0% found this document useful (0 votes)
82 views3 pages

Cyber Security_ Zero to Mastery

The document provides a comprehensive list of resources for a Cyber Security course, covering topics such as the history of cyber security, understanding hackers, security vulnerabilities, social engineering, endpoint protection, network security, and anonymity. It includes links to articles, courses, tools, and books that are essential for mastering cyber security concepts. The resources are categorized into eight main sections for easy navigation and learning.

Uploaded by

esserraradam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views3 pages

Cyber Security_ Zero to Mastery

The document provides a comprehensive list of resources for a Cyber Security course, covering topics such as the history of cyber security, understanding hackers, security vulnerabilities, social engineering, endpoint protection, network security, and anonymity. It includes links to articles, courses, tools, and books that are essential for mastering cyber security concepts. The resources are categorized into eight main sections for easy navigation and learning.

Uploaded by

esserraradam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber Security: Zero to Mastery

For more courses, resources and workshop, visit https://zerotomastery.io

Resources for the course:

1. Introduction To Cyber Security & History:

- Short History of Cyber Security - https://cyber-security.degree/resources/history-of-cyber-security/

- Cyber Security Roles - https://www.geeksforgeeks.org/different-job-roles-in-cyber-security/

- How to Approach the Cyber Security field - https://cybersecurityguide.org/resources/cybersecurity-jobs/

2. Cyber Security Basics & Theory & Goals:

- How Companies Get Hacked - https://nanetech.com/2021/07/30/5-common-ways-businesses-get-hacked/

- Cyber Security News - https://cyware.com/cyber-security-news-articles

- Red Team Vs Blue Team - https://www.emagined.com/red-team-and-blue-team

3) Understand Hackers - The Biggest Threat:

- White Hat, Black Hat, Gray Hat - https://www.kaspersky.com/resource-center/definitions/hacker-hat-types

- Biggest Data Breaches - https://www.upguard.com/blog/biggest-data-breaches

- How Does Typical Malware Work - https://www.avast.com/c-malware

4) Security Bugs & Vulnerabilities - Basics:

- Latest Cyber Security Vulnerability News - https://portswigger.net/daily-swig/vulnerabilities

- Vulnerability & Threats & Exploits - https://www.rapid7.com/fundamentals/vulnerabilities-exploits-threats/


- Zero To Mastery Ethical Hacking Course Covering Vulnerabilities -
https://zerotomastery.io/courses/learn-ethical-hacking/

- Zero To Mastery Bug Bounty Course Covering Web Vulnerabilities -


https://zerotomastery.io/courses/learn-penetration-testing/

- Buffer Overflow Introduction - https://owasp.org/www-community/vulnerabilities/Buffer_Overflow

- Hacking The Art Of Exploitation Book -


https://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441

- Book for Python Hacking - https://www.amazon.com/Black-Hat-Python-2nd-Programming/dp/1718501129

5) Social Engineering Basics:

- Preventing Social Engineering Attacks -


https://www.stickmancyber.com/cybersecurity-blog/8-ways-organisations-prevent-social-engineering-attacks

- Email Message Header Analyzer - https://mha.azurewebsites.net

6) Endpoint Protection Security:

- Brave Browser - https://brave.com

- Kali Linux OS For Penetration Testing - https://www.kali.org

- Read on XProtect For Mac -


https://www.howtogeek.com/217043/xprotect-explained-how-your-macs-built-in-anti-malware-works/

- Ubuntu Disk Encryption - https://ubuntu.com/core/docs/uc20/full-disk-encryption

- Keepass Password Manager - https://keepass.info

- Bitdefender Antivirus - https://www.bitdefender.com

- Process Explorer - https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer

- Wireshark - https://www.wireshark.org

- Rootkit Hunter - https://www.kali.org/tools/rkhunter/

- IPTables Guide - https://man7.org/linux/man-pages/man8/iptables.8.html

- Article On OS Hardening - https://www.trentonsystems.com/blog/system-hardening-overview

- Qubes OS - https://www.qubes-os.org

7) Network Security:

- Types of Firewalls - https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html


- pfsense - https://www.pfsense.org

- Nmap Network Scanner - https://nmap.org

- Nmap Manual - https://linux.die.net/man/1/nmap

- Designing Secure Industrial Networks Steps -


https://www.isa.org/intech-home/2017/november-december/features/three-keys-designing-configuring-secure-netw
orks

- Routersploit - https://github.com/threat9/routersploit

- Wireless Security - https://www.cisco.com/c/en/us/products/wireless/what-is-wi-fi-security.html

- MITRE ATT&CK - https://attack.mitre.org

8) Anonymity & Privacy:

- Tor Browser - https://www.torproject.org/download/

- VPN vs Proxy - https://nordvpn.com/blog/vpn-vs-proxy/

- DuckDuckGo - https://duckduckgo.com

- Quick Guide to Anonymity - https://www.security.org/vpn/anonymity/

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy