Version v0.2
This repository aims to highlight relevant topics pertaining to learning Information Security / Cybersecurity.
Subject | Resources |
---|---|
Linux and the Command Line | - Is the Terminal Still Worth Learning? - Beginner's Guide to the Bash Terminal - OverTheWire - Bandit |
Virtual Machines | - Introduction to Virtual Machines by NetworkChuck - More on Virtual Machines from IBM |
Maths - Limits | |
Maths - Differentiation | |
Maths - Integration | |
Maths - Discrete Mathematics | - Discrete Mathematics, An Open Introduction by Oscar Levin - Proofs & Concepts, the Fundamentals of Abstract Mathematics by Dave Witte Morris and Joy Morris |
Subject | Resources |
---|---|
IT Security Fundamentals | |
Networking Fundamentals | - Cybrary - Network+ (Modules 1-3) |
Building Computer Networks | - Computer Networking, A Top Down Approach by James F. Kurose & Keith W. Ross |
Configuring Networks | |
Network Security | |
Advanced Network Security | |
Firewalls | - Mastering pfSense by David Zientara |
Windows Server Management | |
Linux Server Management | |
Web Systems & Services |
Subject | Resources |
---|---|
Introduction to Programming in C++ | - The C++ Programming Language by Bjarne Stroustrup - Computer Science With C++ by Sumita Arora |
Programming in Python | - Learn Python the Hard Way by Zed Shaw - Learn More Python3 the Hard Way by Zed Shaw - Black Hat Python by Justin Seitz |
Programming in Go | - The Go Programming Language by Alan A. A. Donovan & Brian Kernighan - Black Hat Go by Tom Steele, Lord Christopher Patten, & Dan Kottmann |
Data Structures and Algorithms | - Algorithms (The MIT Press Essential Knowledge series) by Panos Louridas - Algorithms Unlocked by Thomas H. Cormen |
Systems Programming | - MIT Missing Semester - Computer Science, A Programmer's Perspective by Randal E. Bryant & David R. O'Hallaron |
Systems Architecture | Computer Systems, A Programmer's Perspective by Randal E. Bryant & David R. O'Hallaron |
Systems Administration | |
CI/CD + DevOps | |
Software Security | - Computer and Internet Security by Wenliang Du (Part I) |
Subject | Resources |
---|---|
Designing Networks | |
Building Automation Tools | |
Designing Cloud Infrastructure | |
Systems Analysis | Systems Analysis & Design by John W. Satzinger, Robert Jackson, & Stephen D. Burd |
Scalable, Distributed Systems | - Building Secure And Reliable Systems |
Subject | Resources |
---|---|
SQL Databases - MySQL | |
SQL Databases - PostgreSQL | |
Designing Databases with ER Diagrams | |
NoSQL Databases - MongoDB |
Subject | Resources |
---|---|
Setting up a Hacking Lab | - How to Set Up a Hacking Lab by NetworkChuck - Building a Cybersecurity HomeLab by Grant Collins |
Google Cloud | |
AWS | |
Docker | |
Terraform | |
Ansible |
Subject | Resources |
---|---|
System Monitoring | |
Securing Application Programming Interfaces (APIs) | |
Access Control & Intrusion Detection | |
Advanced Network Security with pfSense | |
Building Secure Systems | - Building Secure And Reliable Systems |
Subject | Resources |
---|---|
Computer Forensics | |
Ethical Hacking and Penetration Testing | |
Bug Bounty Track | - HTB Academy, Bug Bounty Track |
Open Source Intelligence | - Open Source Intelligence Techniques by Michael Bazzell - HTB Academy, OSINT Corporate Recon |
Subject | Resources |
---|---|
Software Project Management | - Information Technology Project Management, Providing Measurable Organizational Value by Jack T. Marchewka |
FedRAMP Cloud Security Guide | |
Disaster Recovery & Management |
Lists various domains of information security and their constituent concepts to learn. This list is based on my personal experience of learning and working within the information security industry.
Lists concepts from concepts.md
and their relevant learning resources.
- Add links to relevant online courses.
- Create suggestive time table for studying.