refactor(cyber-security): adjust content for cyber securities (#8521)

pull/8523/head
Vedansh 4 days ago committed by GitHub
parent eb5d2fbc3a
commit d3ccfb9ced
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 1
      src/data/roadmaps/cyber-security/content/bash@tao0Bb_JR0Ubl62HO8plp.md
  2. 4
      src/data/roadmaps/cyber-security/content/basics-and-concepts-of-threat-hunting@_x3BgX93N-Pt1_JK7wk0p.md
  3. 3
      src/data/roadmaps/cyber-security/content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md
  4. 3
      src/data/roadmaps/cyber-security/content/basics-of-threat-intel-osint@wN5x5pY53B8d0yopa1z8F.md
  5. 2
      src/data/roadmaps/cyber-security/content/basics-of-vulnerability-management@lcxAXtO6LoGd85nOFnLo8.md
  6. 7
      src/data/roadmaps/cyber-security/content/blue--red--purple-teams@7tDxTcKJNAUxbHLPCnPFO.md
  7. 2
      src/data/roadmaps/cyber-security/content/box@4Man3Bd-ySLFlAdxbLOHw.md
  8. 6
      src/data/roadmaps/cyber-security/content/brute-force-vs-password-spray@Q0i-plPQkb_NIvOQBVaDd.md
  9. 1
      src/data/roadmaps/cyber-security/content/buffer-overflow@n8ZOZxNhlnw7DpzoXe_f_.md
  10. 5
      src/data/roadmaps/cyber-security/content/bus@0DWh4WmLK_ENDuqQmQcu4.md

@ -4,6 +4,7 @@ Bash (Bourne Again Shell) is a widely-used Unix shell and scripting language tha
Learn more from the following resources:
- [@official@Bash](https://www.gnu.org/software/bash/)
- [@video@Bash in 100 Seconds](https://www.youtube.com/watch?v=I4EWvMFj37g)
- [@course@Beginners Guide To The Bash Terminal](https://www.youtube.com/watch?v=oxuRxtrO2Ag)
- [@course@Start learning bash](https://linuxhandbook.com/bash/)

@ -2,8 +2,8 @@
Threat hunting is a proactive approach to cybersecurity where security professionals actively search for hidden threats or adversaries that may have bypassed traditional security measures, such as firewalls and intrusion detection systems. Rather than waiting for automated tools to flag suspicious activity, threat hunters use a combination of human intuition, threat intelligence, and advanced analysis techniques to identify indicators of compromise (IoCs) and potential threats within a network or system. The process involves several key concepts, starting with a **hypothesis**, where a hunter develops a theory about potential vulnerabilities or attack vectors that could be exploited. They then conduct a **search** through logs, traffic data, or endpoint activity to look for anomalies or patterns that may indicate malicious behavior. **Data analysis** is central to threat hunting, as hunters analyze vast amounts of network and system data to uncover subtle signs of attacks or compromises. If threats are found, the findings lead to **detection and mitigation**, allowing the security team to contain the threat, remove malicious entities, and prevent similar incidents in the future.
Learn more from the following resources:
- [@article@What is Threat Hunting](https://www.ibm.com/topics/threat-hunting)
- [@video@Cyber Security Threat Hunting explained](https://www.youtube.com/watch?v=VNp35Uw_bSM)
- [@article@What is Threat Hunting? Threat Hunting Types and Techniques](https://www.fortinet.com/resources/cyberglossary/threat-hunting)
- [@video@Cyber Security Threat Hunting Explained](https://www.youtube.com/watch?v=VNp35Uw_bSM)

@ -8,9 +8,10 @@ An Intrusion Detection System (IDS) is a critical security tool designed to moni
## What is Intrusion Prevention System (IPS)?
An Intrusion Prevention System (IPS) is an advanced security solution closely related to IDS. While an IDS mainly focuses on detecting and alerting about intrusions, an IPS takes it a step further and actively works to prevent the attacks. It monitors, analyzes, and takes pre-configured automatic actions based on suspicious activities, such as blocking malicious traffic, reseting connections, or dropping malicious packets.
An Intrusion Prevention System (IPS) is an advanced security solution closely related to IDS. While an IDS mainly focuses on detecting and alerting about intrusions, an IPS takes it a step further and actively works to prevent the attacks. It monitors, analyzes, and takes pre-configured automatic actions based on suspicious activities, such as blocking malicious traffic, resetting connections, or dropping malicious packets.
Learn more from the following resources:
- [@video@Intrusion Prevention System (IPS)](https://www.youtube.com/watch?v=7QuYupuic3Q)
- [@article@What is an Intrusion Prevention System?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips)
- [@article@What is Intrusion Detection Systems (IDS)](https://www.fortinet.com/resources/cyberglossary/intrusion-detection-system)

