From ca30955e9fcf8c8f65ff6d8e907ff8603c1d3998 Mon Sep 17 00:00:00 2001 From: Vedansh Date: Thu, 1 May 2025 17:59:47 +0530 Subject: [PATCH] Adjust few topics in CyberSecurity roadmap (#8537) --- .../content/hackthebox@wkuE_cChPZT2MHyGjUuU4.md | 2 +- .../cyber-security/content/hashing@0UZmAECMnfioi-VeXcvg8.md | 4 +++- .../cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md | 1 + .../cyber-security/content/hping@Cclbt4bNfkHwFwZOvJuLK.md | 2 +- .../content/http--https@3Awm221OJHxXNLiL9yxfd.md | 2 +- .../content/hypervisor@CIoLaRv5I3sCr9tBnZHEi.md | 6 ------ .../cyber-security/content/icloud@E7yfALgu9E2auOYDOTmex.md | 2 +- .../cyber-security/content/icloud@Wqy6ki13hP5c0VhGYEhHj.md | 2 +- .../cyber-security/content/ip@FdoqB2---uDAyz6xZjk_u.md | 3 ++- .../cyber-security/content/iso@oRssaVG-K-JwlL6TAHhXw.md | 2 +- .../content/javascript@2SThr6mHpX6rpW-gmsqxG.md | 2 +- .../content/joe-sandbox@h__KxKa0Q74_egY7GOe-L.md | 2 +- .../content/jump-server@UF3BV1sEEOrqh5ilnfM1B.md | 4 ++-- .../content/kali-linux@w6wXkoLrv0_d-Ah0txUHd.md | 2 ++ .../content/known-vs-unknown@HPlPGKs7NLqmBidHJkOZg.md | 2 ++ 15 files changed, 20 insertions(+), 18 deletions(-) diff --git a/src/data/roadmaps/cyber-security/content/hackthebox@wkuE_cChPZT2MHyGjUuU4.md b/src/data/roadmaps/cyber-security/content/hackthebox@wkuE_cChPZT2MHyGjUuU4.md index b72d899cd..c25d56871 100644 --- a/src/data/roadmaps/cyber-security/content/hackthebox@wkuE_cChPZT2MHyGjUuU4.md +++ b/src/data/roadmaps/cyber-security/content/hackthebox@wkuE_cChPZT2MHyGjUuU4.md @@ -4,5 +4,5 @@ Hack The Box (HTB) is a popular online platform designed for security enthusiast Learn more from the following resources: -- [@official@Hack The Box Website](https://www.hackthebox.com/) +- [@official@Hack The Box](https://www.hackthebox.com/) - [@video@I played HTB for 30 days, heres what I learnt](https://www.youtube.com/watch?v=bPv5pb7AcYs) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/hashing@0UZmAECMnfioi-VeXcvg8.md b/src/data/roadmaps/cyber-security/content/hashing@0UZmAECMnfioi-VeXcvg8.md index bd40506ed..2d338f146 100644 --- a/src/data/roadmaps/cyber-security/content/hashing@0UZmAECMnfioi-VeXcvg8.md +++ b/src/data/roadmaps/cyber-security/content/hashing@0UZmAECMnfioi-VeXcvg8.md @@ -5,4 +5,6 @@ Hashing is a cryptographic process that converts input data of any size into a f Learn more from the following resources: - [@video@Hashing Explained](https://www.youtube.com/watch?v=EOe1XUykdP4) -- [@article@What is hashing and how does it work?](https://www.techtarget.com/searchdatamanagement/definition/hashing) \ No newline at end of file +- [@article@What is hashing and how does it work?](https://www.techtarget.com/searchdatamanagement/definition/hashing) +- [@article@Hashing Algorithm Overview: Types, Methodologies & Usage](https://www.okta.com/identity-101/hashing-algorithms/) +- [@article@Understanding Cryptography Types:](https://geekflare.com/cybersecurity/cryptography-types/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md b/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md index 4a3bd13cd..0850c34b6 100644 --- a/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md +++ b/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md @@ -5,5 +5,6 @@ A Host Intrusion Prevention System (HIPS) is a security solution designed to mon HIPS operates at the host level, providing a last line of defense by securing the individual endpoints within a network. It is capable of preventing a wide range of attacks, including zero-day exploits, malware infections, unauthorized access attempts, and policy violations. Visit the following resources to learn more: + - [@article@What is an Intrusion Prevention System?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips) - [@article@What is Host intrusion prevention system (HIPS)?](https://cyberpedia.reasonlabs.com/EN/host%20intrusion%20prevention%20system%20(hips).html) diff --git a/src/data/roadmaps/cyber-security/content/hping@Cclbt4bNfkHwFwZOvJuLK.md b/src/data/roadmaps/cyber-security/content/hping@Cclbt4bNfkHwFwZOvJuLK.md index 519ef41d0..ce86ce535 100644 --- a/src/data/roadmaps/cyber-security/content/hping@Cclbt4bNfkHwFwZOvJuLK.md +++ b/src/data/roadmaps/cyber-security/content/hping@Cclbt4bNfkHwFwZOvJuLK.md @@ -4,5 +4,5 @@ hping is a versatile and powerful command-line based packet crafting tool that a Learn more from the following resources: -- [@official@hping source code](https://salsa.debian.org/debian/hping3) +- [@official@hping](https://salsa.debian.org/debian/hping3) - [@article@What is hping?](https://www.okta.com/uk/identity-101/hping/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/http--https@3Awm221OJHxXNLiL9yxfd.md b/src/data/roadmaps/cyber-security/content/http--https@3Awm221OJHxXNLiL9yxfd.md index ba8c91a8d..5412a5823 100644 --- a/src/data/roadmaps/cyber-security/content/http--https@3Awm221OJHxXNLiL9yxfd.md +++ b/src/data/roadmaps/cyber-security/content/http--https@3Awm221OJHxXNLiL9yxfd.md @@ -4,5 +4,5 @@ HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP Secure) are fundamental proto Learn more from the following resources: -- [@article@An overview of HTTP](https://developer.mozilla.org/en-US/docs/Web/HTTP/Overview) +- [@article@An Overview of HTTP](https://developer.mozilla.org/en-US/docs/Web/HTTP/Overview) - [@article@What is HTTPS?](https://www.cloudflare.com/en-gb/learning/ssl/what-is-https/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/hypervisor@CIoLaRv5I3sCr9tBnZHEi.md b/src/data/roadmaps/cyber-security/content/hypervisor@CIoLaRv5I3sCr9tBnZHEi.md index d553e7aac..364e153ba 100644 --- a/src/data/roadmaps/cyber-security/content/hypervisor@CIoLaRv5I3sCr9tBnZHEi.md +++ b/src/data/roadmaps/cyber-security/content/hypervisor@CIoLaRv5I3sCr9tBnZHEi.md @@ -2,12 +2,6 @@ A hypervisor, also known as a virtual machine monitor (VMM), is software or firmware that enables the creation and management of virtual machines (VMs) by abstracting the underlying hardware. It allows multiple VMs to run on a single physical machine, each operating independently with its own operating system and applications. Hypervisors facilitate better resource utilization by allowing a physical server to host several virtual environments, optimizing hardware efficiency. -There are two types of hypervisors: -- **Type 1 hypervisor**, or bare-metal hypervisor, runs directly on the physical hardware without a host operating system. It provides better performance and is commonly used in enterprise environments. Examples include VMware ESXi and Microsoft Hyper-V. -- **Type 2 hypervisor** runs on top of an existing operating system, relying on the host OS for resource management. These are typically used for personal or development purposes, with examples like VMware Workstation and Oracle VirtualBox. - -Hypervisors are fundamental in cloud computing, virtualization, and server consolidation, allowing for flexible and efficient resource management and isolation between virtual environments. - Learn more from the following resources: - [@article@What is a hypervisor?](https://www.redhat.com/en/topics/virtualization/what-is-a-hypervisor) diff --git a/src/data/roadmaps/cyber-security/content/icloud@E7yfALgu9E2auOYDOTmex.md b/src/data/roadmaps/cyber-security/content/icloud@E7yfALgu9E2auOYDOTmex.md index 50bf40a73..5c694926f 100644 --- a/src/data/roadmaps/cyber-security/content/icloud@E7yfALgu9E2auOYDOTmex.md +++ b/src/data/roadmaps/cyber-security/content/icloud@E7yfALgu9E2auOYDOTmex.md @@ -4,4 +4,4 @@ iCloud is a cloud storage and cloud computing service provided by Apple Inc. It Learn more from the following resources: -- [@official@iCloud Website](https://www.icloud.com/) \ No newline at end of file +- [@official@iCloud](https://www.icloud.com/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/icloud@Wqy6ki13hP5c0VhGYEhHj.md b/src/data/roadmaps/cyber-security/content/icloud@Wqy6ki13hP5c0VhGYEhHj.md index 50bf40a73..5c694926f 100644 --- a/src/data/roadmaps/cyber-security/content/icloud@Wqy6ki13hP5c0VhGYEhHj.md +++ b/src/data/roadmaps/cyber-security/content/icloud@Wqy6ki13hP5c0VhGYEhHj.md @@ -4,4 +4,4 @@ iCloud is a cloud storage and cloud computing service provided by Apple Inc. It Learn more from the following resources: -- [@official@iCloud Website](https://www.icloud.com/) \ No newline at end of file +- [@official@iCloud](https://www.icloud.com/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/ip@FdoqB2---uDAyz6xZjk_u.md b/src/data/roadmaps/cyber-security/content/ip@FdoqB2---uDAyz6xZjk_u.md index de3d9aaeb..cc659f698 100644 --- a/src/data/roadmaps/cyber-security/content/ip@FdoqB2---uDAyz6xZjk_u.md +++ b/src/data/roadmaps/cyber-security/content/ip@FdoqB2---uDAyz6xZjk_u.md @@ -4,5 +4,6 @@ IP, or Internet Protocol, is a fundamental concept in cybersecurity that refers Learn more from the following resources: -- [@article@What is an IP address and what does it mean?](https://www.kaspersky.com/resource-center/definitions/what-is-an-ip-address) +- [@website@Check Your IP Address](https://ipleak.net) +- [@article@What is an IP Address and What does it mean?](https://www.kaspersky.com/resource-center/definitions/what-is-an-ip-address) - [@video@Whats an IP address?](https://www.youtube.com/watch?v=6is6Gulh7qE) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/iso@oRssaVG-K-JwlL6TAHhXw.md b/src/data/roadmaps/cyber-security/content/iso@oRssaVG-K-JwlL6TAHhXw.md index 491ce8307..15f9b307f 100644 --- a/src/data/roadmaps/cyber-security/content/iso@oRssaVG-K-JwlL6TAHhXw.md +++ b/src/data/roadmaps/cyber-security/content/iso@oRssaVG-K-JwlL6TAHhXw.md @@ -4,5 +4,5 @@ The International Organization for Standardization (ISO) is an international sta Learn more from the following resources: -- [@official@ISO Website](https://www.iso.org/home.html) +- [@official@International Organization for Standardization](https://www.iso.org/home.html) - [@article@What is the ISO?](https://www.techtarget.com/searchdatacenter/definition/ISO#:~:text=ISO%20(International%20Organization%20for%20Standardization)%20is%20a%20worldwide,federation%20of%20national%20standards%20bodies.) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/javascript@2SThr6mHpX6rpW-gmsqxG.md b/src/data/roadmaps/cyber-security/content/javascript@2SThr6mHpX6rpW-gmsqxG.md index 4985a7eaf..6049d2537 100644 --- a/src/data/roadmaps/cyber-security/content/javascript@2SThr6mHpX6rpW-gmsqxG.md +++ b/src/data/roadmaps/cyber-security/content/javascript@2SThr6mHpX6rpW-gmsqxG.md @@ -4,6 +4,6 @@ JavaScript (often abbreviated as JS) is a widely-used, high-level programming la Learn more from the following resources: -- [@roadmap@JavaScript Roadmap](https://roadmap.sh/javascript) +- [@roadmap@Visit Dedicated JavaScript Roadmap](https://roadmap.sh/javascript) - [@article@What is JavaScript?](https://developer.mozilla.org/en-US/docs/Learn/JavaScript/First_steps/What_is_JavaScript) - [@video@100 JavaScript concepts you need to know](https://www.youtube.com/watch?v=lkIFF4maKMU) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/joe-sandbox@h__KxKa0Q74_egY7GOe-L.md b/src/data/roadmaps/cyber-security/content/joe-sandbox@h__KxKa0Q74_egY7GOe-L.md index