CyberSecurity
What is Cybersecurity ?
Cybersecurity is the practice of protecting computers, networks and data from attacks damages or unauthorized access from malicious intent users. Cybersecurity is rather a package of strategies, technologies and best practices that would help in safeguarding information and infrastructure of an organization. Its an every evolving field in which attackers and defenders are getting better day by day
Prerequisites
Cybersecurity is one of those field which has the lowest entry barrier no matter you background you can easily grasp these contents if you have a passion for learning new things, To be stated some of those are
- Basic computer know-how
- Networking Fundamentals such as TCP/IP protocol, OSI Model etc.
- Basic programming/scripting knowledge
- A mind to learn continuously, as cybersecurity is evolving day by day if you wont catch up with new things you would be left back
Topics To Learn
If you wanna dive into cybersecurity these are the topics that you should look for .
Operating system security
Windows hardening
- Group policy, Windows defender ATP, Patch management
Linux Security
- Secure configuration
- File permissions
- acess control
Network Security
Firewall configurations
- Packet vs stateful inspection
- Next gen Firewall
- Firewall Configurations
Intrusion Detection and prevention system
- Signature vs anomaly based
- Installation & Configuration
VPN
- Types of VPN
- Remote acess configurations
Wireless Security
- Wireless security hardening
- Wireless intrusion detection
Web Application Security
OWASP TOP 10
- Top 10 vulnerabilities
- Secure coding practises
API Security
- Token based authentication
- Rate limiting and logging
Web server security
- SSL/TLS Configuration and certificate management
- Server configuration for best security posture
Cryptography
Encryption Algorithms
- Symmetric encription
- Assymetric encyption
Hashing
- SHA 2, SHA 3
- Digital Signature
Penetration testing & Ethical Hacking
Reconnaissance
- IFootprinting, OSINTncide
- Network Mapping
Enumaration
- Network scanning
- Vulnerability scanning
Exploitation
- Metasploit framework
- OWASP ZAP
Post Exploitation
- Privilage escalations
- Backdoor creation
Covering Tracks
- Log clearing
- TImestamp tampering
Incident response & Digital Forensics
Incident response framework
- Nist Framework
- Incident response plans
Forensics
- Disk Imaging and memmory forensics
- Log analysis and timeline reconstruction
Security operation & Monitoring
Security Incident and event management
- Log aggregation, correlation and alerting
- incident detectionn and response integration
Threat Hunting
- Procative hunting & behaviour analysis
- Threat monitoring and visualization using ELK, Splunk etc.
Endpoint monitoring & Response ( EDR )
- Monitoring for anomalies in endpoints
- Automated contamination and remediation
Cloud Security
Cloud Infrastructure Hardening:
- Securing AWS< Azure and GCP enviornments.
- Identity acess management ( IAM )
Container security :
- Securing Kubernetes and docker deployments
- Container scanning and runtime monitoring
Serverless Security
- Risk and mitigation strategies for serverless computing architecture
- Security functions and API gateways
Resources
References
- https://docs.paloaltonetworks.com
- https://www.snort.org/
- https://www.wi-fi.org/
- https://owasp.org/Top10/
- https://nginx.org/en/docs/
- https://csrc.nist.gov/projects/cryptographic-standards-and-guidelines
- https://owasp.org/www-project-web-security-testing-guide/
- https://docs.rapid7.com/metasploit/
- https://www.google.com/search?q=https://owasp.org/www-project-zap/&authuser=2
Online Courses
Blogs
Tutorials
Apps