Adjust few topics in CyberSecurity roadmap (#8537)

pull/8585/head
Vedansh 1 week ago committed by GitHub
parent c2e1d8fd28
commit ca30955e9f
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 2
      src/data/roadmaps/cyber-security/content/hackthebox@wkuE_cChPZT2MHyGjUuU4.md
  2. 2
      src/data/roadmaps/cyber-security/content/hashing@0UZmAECMnfioi-VeXcvg8.md
  3. 1
      src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md
  4. 2
      src/data/roadmaps/cyber-security/content/hping@Cclbt4bNfkHwFwZOvJuLK.md
  5. 2
      src/data/roadmaps/cyber-security/content/http--https@3Awm221OJHxXNLiL9yxfd.md
  6. 6
      src/data/roadmaps/cyber-security/content/hypervisor@CIoLaRv5I3sCr9tBnZHEi.md
  7. 2
      src/data/roadmaps/cyber-security/content/icloud@E7yfALgu9E2auOYDOTmex.md
  8. 2
      src/data/roadmaps/cyber-security/content/icloud@Wqy6ki13hP5c0VhGYEhHj.md
  9. 3
      src/data/roadmaps/cyber-security/content/ip@FdoqB2---uDAyz6xZjk_u.md
  10. 2
      src/data/roadmaps/cyber-security/content/iso@oRssaVG-K-JwlL6TAHhXw.md
  11. 2
      src/data/roadmaps/cyber-security/content/javascript@2SThr6mHpX6rpW-gmsqxG.md
  12. 2
      src/data/roadmaps/cyber-security/content/joe-sandbox@h__KxKa0Q74_egY7GOe-L.md
  13. 4
      src/data/roadmaps/cyber-security/content/jump-server@UF3BV1sEEOrqh5ilnfM1B.md
  14. 2
      src/data/roadmaps/cyber-security/content/kali-linux@w6wXkoLrv0_d-Ah0txUHd.md
  15. 2
      src/data/roadmaps/cyber-security/content/known-vs-unknown@HPlPGKs7NLqmBidHJkOZg.md

@ -4,5 +4,5 @@ Hack The Box (HTB) is a popular online platform designed for security enthusiast
Learn more from the following resources:
- [@official@Hack The Box Website](https://www.hackthebox.com/)
- [@official@Hack The Box](https://www.hackthebox.com/)
- [@video@I played HTB for 30 days, heres what I learnt](https://www.youtube.com/watch?v=bPv5pb7AcYs)

@ -6,3 +6,5 @@ Learn more from the following resources:
- [@video@Hashing Explained](https://www.youtube.com/watch?v=EOe1XUykdP4)
- [@article@What is hashing and how does it work?](https://www.techtarget.com/searchdatamanagement/definition/hashing)
- [@article@Hashing Algorithm Overview: Types, Methodologies & Usage](https://www.okta.com/identity-101/hashing-algorithms/)
- [@article@Understanding Cryptography Types:](https://geekflare.com/cybersecurity/cryptography-types/)

@ -5,5 +5,6 @@ A Host Intrusion Prevention System (HIPS) is a security solution designed to mon
HIPS operates at the host level, providing a last line of defense by securing the individual endpoints within a network. It is capable of preventing a wide range of attacks, including zero-day exploits, malware infections, unauthorized access attempts, and policy violations.
Visit the following resources to learn more:
- [@article@What is an Intrusion Prevention System?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips)
- [@article@What is Host intrusion prevention system (HIPS)?](https://cyberpedia.reasonlabs.com/EN/host%20intrusion%20prevention%20system%20(hips).html)

@ -4,5 +4,5 @@ hping is a versatile and powerful command-line based packet crafting tool that a
Learn more from the following resources:
- [@official@hping source code](https://salsa.debian.org/debian/hping3)
- [@official@hping](https://salsa.debian.org/debian/hping3)
- [@article@What is hping?](https://www.okta.com/uk/identity-101/hping/)

@ -4,5 +4,5 @@ HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP Secure) are fundamental proto
Learn more from the following resources:
- [@article@An overview of HTTP](https://developer.mozilla.org/en-US/docs/Web/HTTP/Overview)
- [@article@An Overview of HTTP](https://developer.mozilla.org/en-US/docs/Web/HTTP/Overview)
- [@article@What is HTTPS?](https://www.cloudflare.com/en-gb/learning/ssl/what-is-https/)

@ -2,12 +2,6 @@
A hypervisor, also known as a virtual machine monitor (VMM), is software or firmware that enables the creation and management of virtual machines (VMs) by abstracting the underlying hardware. It allows multiple VMs to run on a single physical machine, each operating independently with its own operating system and applications. Hypervisors facilitate better resource utilization by allowing a physical server to host several virtual environments, optimizing hardware efficiency.
There are two types of hypervisors:
- **Type 1 hypervisor**, or bare-metal hypervisor, runs directly on the physical hardware without a host operating system. It provides better performance and is commonly used in enterprise environments. Examples include VMware ESXi and Microsoft Hyper-V.
- **Type 2 hypervisor** runs on top of an existing operating system, relying on the host OS for resource management. These are typically used for personal or development purposes, with examples like VMware Workstation and Oracle VirtualBox.
Hypervisors are fundamental in cloud computing, virtualization, and server consolidation, allowing for flexible and efficient resource management and isolation between virtual environments.
Learn more from the following resources:
- [@article@What is a hypervisor?](https://www.redhat.com/en/topics/virtualization/what-is-a-hypervisor)

@ -4,4 +4,4 @@ iCloud is a cloud storage and cloud computing service provided by Apple Inc. It
Learn more from the following resources:
- [@official@iCloud Website](https://www.icloud.com/)
- [@official@iCloud](https://www.icloud.com/)

@ -4,4 +4,4 @@ iCloud is a cloud storage and cloud computing service provided by Apple Inc. It
Learn more from the following resources:
- [@official@iCloud Website](https://www.icloud.com/)
- [@official@iCloud](https://www.icloud.com/)

@ -4,5 +4,6 @@ IP, or Internet Protocol, is a fundamental concept in cybersecurity that refers
Learn more from the following resources:
- [@article@What is an IP address and what does it mean?](https://www.kaspersky.com/resource-center/definitions/what-is-an-ip-address)
- [@website@Check Your IP Address](https://ipleak.net)
- [@article@What is an IP Address and What does it mean?](https://www.kaspersky.com/resource-center/definitions/what-is-an-ip-address)
- [@video@Whats an IP address?](https://www.youtube.com/watch?v=6is6Gulh7qE)

@ -4,5 +4,5 @@ The International Organization for Standardization (ISO) is an international sta
Learn more from the following resources:
- [@official@ISO Website](https://www.iso.org/home.html)
- [@official@International Organization for Standardization](https://www.iso.org/home.html)
- [@article@What is the ISO?](https://www.techtarget.com/searchdatacenter/definition/ISO#:~:text=ISO%20(International%20Organization%20for%20Standardization)%20is%20a%20worldwide,federation%20of%20national%20standards%20bodies.)

@ -4,6 +4,6 @@ JavaScript (often abbreviated as JS) is a widely-used, high-level programming la
Learn more from the following resources:
- [@roadmap@JavaScript Roadmap](https://roadmap.sh/javascript)
- [@roadmap@Visit Dedicated JavaScript Roadmap](https://roadmap.sh/javascript)
- [@article@What is JavaScript?](https://developer.mozilla.org/en-US/docs/Learn/JavaScript/First_steps/What_is_JavaScript)
- [@video@100 JavaScript concepts you need to know](https://www.youtube.com/watch?v=lkIFF4maKMU)

@ -4,5 +4,5 @@ Joe Sandbox is an advanced malware analysis platform that allows security profes
Learn more from the following resources:
- [@official@Joe Sandbox Website](https://www.joesandbox.com/#windows)
- [@official@Joe Sandbox](https://www.joesandbox.com/#windows)
- [@video@Cybersecurity Sandbox for Security Analysts](https://www.youtube.com/watch?v=FJGmRzY1igY)

@ -4,5 +4,5 @@ A **jump server**, also known as a **bastion host** or **jump host**, is a criti
Learn more from the following resources:
- [@article@What is a jump server?](https://www.ssh.com/academy/iam/jump-server)
- [@video@What is a bastion host and why is it so important?](https://www.youtube.com/watch?v=pI6glWVEkcY)
- [@article@What is a Jump Server?](https://www.ssh.com/academy/iam/jump-server)
- [@video@What is a Bastion Host and Why is it so important?](https://www.youtube.com/watch?v=pI6glWVEkcY)

@ -5,3 +5,5 @@ Kali Linux is a specialized Linux distribution that is designed for penetration
With over 600 pre-installed penetration-testing programs, Kali Linux offers tools for various security-related tasks, such as network analysis, vulnerability scanning, and forensic analysis. Its development is overseen by Offensive Security, a company known for their contributions to the field of information security. Kali Linux is highly customizable, allowing users to tailor the system to their specific needs, and supports a wide range of hardware platforms. It is a powerful resource for professionals in the cybersecurity field, as well as for those who are passionate about learning and practicing ethical hacking techniques.
- [@official@Kali Linux](https://www.kali.org/)
- [@official@Kali Tools](https://www.kali.org/tools)
- [@official@Kali Docs](https://www.kali.org/docs/)

@ -8,5 +8,7 @@
Learn more from the following resources:
- [@article@From Known to Unknown](https://securitysandman.com/2025/01/06/from-known-to-unknown-shifting-cybersecurity-to-proactive-ai-detection/)
- [@article@Catching all Threats - Known, Unknown, and Unknown Unknown](https://www.scworld.com/perspective/catching-all-threats-known-unknown-and-unknown-unknown-before-they-can-harm-you)
- [@video@Detecting known threats](https://www.youtube.com/watch?v=hOaHDVMQ9_s)
- [@video@How to deal with unknown threats](https://www.youtube.com/watch?v=CH4tX_MVLh0)
Loading…
Cancel
Save