Uploaded by Leo

cyber-security-roadmap

advertisement
CTFs (Capture the Flag)
Find the detailed version of this roadmap
along with resources and other roadmaps
HackTheBox
https://roadmap.sh
Cyber Security
TryHackMe
VulnHub
picoCTF
Fundamental IT Skills
SANS Holiday Hack Challenge
Computer Hardware Components
Certifications
Connection Types and their function
Beginner Certifications
OS-Independent Troubleshooting
CompTIA A+
Understand Basics of Popular Suites
CompTIA Linux+
CompTIA Network+
NFC
WiFi
iCloud
Bluetooth
Google Suite
Infrared
Microsoft O!ce Suite
Basics of Computer Networking
CCNA
CompTIA Security+
Linux
Windows
MacOS
Advanced Certifications
Operating Systems
CISSP
CISA
CISM
Basics of Subnetting
GSEC
GPEN
GWAPT
Public vs Private IP Addresses
Learn following for Each
GIAC
OSCP
CREST
IP Terminology
Installation and Configuration
localhost
CEH
loopback
subnet mask
CIDR
Di"erent Versions and Di"erences
default gateway
Navigating using GUI and CLI
Understand the Terminology
VMWare
VirtualBox
esxi
proxmox
VLAN
Common Virtualization Technologies
Hypervisor
VM
GuestOS
DMZ
NAT
IP
VM
DNS
Router
HostOS
ARP
Understand Permissions
Installing Software and Applications
DHCP
Performing CRUD on Files
VPN
Troubleshooting
Switch
Understand basics of Virtualization
MAN
LAN
Troubleshooting Tools
nslookup
iptables
ipconfig
ping
dig
nmap
route
DHCP
Port Scanners
arp
WLAN
Understand these
Packet Sni"ers
netstat
WAN
Common Commands
NTP
IPAM
Understand the OSI model
Function of Each
Protocol Analyzers
tcpdump
DNS
Networking Knowledge
Network Topologies
tracert
Star
Ring
Mesh
Bus
Common Protocols and their Uses
Authentication Methodologies
Kerberos
LDAP
Certificates
Understand Common Protocols
SSO
Local Auth
SSH
RADIUS
RDP
FTP
HTTP / HTTPS
Common Ports and their Uses
SFTP
SSL and TLS Basics
SSL / TLS
Basics of NAS and SAN
Understand Common Hacking Tools
Core Concepts of Zero Trust
Understand Common Exploit Frameworks
Blue Team vs Red Team vs Purple Team
Roles of Compliance and Auditors
Understand Concept of Defense in Depth
False Negative / False Positive
Understand the Definition of Risk
Understand Concept of Runbooks
True Negative / True Positive
Understand Backups and Resiliency
Understand Basics of Forensics
Cyber Kill Chain
Basics and Concepts of Threat Hunting
Basics of Threat Intel, OSINT
MFA and 2FA
Understand Handshakes
Basics of Vulnerability Management
Operating System Hardening
Understand CIA Triad
Basics of Reverse Engineering
Understand the Concept of Isolation
Privilege escalation / User based Attacks
Penetration Testing Rules of Engagement
Basics of IDS and IPS
Perimiter vs DMZ vs Segmentation
Honeypots
Web Based Attacks and OWASP 10
Authentication vs Authorization
Learn how Malware Operates and Types
Security Skills and Knowledge
Tools for Incident Response and Discovery
nmap
tracert
ipconfig
head
nslookup
hping
tail
ping
grep
memdump
dig
arp
FTK Imager
Salting
curl
cat
wireshark
Basics of Cryptography
dd
PKI
winhex
Kill chain
autopsy
NIST
SIEM
CIS
NIDS
NIPS
Impersonation
HIPS
Host Based Firewall
DoS vs DDoS
EAP vs PEAP
Evil Twin
WPS
netflow
Firewall Logs
Identification
Containment
Eradication
Recovery
Lessons Learned
Understand Hardening Concepts
MAC-based
NAC-based
Group Policy
ACLs
Sinkholes
Zero Day
Patching
Known vs Unknown
MITM
VirusTotal
Joe Sandbox
Spoofing
Deauth Attack
VLAN Hopping
Rogue Access Point
War-driving/dialing
Bu"er Overflow
SQL Injection
Memory Leak
CSRF
Pass the Hash
XSS
Replay Attack
Directory Traversal
Understand Audience
APT
Stakeholders
HR
Legal
Compliance
Management
Understand Common Tools
Endpoint Security
ARP Poisoning
DNS Poisoning
Understand Threat Classification
Port Blocking
Typo Squatting
Common Network Based Attacks
Understand the Incident Response Process
syslogs
Watering Hole Attack
Brute Force vs Password Spray
DLP
Preparation
Zero Day
Reconnaissance
Drive by Attack
EDR
ACL
Tailgating
Social Engineering
S/MIME
WPA vs WPA2 vs WPA3 vs WEP
Learn how to find and use these logs
Jump Server
Antimalware
Sandboxing
Kali Linux
LOLBAS
Packet Captures
SRTP
Shoulder Surfing
Dumpster Diving
IPSEC
Firewall and Nextgen Firewall
Using tools for unintended purposes
Event Logs
LDAPS
Antivirus
CSF
ParrotOS
Spam vs Spim
Understand the following Terms
Common Distros for Hacking
SOAR
Phishing vs Vishing vs Whaling vs Smishing
Obfuscation
SSL vs TLS
DNSSEC
Diamond Model
RMF
Understand
Pvt Key vs Pub Key
FTP vs SFTP
Understand Common Standards
ISO
Key Exchange
Understand Secure vs Unsecure Protocols
Understand Frameworks
ATT&CK
Hashing
Attack Types and Di"erences
any.run
urlvoid
urlscan
WHOIS
Cloud skills and Knowledge
Understand Cloud Services
Understand concepts of security in the cloud
Understand the basics and general flow of deploying in the cloud
SaaS
PaaS
IaaS
Common Cloud Environments
AWS
GCP
Azure
Understand the di"erences between cloud and on-premises
Common Cloud Storage
Cloud Models
Understand the concept of infrastructure as code
Private
Public
Hybrid
Understand the concept of Serverless
S3
Dropbox
OneDrive
Understand the concept of CDN
Box
Google Drive
iCloud
Programming Skills and Knowledge (Optional But Recommended)
Python
Go
JavaScript
C++
Keep Learning
Bash
Power Shell
Download