https://www.nist.gov/)
- [@article@What is NIST?](https://www.encryptionconsulting.com/education-center/nist/)

@ -4,6 +4,6 @@
Learn more from the following resources:
- [@official@NMAP Website](https://nmap.org/)
- [@official@NMAP](https://nmap.org/)
- [@article@NMAP Cheat Sheet](https://www.tutorialspoint.com/nmap-cheat-sheet)
- [@video@Nmap Tutorial to find Network Vulnerabilities]
- [@video@Nmap Tutorial to find Network Vulnerabilities](https://www.youtube.com/watch?v=4t4kBkMsDbQ)

@ -6,4 +6,3 @@ Learn more from the following resources:
- [@video@Network Time Protocol (NTP)](https://www.youtube.com/watch?v=BAo5C2qbLq8)
- [@article@What is NTP?](https://www.pubnub.com/learn/glossary/ntp-protocol/)

Loading…
Cancel
Save