You are on page 1of 1

What is Cybersecurity?

CIA Triad

Identification and Authentication,


Authorization, and Accounting (AAA)
CompTIA Security+ SY0-601 Certification
• Introduction to cybersecurity Threat Actors Study Guide

Malwares

Common Types of Cybersecurity Attacks

Social engineering

Network Devices

OSI Model

TCP/IP

Protocols

IP Subnetting
CompTIA Network+ Study Guide: Exam
• Network Network Segmentation
N10-007

Zero Trust Security Model

Firewalls

Proxies

VPN

Wireless Cryptographic Protocols

How Operating Systems Works ? 

Windows 7 / 10 / 11
• Operating Systems
Windows Server Active Directory

Linux

How the Web Works ?  Client Server Architecture 

HTTP Methods 

• Web HTTP Headers 

Cookies 

HTTP response status codes 

Cryptosystem 

Key Exchange 

Symmetric Algorithms
• Cryptographic Encryption 
Asymmetric Algorithms

Hashing 

Steganography 

Virtualization 

Cloud Workloads 

Service Models 
• Virtualization and Cloud
Deployment Models 
Computing
Regions and Availability Zones 

Virtual Private Cloud (VPC) 

Security Groups & Policies 

PHP

Python
• Programming Language
Javascript

SQL

Bash 
• Shell Scripting
Powershell 

Cybersecurity  Web Vulnerabilities OWASP TOP 10 

Network Vulnerabilities & Attacks 


Everything you need to get started in cyberse... • Vulnerabilities 
Zero-Day 

Third-Party Risks 

What is Penetration Testing ? 

Types of Penetration Testing 

Testing Methodology 
• Penetration Testing
SAST & DAST 

Vulnerability Scans 

Threat Assessment 

Active Directory Attacks 

Reverse Engineering 
• Advanced
Buffer overflow 

Malware analysis 

Cyber Kill Chain 


• Must know
MITRE ATT&ck 

Red Teaming Methodology 


Red Team 
Red Teaming Tools 

SOC 
• Blue Team & Red Team
Digital Forensics 

SIEM / CASB 
Blue Team
Incident Response 

Log Management & Analysis 

Blue Team Tools 

What is a Cybersecurity Framework ? 

The NIST Framework 

CIS Benchmarks 
• Regulations, Standards, and
ISO 27001 and ISO 27002 
Frameworks
PCI DSS 

HIPAA 

GDPR 

LetsDefend 

Portswigger 
Learning platforms
TryHackMe 

HackTheBox 

13Cubed 

Computerphile 

PwnFunction 

LiveOverflow 
Youtube
The Cyber Mentor 

HackerSploit 

John Hammond 

Free4arab 

Cybersecurity For Dummies 

Social Engineering: The Science of Human



Courses, Books and Cert Path Hacking

The Art of Invisibility 

Ghost In The Wires 

Books Kali Linux Hacking: A Complete Step by


Step Guide by Ethem Mining

The Hacker Playbook 3: Practical Guide to


Penetration Testing

Penetration Testing: A Hands-On


Introduction to Hacking

Practical Malware Analysis: The Hands-On


Guide to Dissecting Malicious Software

CCNA 

CompTIA Network + 

CompTIA Security + 

Some of Certifications Learning Path GIAC (GISF)

CISSP

eJPT

OSCP

You might also like