todo: note that this outline has been generated with ChatGPT, and it’s purpose is for me to have a general scheme to follow when learning cybersecurity stuff.
Fundamentals of Cybersecurity:
Types of Threats and Attack Vectors:
- Malware
- Social Engineering Attacks
- Network Attacks
- Application and Software Attacks
- Advanced Persistent Threats (APTs)
Network Security:
Authentication, Authorization, and Access Control:
- Authentication Mechanisms
- Authorization and Access Control Models
- Identity and Access Management (IAM)
- Public Key Infrastructure (PKI)
Cryptography Basics:
- Symmetric and Asymmetric Encryption
- Hashing and Integrity Verification
- Digital Signatures and Certificates
- Key Management Practices
Application Security:
- Secure Software Development Lifecycle (SDLC)
- Common Vulnerabilities
- Application Security Testing
- API Security
Operating System Security:
- Security in Windows, Linux, and macOS
- Hardening Techniques
- Patch Management
- Endpoint Detection and Response (EDR)
Cloud Security:
- Cloud Security Basics
- Data Security in the Cloud
- Cloud Access Security Brokers (CASB)
- Container and Orchestration Security
Incident Response and Management:
- Incident Response Lifecycle
- Forensic Analysis Basics
- Incident Response Tools
- Disaster Recovery and Business Continuity
Security Testing and Vulnerability Assessment:
Cybersecurity Tools and Technologies:
- Antivirus and Endpoint Security
- Security Information and Event Management (SIEM)
- Threat Intelligence Platforms
- Encryption and Secure Communication Tools
Cybersecurity Policies, Laws, and Ethics:
Emerging Topics in Cybersecurity: