Security Resource Hub
Hey there! Welcome to my asynchronous security resource hub! 🛡️
Get ready to explore the world of security at your own pace. From encryption to incident response, I’ve got you covered. So, buckle up and dive into the depths of multiple security topics! 🚀
-
-
Topic 1: The OSI Model
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.
-
Topic 2: Networking Architecture
A solid networking architecture is crucial to ensuring the safety and security of sensitive data within an organization.
A solid networking architecture is crucial to ensuring the safety and security of sensitive data within an organization.
-
Topic 3: Principles of Secure Networking Architecture
Best Practices for Implementing Secure Networking Architecture.
Best Practices for Implementing Secure Networking Architecture.
-
Topic 4: Subnetting and Proxies
Every IP address has two parts: the first indicates the network the address belongs to, and the second shows the device in the network.
Every IP address has two parts: the first indicates the network the address belongs to, and the second shows the device in the network.
-
Topic 5: Domain Name System (DNS)
The Domain Name System (DNS) is an essential internet component that often goes unnoticed by the average user.
The Domain Name System (DNS) is an essential internet component that often goes unnoticed by the average user.
-
Topic 6: Ports and Services
Using different ports is integral to the secure and efficient transfer of information in networking and data communication.
Using different ports is integral to the secure and efficient transfer of information in networking and data communication.
-
Topic 7: Networking Attacks
Networking attacks are a serious concern in today's digital landscape. These malicious activities can jeopardize the integrity, confidentiality, and availability of data and network resources.
Networking attacks are a serious concern in today's digital landscape. These malicious activities can jeopardize the integrity, confidentiality, and availability of data and network resources.
-
-
-
Topic 1: What is Application Security?
Application security refers to protecting software applications from various threats and vulnerabilities. It involves using hardware, software, and procedures to protect applications.
Application security refers to protecting software applications from various threats and vulnerabilities. It involves using hardware, software, and procedures to protect applications.
-
Topic 2: TLS/SSL Handshake
The SSL (Secure Sockets Layer) handshake is critical to establishing a secure communication channel between a client and a server over the Internet.
The SSL (Secure Sockets Layer) handshake is critical to establishing a secure communication channel between a client and a server over the Internet.
-
Topic 3: Vulnerability Scan and Penetration Test
A comparison between vulnerability Scanning and Penetration Testing.
A comparison between vulnerability Scanning and Penetration Testing.
-
Topic 4: Threat Intelligence and Hunting
Threat intelligence plays a crucial role in assessing applications, aiding in identifying and mitigating potential security risks by providing valuable insights into emerging and existing threats.
Threat intelligence plays a crucial role in assessing applications, aiding in identifying and mitigating potential security risks by providing valuable insights into emerging and existing threats.
-
Topic 5: SAST / DAST / IAST
SAST is best suited for identifying code-level vulnerabilities, DAST for detecting runtime vulnerabilities, and IAST for real-time monitoring and analysis during application execution.
SAST is best suited for identifying code-level vulnerabilities, DAST for detecting runtime vulnerabilities, and IAST for real-time monitoring and analysis during application execution.
-
Topic 6: Software Composition Analysis (SCA)
Software Composition Analysis (SCA) focuses on identifying and managing open-source and third-party components in software applications.
Software Composition Analysis (SCA) focuses on identifying and managing open-source and third-party components in software applications.
-
-
-
Topic 1: Attack Structure
A model developed by Lockheed Martin shows the cyber kill chain is a concept used to understand and prevent cyber attacks
A model developed by Lockheed Martin shows the cyber kill chain is a concept used to understand and prevent cyber attacks
-
Topic 2: Directory Traversal and File Manipulation
Directory traversal attacks are security exploits in which an attacker attempts to access files or directories stored outside the web root folder.
Directory traversal attacks are security exploits in which an attacker attempts to access files or directories stored outside the web root folder.
-
Topic 3: SQL Injection
SQL injections significantly threaten the security of databases and web applications.
SQL injections significantly threaten the security of databases and web applications.
-
Topic 4: Cross-Site Scripting
Cross-site scripting (XSS) is a security vulnerability typically found in web applications. It occurs when an attacker injects malicious scripts into web pages viewed by other users.
Cross-site scripting (XSS) is a security vulnerability typically found in web applications. It occurs when an attacker injects malicious scripts into web pages viewed by other users.
-
Topic 5: Cross-Site Request Forgery
CSRF, or Cross-Site Request Forgery, is a type of security exploit where an attacker tricks a user into unintentionally executing actions on a web application.
CSRF, or Cross-Site Request Forgery, is a type of security exploit where an attacker tricks a user into unintentionally executing actions on a web application.
-
Topic 6: Server-Side Request Forgery (SSRF)
Server-side request Forgery is a web security vulnerability that allows an attacker to induce the server-side application to request HTTP to an arbitrary domain of an attacker’s choosing.
Server-side request Forgery is a web security vulnerability that allows an attacker to induce the server-side application to request HTTP to an arbitrary domain of an attacker’s choosing.
-
Topic 7: No-SQL Injection
No-SQL injections occur when attackers exploit vulnerabilities in non-relational (No-SQL) databases to access or manipulate data.
No-SQL injections occur when attackers exploit vulnerabilities in non-relational (No-SQL) databases to access or manipulate data.
-
Topic 8: API Vulnerabilities
API vulnerabilities have become a significant concern in today's interconnected digital landscape. However, the very nature of this functionality also introduces potential security risks that organizations must actively address.
API vulnerabilities have become a significant concern in today's interconnected digital landscape. However, the very nature of this functionality also introduces potential security risks that organizations must actively address.
-
-
-
Topic 1: What is Infrastructure Security?
Infrastructure security in cloud computing refers to the set of practices, policies, and technologies implemented to safeguard the underlying framework that supports cloud services.
