Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1 +1,8 @@
# ACLs
# Access Control Lists (ACLs)

Access Control Lists (ACLs) are sets of rules that determine whether network traffic is allowed or denied to pass through a network interface. They act as a security filter, examining packets based on source and destination IP addresses, ports, and protocols. ACLs are configured on network devices like routers and firewalls to control network access and enforce security policies.

Visit the following resources to learn more:

- [@article@Access Control List: Definition, Types & Usages](https://www.okta.com/uk/identity-101/access-control-list/)
- [@video@Access Control Lists](https://www.youtube.com/watch?v=IwLyr0mKK1w)
Original file line number Diff line number Diff line change
@@ -1 +1,9 @@
# Alert Types
# Alert Types

Alert types are the different categories or classifications of notifications generated by monitoring systems when specific events or conditions occur. These alerts signal potential issues, anomalies, or security threats within an application or infrastructure. They can range from simple notifications about resource utilization to complex warnings about potential security breaches, and are crucial for timely response and remediation.

Visit the following resources to learn more:

- [@article@Monitoring 101: Alerting on what matters](https://www.datadoghq.com/blog/monitoring-101-alerting/)
- [@article@Introduction to Metrics, Monitoring and Alerting](https://sematext.com/blog/monitoring-alerting/)
- [@video@Observability vs Monitoring vs APM vs Logging vs Alerting](https://www.youtube.com/watch?v=TYE2u7QZNVA)
Original file line number Diff line number Diff line change
@@ -1 +1,9 @@
# Asymmetric
# Asymmetric Encryption

Asymmetric encryption, also known as public-key cryptography, uses a pair of keys: a public key for encryption and a private key for decryption. The public key can be freely distributed, allowing anyone to encrypt data intended for the owner of the private key. Only the corresponding private key, which is kept secret, can decrypt the data. This method enables secure communication without the need to exchange secret keys beforehand.

Visit the following resources to learn more:

- [@article@What is asymmetric encryption?](https://www.ibm.com/think/topics/asymmetric-encryption)
- [@video@Asymmetric Encryption - Simply explained](https://www.youtube.com/watch?v=AQDCe585Lnc)
- [@video@Symmetric vs. Asymmetric Encryption - CompTIA Security+ SY0-401: 6.1](https://www.youtube.com/watch?v=z2aueocJE8Q)
Original file line number Diff line number Diff line change
@@ -1 +1,11 @@
# Attack Surface Mapping
# Attack Surface Mapping

Attack surface mapping is the process of identifying and documenting all the potential entry points or vulnerabilities that an attacker could exploit to gain unauthorized access to a system or application. This involves cataloging all assets, including hardware, software, network components, and data, and then analyzing them to determine their susceptibility to various threats. The resulting map provides a clear picture of the organization's security posture, enabling security teams to prioritize mitigation efforts and reduce the overall risk.

Visit the following resources to learn more:

- [@article@Attack Surface Analysis Cheat Sheet¶](https://cheatsheetseries.owasp.org/cheatsheets/Attack_Surface_Analysis_Cheat_Sheet.html)
- [@article@What is Attack Surface Mapping & Analysis in Cybersecurity?](https://jetpack.com/resources/attack-surface-mapping-and-analysis/)
- [@video@Attack Surface Mapping with Jeff Foley from OWASP Amass](https://www.youtube.com/watch?v=Ui35-YEbBiA)
- [@video@ASM and Vulnerability Management: Why you need both](https://www.youtube.com/watch?v=oMx9lgTtJnM)
- [@video@What is ASM (Attack Surface Management)?](https://www.youtube.com/watch?v=NqKid53v5x8)
Original file line number Diff line number Diff line change
@@ -1 +1,8 @@
# Audit & Compliance Mapping
# Audit & Compliance Mapping

Audit & Compliance Mapping involves aligning an organization's security controls and practices with relevant regulatory requirements, industry standards, and internal policies. This process identifies which controls satisfy specific compliance obligations, creating a clear relationship between security efforts and the necessary frameworks for legal and operational adherence. The goal is to demonstrate that the organization is meeting its obligations and to streamline the audit process by providing a structured view of compliance.

