CyberSecurity

Curated By

Avatar of gauthamkrishna1312 Avatar of potato-pzy

What is Cybersecurity ?

Cybersecurity is the practice of protecting computers, networks and data from attacks damages or unauthorized access from malicious intent users. Cybersecurity is rather a package of strategies, technologies and best practices that would help in safeguarding information and infrastructure of an organization. Its an every evolving field in which attackers and defenders are getting better day by day

Prerequisites

Cybersecurity is one of those field which has the lowest entry barrier no matter you background you can easily grasp these contents if you have a passion for learning new things, To be stated some of those are

  1. Basic computer know-how
  2. Networking Fundamentals such as TCP/IP protocol, OSI Model etc.
  3. Basic programming/scripting knowledge
  4. A mind to learn continuously, as cybersecurity is evolving day by day if you wont catch up with new things you would be left back

Topics To Learn

If you wanna dive into cybersecurity these are the topics that you should look for .

  1. Operating system security

    • Windows hardening

      • Group policy, Windows defender ATP, Patch management
    • Linux Security

      • Secure configuration
      • File permissions
      • acess control
  2. Network Security

    • Firewall configurations

      • Packet vs stateful inspection
      • Next gen Firewall
      • Firewall Configurations
    • Intrusion Detection and prevention system

      • Signature vs anomaly based
      • Installation & Configuration
    • VPN

      • Types of VPN
      • Remote acess configurations
    • Wireless Security

      • Wireless security hardening
      • Wireless intrusion detection
  3. Web Application Security

    • OWASP TOP 10

      • Top 10 vulnerabilities
      • Secure coding practises
    • API Security

      • Token based authentication
      • Rate limiting and logging
    • Web server security

      • SSL/TLS Configuration and certificate management
      • Server configuration for best security posture
  4. Cryptography

    • Encryption Algorithms

      • Symmetric encription
      • Assymetric encyption
    • Hashing

      • SHA 2, SHA 3
      • Digital Signature
  5. Penetration testing & Ethical Hacking

    • Reconnaissance

      • IFootprinting, OSINTncide
      • Network Mapping
    • Enumaration

      • Network scanning
      • Vulnerability scanning
    • Exploitation

      • Metasploit framework
      • OWASP ZAP
    • Post Exploitation

      • Privilage escalations
      • Backdoor creation
    • Covering Tracks

      • Log clearing
      • TImestamp tampering
  6. Incident response & Digital Forensics

    • Incident response framework

      • Nist Framework
      • Incident response plans
    • Forensics

      • Disk Imaging and memmory forensics
      • Log analysis and timeline reconstruction
  7. Security operation & Monitoring

    • Security Incident and event management

      • Log aggregation, correlation and alerting
      • incident detectionn and response integration
    • Threat Hunting

      • Procative hunting & behaviour analysis
      • Threat monitoring and visualization using ELK, Splunk etc.
    • Endpoint monitoring & Response ( EDR )

      • Monitoring for anomalies in endpoints
      • Automated contamination and remediation
  8. Cloud Security

    • Cloud Infrastructure Hardening:

      • Securing AWS< Azure and GCP enviornments.
      • Identity acess management ( IAM )
    • Container security :

      • Securing Kubernetes and docker deployments
      • Container scanning and runtime monitoring
    • Serverless Security

      • Risk and mitigation strategies for serverless computing architecture
      • Security functions and API gateways

Resources