Skip to content

Latest commit

 

History

History

Cybersecurity

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 

Cybersecurity

Cybersecurity involves the practice of protecting systems, networks, and data from digital attacks, unauthorized access, and damage. It includes measures and protocols designed to safeguard information integrity, confidentiality, and availability. Cybersecurity encompasses risk assessment, threat detection, incident response, and continuous monitoring to ensure robust defense against evolving cyber threats. This curated collection offers valuable Cybersecurity resources contributed by like-minds in the field.

Table of Contents

Roadmap

This ia a roadmap to learn cybersecurity

Resource Name Description
Cybersecurity Roadmap This is a beginner to advance level roadmap to gain cybersecurity skills.
Cybersecurity Roadmap by GFG This article from GFG consists of Cybersecurity Roadmap: Career Path, Skills, and Salary.

Courses

These are some free and paid courses to learn Cybersecurity.

Free Courses

Resource Name Description
Cyber Security Course for Beginners - Level 01 Learn the Security Fundamentals required for your everyday online presence.
Google Cybersecurity Get on the fast track to a career in cybersecurity. In this certificate program, you'll learn in-demand skills at your own pace, no degree or experience required. Enroll today and get access to Google AI Essentials at no cost.

Paid Courses

Resource Name Description
The Complete Cyber Security Course : Hackers Exposed! Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC
NYU-Introduction to Cybersecuritty Cyber Security. An introduction to modern information and system protection technology and methods.

Protocols

These are most important protocols in Cybersecurity.

Resource Name Description
HTTP/HTTPS HTTPS is an extension of HTTP that is used for secure communication over a computer network, typically the internet. It encrypts the data exchanged between the client and the server, providing confidentiality, integrity, and authenticity.
TLS/SSL TLS and its predecessor SSL are cryptographic protocols designed to provide secure communication over a computer network. They ensure that data transmitted between devices remains encrypted and secure.
DTLS DTLS is a protocol that provides communications privacy for datagram protocols, such as UDP. It is based on the same principles as TLS but is optimized for use in unreliable networks such as the internet.
SSH SSH is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers.
IPsec IPsec is a suite of protocols for securing internet protocol (IP) communications by authenticating and encrypting each IP packet in a communication session.
DNSsec DNSSEC is a set of extensions to DNS, which provides origin authentication of DNS data, authenticated denial of existence, and data integrity, but not confidentiality.
OAuth OAuth is an open standard for access delegation commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords.
SNMP SNMP is an internet-standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
Kerberos Protocol Kerberos is a network authentication protocol that provides strong authentication for client/server applications by using secret-key cryptography. It works on the basis of "tickets" to authenticate entities securely over a non-secure network.

Frameworks

Some most importanr frameworks in Cybersecurity.

Resource Name Description
NIST Developed by the National Institute of Standards and Technology (NIST), the CSF is a voluntary framework that provides a policy framework of computer security guidance for how private sector organizations in various sectors can assess and improve their ability to prevent, detect, and respond to cyber attacks.
ISO/IEC 27001:2022 ISO/IEC 27001 is an international standard for information security management systems (ISMS). It provides a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability.
CIS The CIS Controls are a prioritized set of actions that help protect organizations and its data from known cyber attack vectors. Developed by the Center for Internet Security (CIS), these controls offer practical guidance for implementing cybersecurity best practices.
COBIT COBIT is a framework for the governance and management of enterprise information technology. It helps organizations ensure that their IT systems support business objectives, are properly managed, and remain secure.
HITRUST HITRUST is a comprehensive security framework designed specifically for the healthcare industry. It provides prescriptive controls and requirements tailored to healthcare organizations to address the unique challenges and regulatory requirements they face, such as HIPAA (Health Insurance Portability and Accountability Act) compliance.
SCF The Secure Controls Framework (SCF) centers on internal controls, encompassing cybersecurity and data privacy-related policies, standards, procedures, technologies, and their related processes. These are crafted to offer reasonable assurance of achieving business objectives and preventing, detecting, and rectifying unwanted events.

Books

These are some of the books that we can use to learn Cybersecurity.