b1f6448a4..937a3d631 100644 --- a/src/data/roadmaps/cyber-security/content/joe-sandbox@h__KxKa0Q74_egY7GOe-L.md +++ b/src/data/roadmaps/cyber-security/content/joe-sandbox@h__KxKa0Q74_egY7GOe-L.md @@ -4,5 +4,5 @@ Joe Sandbox is an advanced malware analysis platform that allows security profes Learn more from the following resources: -- [@official@Joe Sandbox Website](https://www.joesandbox.com/#windows) +- [@official@Joe Sandbox](https://www.joesandbox.com/#windows) - [@video@Cybersecurity Sandbox for Security Analysts](https://www.youtube.com/watch?v=FJGmRzY1igY) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/jump-server@UF3BV1sEEOrqh5ilnfM1B.md b/src/data/roadmaps/cyber-security/content/jump-server@UF3BV1sEEOrqh5ilnfM1B.md index 1e5441992..23e131a93 100644 --- a/src/data/roadmaps/cyber-security/content/jump-server@UF3BV1sEEOrqh5ilnfM1B.md +++ b/src/data/roadmaps/cyber-security/content/jump-server@UF3BV1sEEOrqh5ilnfM1B.md @@ -4,5 +4,5 @@ A **jump server**, also known as a **bastion host** or **jump host**, is a criti Learn more from the following resources: -- [@article@What is a jump server?](https://www.ssh.com/academy/iam/jump-server) -- [@video@What is a bastion host and why is it so important?](https://www.youtube.com/watch?v=pI6glWVEkcY) \ No newline at end of file +- [@article@What is a Jump Server?](https://www.ssh.com/academy/iam/jump-server) +- [@video@What is a Bastion Host and Why is it so important?](https://www.youtube.com/watch?v=pI6glWVEkcY) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/kali-linux@w6wXkoLrv0_d-Ah0txUHd.md b/src/data/roadmaps/cyber-security/content/kali-linux@w6wXkoLrv0_d-Ah0txUHd.md index f41dd7575..9a0e35941 100644 --- a/src/data/roadmaps/cyber-security/content/kali-linux@w6wXkoLrv0_d-Ah0txUHd.md +++ b/src/data/roadmaps/cyber-security/content/kali-linux@w6wXkoLrv0_d-Ah0txUHd.md @@ -5,3 +5,5 @@ Kali Linux is a specialized Linux distribution that is designed for penetration With over 600 pre-installed penetration-testing programs, Kali Linux offers tools for various security-related tasks, such as network analysis, vulnerability scanning, and forensic analysis. Its development is overseen by Offensive Security, a company known for their contributions to the field of information security. Kali Linux is highly customizable, allowing users to tailor the system to their specific needs, and supports a wide range of hardware platforms. It is a powerful resource for professionals in the cybersecurity field, as well as for those who are passionate about learning and practicing ethical hacking techniques. - [@official@Kali Linux](https://www.kali.org/) +- [@official@Kali Tools](https://www.kali.org/tools) +- [@official@Kali Docs](https://www.kali.org/docs/) diff --git a/src/data/roadmaps/cyber-security/content/known-vs-unknown@HPlPGKs7NLqmBidHJkOZg.md b/src/data/roadmaps/cyber-security/content/known-vs-unknown@HPlPGKs7NLqmBidHJkOZg.md index 1462d9630..cb7fdfcf2 100644 --- a/src/data/roadmaps/cyber-security/content/known-vs-unknown@HPlPGKs7NLqmBidHJkOZg.md +++ b/src/data/roadmaps/cyber-security/content/known-vs-unknown@HPlPGKs7NLqmBidHJkOZg.md @@ -8,5 +8,7 @@ Learn more from the following resources: +- [@article@From Known to Unknown](https://securitysandman.com/2025/01/06/from-known-to-unknown-shifting-cybersecurity-to-proactive-ai-detection/) +- [@article@Catching all Threats - Known, Unknown, and Unknown Unknown](https://www.scworld.com/perspective/catching-all-threats-known-unknown-and-unknown-unknown-before-they-can-harm-you) - [@video@Detecting known threats](https://www.youtube.com/watch?v=hOaHDVMQ9_s) - [@video@How to deal with unknown threats](https://www.youtube.com/watch?v=CH4tX_MVLh0) \ No newline at end of file