Git Product home page Git Product logo

hacking-roadmap's Introduction

Repo content :: by th3void

Cybersecurity Roadmap by harisqazi1

https://github.com/harisqazi1/Cybersecurity

##./DarkWeb_docs: BlueLiv_DARK_COMMERCE_US-letter_digital.pdf Dark-Web-Beginners-Security-Guide-Jolly_Rogers).pdf Internal-Wolves of the Internet Final.pdf TerbiumLabs-The-Truth-About-the-Dark-Web.pdf [email protected]

./data-cheat:

intel-pentium-d480-775-data cheat.pdf

./hacking:

501 Website Hacking Secrets.pdf
773 Servidores Tipos e Hardware.pdf
blockchain.pdf
BZ-Backtrack.usage.pdf
Cabeamento Estruturado.pdf
Ch04-Malware.pdf
GuardWeb_Livro-Tecnicas-De-Invasao.pdf
Guia do Hacker Brasileiro.pdf
Linux Basics for Hackers.epub
Livro Proibido do Curso de Hacker.pdf
O_Guia_do_Hacker_1_edicao.pdf
RTFM - Red Team Field Manual v3.pdf
Syngress.The_.Basics.of_.Hacking.and_.Penetration.Testing.Aug_.2011.pdf
tc3a9cnicas-para-anc3a1lise-dinc3a2mica-de-malware.pdf
XSS.pdf

./java:

kotlin-docs.pdf

./Linux:

Linux_Basics_for_Hackers_Getting_Started.pdf

./python:

Ethical-Hacking.pdf

./ruby:

Curso de Ruby.pdf
RubyOnRailsNotesForProfessionals.pdf
ruby-on-rails-tutorial.pdf
ruby.pdf

./rust:

rust-programming-language-steve-klabnik.pdf

Cybersecurity Document v2 (In-Progress) - 11/4/2020 By https://github.com/harisqazi1/Cybersecurity

This is meant to assist people looking for entry level Cybersecurity jobs and learn hacking skills. Meant to be a Swiss Army Knife for looking for Entry-level jobs (expanding to full cybersecurity in the near future). A work in progress, so if you see mistakes, please mention it in the "Issues" section.

NOTE: I DO NOT OWN ANY OF OF THIS INFORMATION. THIS IS JUST MEANT TO BE A COMPILATION OF VARIOUS RESOURCES. SOURCES ON THE BOTTOM.

Table of contents

Entry Level Job Titles (Not Cybersecurity per-se, but for getting a foothold in the industry)

IT Support Techinician - Using a ticketing system for internal support requests and installing programs on computers.

IT Helpdesk Tier 1 - Using a ticketing system to provide support, as well as providing technical support over the phone.

Junior Network Technician - Assisting in adding users to the network, modifying user access, and performing basic network maintenance tasks.

System Administrator - Responsible for the configuration, upkeep and reliable operation of a company’s network and computer systems.

Data Administrator - Use specialized software to store and organize data.

Network Administrator - Manage an organization's computer networks.

IT Technician - Provide general desktop and printer support for a company and/or its clients, or they provide network support.

Security Administrator - Installs, administers, and troubleshoots an organization's security solutions.

Network Engineer - Design, build, implement and maintain the computer networks businesses and organizations use.

Entry-Level Job Titles (Cybersecurity)

Information Security Analyst - Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information.

Junior Penetration Tester - Hired by a client to bypass or defeat security controls.

Cybersecurity (Security) Technician / Specialist - Protects computer assets by establishing and documenting access; maintaining files.

Cyber Crime Analyst/Investigator - Information security professionals who use their skills and background knowledge in areas like network administration or network engineering to help counter the activities of cyber criminals such as hackers and developers of malicious software.

Incident Analyst/Responder - Require an understanding of security operations, a solid foundation of technical skills related to information and network security, and strong communication skills.

IT Auditor - Responsible for analyzing and assessing a company’s technological infrastructure to ensure processes and systems run accurately and efficiently, while remaining secure and meeting compliance regulations.

Mid-Level

Cybersecurity Analyst - Information technology professional whose primary function is to protect organizations from cyber attacks and respond swiftly to restore protection if compromised.

Cybersecurity Consultant - Responsible for keeping a client’s data suitably protected and free from the risk of cyber attacks and related problems

Penetration & Vulnerability Tester - Highly skilled security specialists that spend their days attempting to breach computer and network security systems.

Advanced-Level

Cybersecurity Manager / Admininstrator - Require an advanced understanding of information security concepts, security operations and information assurance, as well as risk management and project management skills.

Cybersecurity Engineer - Help businesses by protecting their computer and networking systems from potential hackers and cyber-attacks.

