Difference between revisions of "CyberSecurity Development"
Jump to navigation
Jump to search
(Added a Section for Activities) |
m |
||
Line 1: | Line 1: | ||
=== Topics === | === Topics === | ||
− | |||
− | [[ | + | ==== [[LegalEthics|Legal and Ethics]] ==== |
− | [[ | + | ==== [[Cybersecurity Fundamentals]] ==== |
− | [[ | + | ==== [[Threats and Adversaries]] ==== |
− | + | ==== [[Vulnerabilities and Risk Management]] ==== | |
− | + | ==== Common Attacks ==== | |
− | + | ==== Basic Risk Assessment ==== | |
− | + | ==== [[Cryptography and Public Key Infrastructure]] ==== | |
− | Security Mechanisms | + | ==== Data Security ==== |
+ | |||
+ | ==== Security Mechanisms ==== | ||
+ | |||
+ | ==== Security Countermeasures ==== | ||
− | |||
=== Activiites === | === Activiites === |
Revision as of 13:59, 14 May 2021
Topics
Legal and Ethics
Cybersecurity Fundamentals
Threats and Adversaries
Vulnerabilities and Risk Management
Common Attacks
Basic Risk Assessment
Cryptography and Public Key Infrastructure
Data Security
Security Mechanisms
Security Countermeasures
Activiites
Network
Chickenman CTF
Intro to Wireshark
Wifi Cracking
System
Window 10 Admin Lab
Virtualbox: Install HackLab
Cyber
Legal Analysis
Threats and adversaries
Steganography
pentesting
- Security Audit/Interview
- Info Gathering
- Vulnerability Assessment
- Exploitation
- WebApp analysis (DVWA, then BurbSuite)
Python
Install
Varialbles
User Input
Coding Practice
Lists
More Lists
Strings and Files
Functions and Databases.
HTML/PHP/MySQL
Basic HTML
Forms
PHP
mysql
prigramming for security