Free books

Resource Name Description
Open Source Scurity Tools The "Open Source Security Tools" is a comprehensive book that serves as a guide to various open-source tools used in cybersecurity. It covers a wide range of topics including network scanning, vulnerability assessment, penetration testing, intrusion detection, encryption and more.
Learn Ethical hacking from scratch The book "Learn Ethical Hacking from Scratch" is a comprehensive guide designed for beginners interested in mastering ethical hacking techniques and principles. It covers essential topics such as penetration testing, network scanning, vulnerability assessment, exploitation, and ethical hacking methodologies.
Hacking : The art of Exploitation This book is a renowned guide that delves into the fundamental principles and techniques of hacking and exploitation. It provides a hands-on introduction to various aspects of cybersecurity, including programming, network protocols, shellcode development, and vulnerability exploitation. Through practical examples and exercises, readers learn how to think like hackers, understand system vulnerabilities, and develop their skills in offensive security.
Kali-Linux - penetration testing for beginners This book serves as a practical and comprehensive resource for beginners interested in learning wireless network penetration testing using Kali Linux. It covers essential topics such as setting up a penetration testing lab, understanding wireless networking concepts, conducting reconnaissance, exploiting vulnerabilities, and securing wireless networks.

Paid Books

Resource Name Description
The Hacker Playbook The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments?
How to Become a Cyber-Security Analyst: Security Engineering and Ethical Hacking This book will teach you how to install, configure and utilize three popular security tools: SPLUNK, Nessus and Wireshark. After that we will have some fun by performing several hacking techniques.
How Cybersecurity really works? This beginners guide covers different types of attacks, common tactics used by online adversaries, and defensive strategies you can use to protect yourself. You’ll learn what security professionals do, what an attack looks like from a cybercriminal’s viewpoint, and how to implement sophisticated cybersecurity measures on your own devices.
Cybersecurity: A comprehensive guide to getting started in cybersecurity Align your security knowledge with industry leading concepts and tools, Acquire required skills and certifications to survive the ever changing market needs and Learn from industry experts to analyse, implement, and maintain a robust environment

YouTube

These resourcs provided by youtube helps you to learn cybersecurity more efficiently.

YouTube Channels

Resource Name Description
pc Security channel The YouTube channel "PC Security Channel" focuses on cybersecurity topics, offering informative videos that delve into computer security, malware analysis, antivirus software reviews, and practical tips for improving digital security. It's a valuable resource for both beginners and tech enthusiasts looking to stay informed about protecting their digital assets.
Network Chuck The YouTube channel "NetworkChuck" explores cybersecurity from a practical and educational perspective. It provides in-depth tutorials, discussions, and hands-on demonstrations covering various aspects of cybersecurity, including network security, ethical hacking, penetration testing, and securing IT infrastructures.
David bombal The YouTube channel "David Bombal" is a rich resource for networking and cybersecurity enthusiasts. Known for its comprehensive tutorials and practical demonstrations, the channel covers a wide array of topics including networking protocols, Cisco technologies, Python programming for networking automation, cybersecurity essentials, and career advice in IT.
The cyber mentor This channel focuses on providing high-quality cybersecurity education and practical training. It offers a variety of in-depth tutorials, demonstrations, and educational content covering topics such as ethical hacking, penetration testing, network security, and cybersecurity certifications.

YouTube Playlists

Resource Name Description
Kali Linux: Ethical hacking getting started course This playlist is the best resouces for learning kali linux and also the hacking process by using kali linux,, this playlist covers a wide range of topics including mac address, network system, kali command link, wifi and many more.
Learn Ethical hacking (CEH journey) This playlist by network chuck is one of the best resources out there for getting started with the ethical hacking, this playlist also provides the knowledge about the CEH (certified ethical hacker) certification exam and many more.
Full length hacking courses This playlist is a collection of comprehensive resources for learning hacking, this playlist cover wide range of hacking including web application hacking , bug bounty , linux basics, python basics and more.
Cyber Security Training for Beginners This playlist by edureka is the best playlist for learning cybersecurity, this will help you learn Cyber Security from scratch. You will get to know what is the role of Cyber Security in today's IT world and how different kind of attacks are taken care by Cyber Security.
CS50's Introduction to Cybersecurity This Introduction to Cyber Security playlist by Harvard University covers the basics of cybersecurity. It’s perfect for beginners or those without a technical background.
Google Cybersecurity Certificate Prepare for a career in high-growth field of Cybersecurity.