Infrastructure security in cloud computing refers to the set of practices, policies, and technologies implemented to safeguard the underlying framework that supports cloud services.
-
Securing Components of Infrastructure in the Cloud
-
Topic 3: Container Security
Containers are lightweight, portable, and self-sufficient units that encapsulate an application and its dependencies, allowing it to run consistently and reliably across different computing environments.
Containers are lightweight, portable, and self-sufficient units that encapsulate an application and its dependencies, allowing it to run consistently and reliably across different computing environments.
-
Topic 4: Kubernetes and container orchestration
Kubernetes, also known as K8s, is an open-source platform designed to automate the deployment, scaling, deployment, scaling, and management.
Kubernetes, also known as K8s, is an open-source platform designed to automate the deployment, scaling, deployment, scaling, and management.
-
Topic 5: Infrastructure as Code and CI/CD
IaC is used for managing infrastructure (such as networks, virtual machines, and load balancers) using code and software development techniques. This approach allows for the automation and provisioning of infrastructure, ensuring consistency and efficiency throughout the development and deployment processes.
IaC is used for managing infrastructure (such as networks, virtual machines, and load balancers) using code and software development techniques. This approach allows for the automation and provisioning of infrastructure, ensuring consistency and efficiency throughout the development and deployment processes.
-
-
-
Topic 1: What is Cryptography?
Cryptography mitigates the risks associated with unauthorized access and data breaches, upholding confidentiality and integrity across digital platforms.
Cryptography mitigates the risks associated with unauthorized access and data breaches, upholding confidentiality and integrity across digital platforms.
-
Topic 2: Symmetric Encryption and Algorithms
Symmetric key algorithms use a single key for both encryption and decryption.
Symmetric key algorithms use a single key for both encryption and decryption.
-
Topic 3: Asymmetric Encryption and Algorithms
Asymmetric encryption, also known as public-key cryptography, harnesses a pair of keys – a public key and a private key.
Asymmetric encryption, also known as public-key cryptography, harnesses a pair of keys – a public key and a private key.
-
Topic 4: Hashing Algorithms
Hashing is a fundamental concept that involves converting an input (or 'message') into a fixed-size string of characters, typically a sequence of numbers and letters.
Hashing is a fundamental concept that involves converting an input (or 'message') into a fixed-size string of characters, typically a sequence of numbers and letters.
-
-
-
Topic 1: What is Digital Forensics
Digital forensics focuses on identifying, preserving, analyzing, and presenting digital evidence.
Digital forensics focuses on identifying, preserving, analyzing, and presenting digital evidence.
-
Topic 2: Forensics for OS and File Systems
Conducting digital forensics in Windows, Linux, and MacOS environments.
Conducting digital forensics in Windows, Linux, and MacOS environments.
-
Topic 3: Forensics of Environments
Understanding different forensic environments, such as network, email and cloud.
Understanding different forensic environments, such as network, email and cloud.
-
Two separate forensic case studies.
-
-
-
Topic 1: Compliance Frameworks
Compliance frameworks are essential for organizations to adhere to industry regulations and standards. These frameworks provide structured governance, risk management, and compliance approaches, helping businesses mitigate risks and operate ethically.
Compliance frameworks are essential for organizations to adhere to industry regulations and standards. These frameworks provide structured governance, risk management, and compliance approaches, helping businesses mitigate risks and operate ethically.
-
Topic 2: Risk Management
Risk management is a crucial aspect that helps identify, assess, and prioritize potential risks; individuals and organizations can proactively minimize the impact of adverse events and capitalize on opportunities.
Risk management is a crucial aspect that helps identify, assess, and prioritize potential risks; individuals and organizations can proactively minimize the impact of adverse events and capitalize on opportunities.
-
Topic 3: Business Continuity and Impact Analysis
Business Continuity Planning (BCP) is developing and implementing strategies and procedures to ensure the continuity of essential business functions and services during and after disruptive events, such as natural disasters, cyberattacks, or other emergencies.
Business Continuity Planning (BCP) is developing and implementing strategies and procedures to ensure the continuity of essential business functions and services during and after disruptive events, such as natural disasters, cyberattacks, or other emergencies.
-
-
-
Topic 1: Authentication and Authorization
Authentication is verifying the identity of users or entities attempting to access a system, application, or resource. Authorization determines what actions or resources users can access after successful authentication.
Authentication is verifying the identity of users or entities attempting to access a system, application, or resource. Authorization determines what actions or resources users can access after successful authentication.
-
Topic 2: Identity Federation and Single Sign-On
Identity Federation operates across multiple domains or environments. SSO focuses on seamless access to various applications within the same domain or environment.
Identity Federation operates across multiple domains or environments. SSO focuses on seamless access to various applications within the same domain or environment.
-
Understanding the workings of SAML, OAuth, OIDC
-
Topic 4: Privileged Access Management and IAM Auditing
Privileged Access Management (PAM) controls and monitors access to privileged accounts and resources within an organization's IT environment. IAM auditing helps organizations identify and mitigate security risks, improve operational efficiency, and demonstrate compliance with relevant regulations.
Privileged Access Management (PAM) controls and monitors access to privileged accounts and resources within an organization's IT environment. IAM auditing helps organizations identify and mitigate security risks, improve operational efficiency, and demonstrate compliance with relevant regulations.
-
Topic 5: Kerberos and NTLM
Kerberos is a network authentication protocol that uses secret-key cryptography to provide strong authentication for client-server applications. NTLM is a proprietary authentication protocol used by Windows OS for network authentication and secure communication.
Kerberos is a network authentication protocol that uses secret-key cryptography to provide strong authentication for client-server applications. NTLM is a proprietary authentication protocol used by Windows OS for network authentication and secure communication.
-