From 7ef7863f1946563e3553756a3a73dbd0a7945568 Mon Sep 17 00:00:00 2001 From: Ata Tekeli Date: Thu, 11 Apr 2024 15:17:24 +0300 Subject: [PATCH 1/4] add bluetooth security resources from norton us and bluetooth official website --- .../100-basic-it-skills/101-connection-types/102-bluetooth.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/102-bluetooth.md b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/102-bluetooth.md index f9228918f56c..492a3f187093 100644 --- a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/102-bluetooth.md +++ b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/102-bluetooth.md @@ -15,3 +15,6 @@ Below are some key points about Bluetooth: - **Potential vulnerabilities**: Despite its built-in security measures, Bluetooth is not immune to cyber attacks. Some common risks include "bluejacking" (unauthorized sending of messages or files), "bluesnarfing" (unauthorized access to device data), and "BlueBorne" (an attack vector that exploits Bluetooth connections to infiltrate devices and spread malware). Users should be cautious in their usage of Bluetooth and follow best practices like not accepting unknown connection requests and turning off Bluetooth when not in use. In conclusion, Bluetooth offers a convenient means of connecting devices wirelessly. While it provides reasonably secure communication, users must stay informed about potential vulnerabilities and follow good security practices to safeguard their devices. + +- [Bluetooth security risks to know (and how to avoid them)](https://us.norton.com/blog/mobile/bluetooth-security) +- [Bluetooth security best practices from official website](https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/) From 88ed941397708e36af3217e8e189f73556dc8c5d Mon Sep 17 00:00:00 2001 From: Ata Tekeli Date: Fri, 12 Apr 2024 14:44:16 +0300 Subject: [PATCH 2/4] add video to basics of computer networking for cybersecurity roadmap --- .../100-basic-it-skills/104-basics-of-computer-networking.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/104-basics-of-computer-networking.md b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/104-basics-of-computer-networking.md index ec9fe684d69a..2df37aa30668 100644 --- a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/104-basics-of-computer-networking.md +++ b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/104-basics-of-computer-networking.md @@ -51,4 +51,5 @@ The Open Systems Interconnection (OSI) model is a conceptual framework used to u Mastering the basics of computer networking is key to understanding and implementing effective cyber security measures. This chapter has covered essential networking concepts, but it is important to continually expand your knowledge in this ever-evolving field. -- [What is Computer Networking?](https://tryhackme.com/room/whatisnetworking) \ No newline at end of file +- [What is Computer Networking?](https://tryhackme.com/room/whatisnetworking) +- [Learn Networking in 3 hours (basics for cybersecurity and DevOps)](https://www.youtube.com/watch?v=iSOfkw_YyOU&t=1549s) From 7d87f30d1ecb686b6ad43a5da141e61bba0e827d Mon Sep 17 00:00:00 2001 From: Ata Tekeli Date: Fri, 19 Apr 2024 12:32:44 +0300 Subject: [PATCH 3/4] add Linux Commands Cheat Sheet Added Linux Commands Cheat Sheet to 101-linux.md --- .../cyber-security/content/101-operating-systems/101-linux.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/101-linux.md b/src/data/roadmaps/cyber-security/content/101-operating-systems/101-linux.md index dd81dd3c7133..ce69254d7a3a 100644 --- a/src/data/roadmaps/cyber-security/content/101-operating-systems/101-linux.md +++ b/src/data/roadmaps/cyber-security/content/101-operating-systems/101-linux.md @@ -33,4 +33,5 @@ While Linux is inherently secure, there are best practices to enhance your syste By understanding Linux's features and best practices, you can leverage its powerful capabilities and robust security features to enhance your computing environment's performance and safety. - [Learn Linux](https://linuxjourney.com/) -- [Introduction to Linux](https://youtu.be/sWbUDq4S6Y8) \ No newline at end of file +- [Introduction to Linux](https://youtu.be/sWbUDq4S6Y8) +- [Linux Commands Cheat Sheet](https://cdn.hostinger.com/tutorials/pdf/Linux-Commands-Cheat-Sheet.pdf?_ga=2.100546909.2114439087.1713515209-1230351550.1713515209) From c457fe22eb94aadd2dd82a5fa9f3becfbcf6be0b Mon Sep 17 00:00:00 2001 From: Ata Tekeli Date: Wed, 24 Apr 2024 12:39:00 +0300 Subject: [PATCH 4/4] add virtual machine explanation from abhishek veeramalla's devops zero to hero course --- .../110-virutalization-basics/101-vm.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/101-vm.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/101-vm.md index d747d7879b6d..6250eb5f9fb8 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/101-vm.md +++ b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/101-vm.md @@ -39,3 +39,5 @@ There is a wide range of virtualization software available, including: - Oracle VM VirtualBox: A Type 2 hypervisor that runs on Windows, macOS, and Linux hosts, popular for desktop virtualization. In conclusion, virtual machines play a critical role in modern computing, providing a flexible and efficient method to optimize computing resources, isolate applications, and enhance security. Understanding VMs and virtualization technology is an essential part of any comprehensive cybersecurity guide. + +[Virtual Machines Part-1 by Abhishek Veeramalla](https://www.youtube.com/watch?v=lgUwYwBozow)