@ -4,5 +4,6 @@ Threat Intelligence (Threat Intel) and Open-Source Intelligence (OSINT) are both
Learn more from the following resources:
- [@article@OSINT Framework](https://osintframework.com/)
- [@official@OSINT Framework](https://osintframework.com/)
- [@article@Threat Intelligence](https://www.microsoft.com/en-us/security/blog/topic/threat-intelligence/)
- [@course@Open-Source Intelligence (OSINT) in 5 Hours](https://www.youtube.com/watch?v=qwA6MmbeGNo&t=457s)

@ -8,6 +8,6 @@ Next, **remediation** is carried out through patching, configuration changes, or
Learn more from the following resources:
- [@article@What is vulnerability management? - Rapid7](https://www.rapid7.com/fundamentals/vulnerability-management-and-scanning/)
- [@article@What is Vulnerability Management? - Rapid7](https://www.rapid7.com/fundamentals/vulnerability-management-and-scanning/)
- [@article@What is Vulnerability Management? - CrowdStrike](https://www.crowdstrike.com/cybersecurity-101/vulnerability-management/)
- [@video@Vulnerability Management explained by experts](https://www.youtube.com/watch?v=RE6_Lo2wSIg)

@ -4,6 +4,7 @@ In the context of cybersecurity, Blue Team, Red Team, and Purple Team are terms
Learn more from the following resources:
- [@article@What is a blue team?](https://www.checkpoint.com/cyber-hub/cyber-security/what-is-a-blue-team/)
- [@article@What is red teaming?](https://www.ibm.com/think/topics/red-teaming)
- [@article@Purple teaming explained](https://www.crowdstrike.com/cybersecurity-101/purple-teaming/)
- [@article@What is a Blue Team?](https://www.checkpoint.com/cyber-hub/cyber-security/what-is-a-blue-team/)
- [@article@What is Red Teaming?](https://www.ibm.com/think/topics/red-teaming)
- [@article@Purple Teaming Explained](https://www.crowdstrike.com/cybersecurity-101/purple-teaming/)
- [@article@Red Team VS Blue Team: What's the Difference?](https://www.crowdstrike.com/en-us/cybersecurity-101/advisory-services/red-team-vs-blue-team/)

@ -4,5 +4,5 @@ Box is a popular cloud storage service that provides individuals and businesses
Learn more from the following resources:
- [@official@Box Website](https://www.box.com/en-gb/home)
- [@official@Box](https://www.box.com/en-gb/home)
- [@video@Box Cloud Storage Review 2024](https://www.youtube.com/watch?v=ktNDLO1T96c)

@ -10,6 +10,6 @@ Password Spray is a more targeted and stealthy method of password cracking where
Visit the following resources to learn more:
- [@article@Brute force vs. Password Spray attack](https://www.inspark.nl/brute-force-vs-password-spray-attack-in-azure-sentinel/)
- [@article@What is password spraying?](https://www.techtarget.com/whatis/definition/password-spraying)
- [@article@What is a brute force attack?](https://www.fortinet.com/resources/cyberglossary/brute-force-attack)
- [@article@Brute-force vs. Password Spray Attack](https://www.inspark.nl/brute-force-vs-password-spray-attack-in-azure-sentinel/)
- [@article@What is Password Spraying?](https://www.techtarget.com/whatis/definition/password-spraying)
- [@article@What is a Brute-force Attack?](https://www.fortinet.com/resources/cyberglossary/brute-force-attack)

@ -6,3 +6,4 @@ Visit the following resources to learn more:
- [@article@What Is Buffer Overflow?](https://www.fortinet.com/resources/cyberglossary/buffer-overflow)
- [@article@Buffer Overflow Attack](https://www.imperva.com/learn/application-security/buffer-overflow/)
- [@video@Buffer Overflows Made Easy](https://www.youtube.com/watch?v=qSnPayW6F7U)

@ -4,5 +4,6 @@ In the context of cybersecurity, a bus refers to a communication system that tra
Learn more from the following resources:
- [@article@What is a bus?](https://www.lenovo.com/gb/en/glossary/bus/?srsltid=AfmBOoocoXVvqdupLu13XAm0FZMOHjRtjnnCCFxa59tEa-bQwhiVhac2)
- [@video@Computer buses](https://www.youtube.com/watch?v=aBCaCrC3z0k)
- [@article@Bus in Computing](https://en.wikipedia.org/wiki/Bus_(computing))
- [@article@What is a Bus?](https://www.lenovo.com/gb/en/glossary/bus/?srsltid=AfmBOoocoXVvqdupLu13XAm0FZMOHjRtjnnCCFxa59tEa-bQwhiVhac2)
- [@video@Computer Buses](https://www.youtube.com/watch?v=aBCaCrC3z0k)
Loading…
Cancel
Save