CyberSecurity Development

From Think Outside the Circle
Revision as of 18:08, 14 May 2021 by Dginter (talk | contribs) (enabled some links)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Topics

Legal and Ethics

Cybersecurity Fundamentals

Threats and Adversaries

Vulnerabilities and Risk Management

Common Attacks

Basic Risk Assessment

Cryptography and Public Key Infrastructure

Data Security

Security Mechanisms

Security Countermeasures

Activiites

Network

Chickenman CTF

Intro to Wireshark

Wifi Cracking


System

Window 10 Admin Lab

Firewall lab

Virtualbox: Install HackLab

Cyber

Legal Analysis

Threats and adversaries

Steganography


pentesting

  • Security Audit/Interview
  • Info Gathering
  • Vulnerability Assessment
  • Exploitation
  • WebApp analysis (DVWA, then BurbSuite)

Python

Install

Varialbles

User Input

Coding Practice

Lists

More Lists

Strings and Files

Functions and Databases.

HTML/PHP/MySQL

Basic HTML

Forms

PHP

mysql

prigramming for security