Cybersecurity Architect - Combines hardware and software knowledge with programming proficiency, research skills, and policy development.

Career Websites

Indeed

Ziprecruiter

Glassdoor

Monster

Chegg

SimplyHired

CareerBuilder

USAJobs

NSA Jobs

FBI Jobs

Google job search (etc. cybersecurity jobs [city name])

Job search on company websites

How Do I....

Keep Up With Vulnerabilities:

PortSwigger

SECURITYNEWSWIRE

ALL INFOSEC NEWS

Threatpost - general security blog

KrebsonSecurity - Brian Krebs, kind of an OG security blog thats been around forever

Hackerone - Recent bug-bounties found

Learn About Vulnerabilities:

HACKSPLAINING

Learn About Kali Linux (Pen-testing OS):

Kali Linux Revealed Course

tutorialspoint - Kali Linux

Learn About Parrot (Pen-testing OS):

tutorialspoint - Parrot

Parrot Linux Documentation

Learn About BlackArch (Hacking OS):

BlackArch Linux Installation

The BlackArch Linux Guide

uthena BlackArch Linux Course (Paid)

Practice Linux Skills:

OverTheWire - Bandit

Practice CTF (Capture The Flag) Skills:

picoCTF (Free)

Cyber Skyline / National Cyber League (Paid)

CTFlearn (Free)

Hacker101 (Free)

Practice Penetration Testing:

HACKTHEBOX (Free/Paid)

TryHackMe (Free/Paid)

PentesterAcademy (Paid)

Watch Videos Related To Hacking:

Youtube - ITProTV

Youtube - The Cyber Mentor

Youtube - BLACK ARCH LINUX TUTORIAL PLAYLIST

Youtube - LiveOverflow

Watch Hackthebox Write-Ups:

Youtube - IppSec

Youtube - HackerSploit

Learn MITRE ATT&CK

MITRE Website

MITRE Website - Training

Rapid 7 - MITRE ATT&CK

Learn Reverse Engineering

MALWARE UNICORN

Practice Reverse Engineering

Binary Ninja

IDA Freeware

Radare

Learn PowerShell

Microsoft Documentation - PowerShell

PowerShell Tutorial

tutorialspoint - PowerShell

Certifications

Certifications are a way to get HR's eye. From my understanding, it DOES NOT replace a College/University Degree.

(Source: https://www.pauljerimy.com/OC/Security%20Certification%20Progression%20Chart%20v7.0.png) Certifications

Cheat Sheets

Nmap and Nessus (Source: https://cdn.comparitech.com/wp-content/uploads/2019/06/Nmap-Nessus-Cheat-Sheet.jpg) Nmap & Nessus

Wireshark (Source: https://cdn.comparitech.com/wp-content/uploads/2019/06/Wireshark-Cheat-Sheet-1.jpg) Wireshark

Hacking Tools (Source https://blog.compass-security.com/wp-content/uploads/2019/10/hacking_tools_cheat_sheet_v1.0-0.png) Hacking Tools

Sources

https://startacybercareer.com/best-entry-level-cyber-security-jobs/

https://www.indeed.com/career-advice/finding-a-job/what-is-an-it-technician

https://www.thebalancecareers.com/network-administrator-525818

https://en.wikipedia.org/wiki/Database_administrator

https://www.indeed.com/career-advice/careers/what-does-a-system-administrator-do

https://securityintelligence.com/how-to-land-an-entry-level-cybersecurity-job/

https://www.betterteam.com/security-administrator-job-description

https://i.lensdump.com/i/iHcJHP.png

https://hiring.monster.com/employer-resources/job-description-templates/system-security-technician-job-description/

https://www.cyberseek.org/pathway.html

https://www.indeed.com/career-advice/career-development/how-to-become-a-cyber-security-analyst

https://www.thebalancecareers.com/cyber-intelligence-analyst-2071296

https://www.infosecinstitute.com/roles/incident-responder/

https://www.cio.com/article/3346029/it-auditor-role-defined.html

https://www.fieldengineer.com/skills/cyber-security-consultant

https://www.infosecinstitute.com/roles/cybersecurity-manager/

https://www.betterteam.com/cyber-security-engineer-job-description

Acknowledgements

I want to give a big shoutout to my partner on this document Jalan (JayCruzer17) for assisting me with creating and maintaining this document. I also want to give credit to those on the r/cybersecurity subreddit for giving me feedback on the document. I had made a post on reddit and I would like to thank all the comments for giving feedback in one area or another. In addition, I would like to thank the individuals doing pull requests on this document with addition links/information that I might have overlooked. Without the aforementioned people, this document will not be as good as it is.

hacking-roadmap's People

Contributors

cosmic-zip avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.