Professional Documents
Culture Documents
CIA Triad
Malwares
Social engineering
Network Devices
OSI Model
TCP/IP
Protocols
IP Subnetting
CompTIA Network+ Study Guide: Exam
• Network Network Segmentation
N10-007
Firewalls
Proxies
VPN
Windows 7 / 10 / 11
• Operating Systems
Windows Server Active Directory
Linux
HTTP Methods
Cookies
Cryptosystem
Key Exchange
Symmetric Algorithms
• Cryptographic Encryption
Asymmetric Algorithms
Hashing
Steganography
Virtualization
Cloud Workloads
Service Models
• Virtualization and Cloud
Deployment Models
Computing
Regions and Availability Zones
PHP
Python
• Programming Language
Javascript
SQL
Bash
• Shell Scripting
Powershell
Third-Party Risks
Testing Methodology
• Penetration Testing
SAST & DAST
Vulnerability Scans
Threat Assessment
Reverse Engineering
• Advanced
Buffer overflow
Malware analysis
SOC
• Blue Team & Red Team
Digital Forensics
SIEM / CASB
Blue Team
Incident Response
CIS Benchmarks
• Regulations, Standards, and
ISO 27001 and ISO 27002
Frameworks
PCI DSS
HIPAA
GDPR
LetsDefend
Portswigger
Learning platforms
TryHackMe
HackTheBox
13Cubed
Computerphile
PwnFunction
LiveOverflow
Youtube
The Cyber Mentor
HackerSploit
John Hammond
Free4arab
CCNA
CompTIA Network +
CompTIA Security +
CISSP
eJPT
OSCP