Apart from the prerequisites mentioned in the main readme, Cyber Security as a domain requires a few more fundamental concepts and topics to be covered. An exhaustive introduction can be found in Cisco Networking Academy's Introduction to Cyber Security, and in SANS Cyber Aces Online Tutorial.
Before you go ahead and dive into any of the fields below, play a few CTFs (WTF is CTF?) to practice and hone your basic skills. A good start would be the picoCTF followed by OverTheWire's wargames!
Also, If you can't seem to afford physical or e-copies of any books mentioned, fret not! You can download them from any shadow archive like Libgen
Jump into any one of the sections below that you wish. Specialize in one and then go for others!
The secret to a great cybersecurity engineer is the ability to build software that tailors to their need. Whether the purpose is to root, test or even protect.
- This is an advanced guide for bash: Black-Hat Bash
- Rust combines high-level logic with machine-level control: Black-Hat Rust
- Learn basics of C & x86ASM with Dive into systems
- File Handling:
- File Systems
- Detailed list of all File Extensions
- Using File Signatures as a tool
- MetaData of a file
- Memory Forensics
- Volatility for extraction
- Network analysis using Burp Suite or Wireshark
- Steganography: The Why and How
Here's a nifty cheatsheet for everything you need to understand at the very least in cryptography. If you're still here looking for a resource, take a look at the prerequisites in the main readme!
- A crash-course/cheatsheet on Assembly Languages and Code
- Using IDA for Disassembly and Decompiling
- Debugging using GDB
What counts as Web Exploitation?
- What is SQL Injection and how to use SQLMap
- Man-in-the-middle attacking using mitmproxy
- Understanding Cross-site Scripting
- Forcing out hidden directories using DirBuster
- Learn PHP and JSON
- Hands-on Labs on Portswigger
Here's a CTF-themed overview of Binary Exploitation and all it's concepts. Being a very vast and vaguely defined topic, it is essential to know the techniques and tools before the theory to properly form an outlook. Don't be scared if you can't do this, it's one of the most difficult yet the most sought-after expertise in Cyber Security!
- How to setup a Lab environment for malware analysis
- Practical binary analysis book
- Primer to malware analysis book