Projects

Here are some beginner to advanced projects to develop your project based learning experience.

Beginner Level Projects

Resource Name Description
Cybersecurity projects for beginners This article from GFG consists of top 6 cybersecurity projects for beginners

Intermediate Level Projects

Resource Name Description
25 Cybersecurity projects This article consists of cybersecurity projects along with their source code

Advance Level Projects

Resource Name Description
Cybersecurity projects -InterviewBit This article from InterviewBit consists of top 10 cybersecurity projects along with their source code
Interview Preparation

Here are some resources which can help you to prepare for Cybersecurity interview rounds

Resource Name Description
Cybersecurity Interview questions Top Cybersecurity interview questions along with their answers - Simplilearn.

Community

These are some communities you can seek help from to learn about cybersecurity.

Reddit Communities

Resource Description
r/cybersecurity The r/cybersecurity subreddit is a community where cybersecurity professionals, enthusiasts, and students discuss and share news, insights, tools, and best practices related to cybersecurity. Topics include threat intelligence, incident response, ethical hacking, network security, and more. It's a valuable resource for staying updated and engaging with the cybersecurity community.
r/ethicalhacking The r/ethicalhacking subreddit is dedicated to discussions and resources related to ethical hacking, penetration testing, and offensive security. Members share tutorials, tools, news, and discuss ethical considerations in cybersecurity. It's a community suitable for beginners and experienced professionals looking to learn and share insights about ethical hacking practices.
r/cybersecurity101 r/cybersecurity101 is a subreddit for beginners interested in cybersecurity. It covers introductory topics, resources, and advice for those new to the field of cybersecurity, including discussions on ethical hacking and cybersecurity fundamentals.
r/hacking The r/hacking subreddit is a community for discussions related to hacking techniques, tools, news, and ethical considerations. Members share resources, tutorials, and engage in discussions about various aspects of hacking and cybersecurity.
r/netsec The r/netsec subreddit is dedicated to network security discussions. It covers topics such as vulnerabilities, exploits, malware analysis, cryptography, and defensive security measures. It's geared towards cybersecurity professionals and enthusiasts interested in in-depth technical discussions.

Other Communities

Resource Name Description
Wilders Security This well-known security forum is a great resource for your cybersecurity questions.Easily navigate from the homepage to sub-forums and over 2.5 million posts.
IEEE Cybersecurity IEEE’s cybersecurity-specific community is a great place to read resources, interact with other professionals, and find out about events.

GitHub Repositories

Resource Description
Awesome Hacking The GitHub repository "Awesome Hacking" is a curated list of resources, tools, and tutorials related to hacking and cybersecurity. It serves as a comprehensive collection of links to various repositories, books, courses, tools, and websites that cover topics such as penetration testing, ethical hacking, network security, cryptography, and more.
Pentesting This is a curated collection of resources, tools, and guides specifically tailored for penetration testers and cybersecurity professionals. It serves as a comprehensive repository featuring links to tools, frameworks, scripts, and tutorials that are essential for conducting penetration testing and vulnerability assessments.
Ethical Hacking This repo is a curated collection of tools, tutorials, books, and other resources focused on ethical hacking and cybersecurity. It serves as a comprehensive guide for individuals interested in learning ethical hacking techniques, penetration testing, and offensive security practices.
Awesome cyber security This is a curated collection of resources, tools, and educational materials focused on various aspects of cybersecurity. It serves as a comprehensive guide for cybersecurity professionals, enthusiasts, and students looking to expand their knowledge and skills in the field. The repository includes links to resources covering topics such as network security, web application security, cryptography, malware analysis, incident response, ethical hacking and more.

Interview

Resource Description
Top 50 Cyber Security Interview Questions and answers 2024 This article by edureka has provided cyber security interview questions and answers.This article consists of questions and answers with visually appealing tables and imageswhich makes users to get attracted to this article.This is one of the best article for interview preparation.
Cyber Security Interview Preparation guide This article consists of interview preparation guide for cybersecurity ,tips and tricks to crack cyber security interview.