Difference between revisions of "CyberSecurity Development"

From Think Outside the Circle
Jump to navigation Jump to search
m
m (enabled some links)
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
[[LegalEthics|Legal and Ethics]]
+
=== Topics ===
  
[[Cybersecurity Fundamentals]]
+
==== [[LegalEthics|Legal and Ethics]] ====
  
[[Threats and Adversaries]]
+
==== [[Cybersecurity Fundamentals]] ====
  
[[Vulnerabilities and Risk Management]]
+
==== [[Threats and Adversaries]] ====
  
Common Attacks
+
==== [[Vulnerabilities and Risk Management]] ====
  
Basic Risk Assessment
+
==== [[Common Attacks]] ====
  
[[Cryptography and Public Key Infrastructure]]
+
==== [[Basic Risk Assessment]] ====
  
Data Security
+
==== [[Cryptography and Public Key Infrastructure]] ====
  
Security Mechanisms
+
==== [[Data Security]] ====
  
Security Countermeasures
+
==== [[Security Mechanisms]] ====
 +
 
 +
==== [[Security Countermeasures]] ====
 +
 
 +
 
 +
=== Activiites ===
 +
 
 +
==== Network ====
 +
Chickenman CTF
 +
 
 +
Intro to Wireshark
 +
 
 +
Wifi Cracking
 +
 
 +
 
 +
==== System ====
 +
Window 10 Admin Lab
 +
 
 +
[[Firewall lab]]
 +
 
 +
Virtualbox: Install HackLab
 +
 
 +
==== Cyber ====
 +
Legal Analysis
 +
 
 +
Threats and adversaries
 +
 
 +
Steganography
 +
 
 +
 
 +
pentesting
 +
 
 +
* Security Audit/Interview
 +
* Info Gathering
 +
* Vulnerability Assessment
 +
* Exploitation
 +
* WebApp analysis (DVWA, then BurbSuite)
 +
*
 +
 
 +
==== Python ====
 +
Install
 +
 
 +
Varialbles
 +
 
 +
User Input
 +
 
 +
Coding Practice
 +
 
 +
Lists
 +
 
 +
More Lists
 +
 
 +
Strings and Files
 +
 
 +
Functions and Databases.
 +
 
 +
==== HTML/PHP/MySQL ====
 +
Basic HTML
 +
 
 +
Forms
 +
 
 +
PHP
 +
 
 +
mysql
 +
 
 +
prigramming for security

Latest revision as of 18:08, 14 May 2021

Topics

Legal and Ethics

Cybersecurity Fundamentals

Threats and Adversaries

Vulnerabilities and Risk Management

Common Attacks

Basic Risk Assessment

Cryptography and Public Key Infrastructure

Data Security

Security Mechanisms

Security Countermeasures

Activiites

Network

Chickenman CTF

Intro to Wireshark

Wifi Cracking


System

Window 10 Admin Lab

Firewall lab

Virtualbox: Install HackLab

Cyber

Legal Analysis

Threats and adversaries

Steganography


pentesting

  • Security Audit/Interview
  • Info Gathering
  • Vulnerability Assessment
  • Exploitation
  • WebApp analysis (DVWA, then BurbSuite)

Python

Install

Varialbles

User Input

Coding Practice

Lists

More Lists

Strings and Files

Functions and Databases.

HTML/PHP/MySQL

Basic HTML

Forms

PHP

mysql

prigramming for security