Visit the following resources to learn more:

- [@article@How to Use Control Mapping Tools to Create a Cybersecurity Compliance Program](https://swimlane.com/blog/cybersecurity-compliance-with-control-mapping/)
- [@article@Compliance Audit: A Complete Checklist for Cybersecurity Audit Readiness](https://cynomi.com/learn/compliance-audit-checklist/)
Original file line number Diff line number Diff line change
@@ -1 +1,12 @@
# Authentication
# Authentication

Authentication is the process of verifying the identity of a user, device, or application attempting to access a system or resource. It confirms that the entity is who or what it claims to be, typically by requiring them to provide credentials such as a username and password, a digital certificate, or biometric data. Successful authentication grants access based on pre-defined permissions and roles.

Visit the following resources to learn more:

- [@article@Basic Authentication](https://roadmap.sh/guides/basic-authentication)
- [@article@Session Based Authentication](https://roadmap.sh/guides/session-based-authentication)
- [@article@Token Based Authentication](https://roadmap.sh/guides/token-authentication)
- [@article@JWT Authentication](https://roadmap.sh/guides/jwt-authentication)
- [@article@Auth - Open Authorization](https://roadmap.sh/guides/oauth)
- [@article@SSO - Single Sign On](https://roadmap.sh/guides/sso)
Original file line number Diff line number Diff line change
@@ -1 +1,8 @@
# Authorization
# Authorization

Authorization is the process of determining what a user or system is allowed to access or do. It verifies if a user, once authenticated, has the necessary permissions to perform a specific action on a particular resource. This involves checking access control policies and rules to ensure that only authorized entities can access sensitive data or functionalities.

Visit the following resources to learn more:

- [@article@What Is Authorization and How Does It Work?](https://www.descope.com/learn/post/authorization)
- [@video@Authentication vs Authorization Explained](https://www.youtube.com/watch?v=7ijBiXddB7w)
Original file line number Diff line number Diff line change
@@ -1 +1,10 @@
# Automated Patching
# Automated Patching

Automated patching is the process of automatically applying software updates and security fixes to systems and applications. This involves using tools and scripts to identify missing patches, download them from a central repository, and install them on target machines without manual intervention. The goal is to quickly and efficiently address vulnerabilities and maintain the security and stability of the IT environment.

Visit the following resources to learn more:

- [@article@What is automated patch management?](https://www.pdq.com/blog/what-is-automated-patch-management/)
- [@article@What is Patch Management Automation and Why It Matters](https://blog.qualys.com/product-tech/patch-management/2025/11/18/what-is-patch-management-automation-guide)
- [@article@What is Patch Management?](https://www.ibm.com/topics/patch-management)
- [@video@What Is Patch Management, and Why Does Your Company Need It?](https://www.youtube.com/watch?v=O5XXlJear0w)
Original file line number Diff line number Diff line change
@@ -1 +1,10 @@
# Bash
# Bash Scripting

Bash is a command-line interpreter and scripting language commonly used in Linux and macOS environments. It allows users to automate tasks, manage files, and execute programs through a series of commands written in a script. These scripts can range from simple one-liners to complex programs that perform system administration, software deployment, and other essential operations.

Visit the following resources to learn more:

- [@roadmap@Visit the Dedicated Bash Roadmap](https://roadmap.sh/shell-bash)
- [@article@Interactive Shell Scripting Tutorial](https://www.learnshell.org/en/Welcome)
- [@video@Bash Scripting Tutorial for Beginners](https://www.youtube.com/watch?v=tK9Oc6AEnR4)
- [@video@Bash in 100 Seconds](https://www.youtube.com/watch?v=I4EWvMFj37g)
Original file line number Diff line number Diff line change
@@ -1 +1,10 @@
# bcrypt
# bcrypt

bcrypt is a password-hashing function designed to be computationally intensive and resistant to brute-force attacks. It incorporates a salt to protect against rainbow table attacks and uses an adaptive hashing algorithm, meaning the computational cost can be increased over time to keep pace with advancements in computing power. This makes it a strong choice for securely storing user passwords.

Visit the following resources to learn more:

- [@article@Hashing in Action: Understanding bcrypt](https://auth0.com/blog/hashing-in-action-understanding-bcrypt/)
- [@article@Password Hashing using bcrypt](https://medium.com/@bhupendra_Maurya/password-hashing-using-bcrypt-e36f5c655e09)
- [@article@BCrypt Explained](https://dev.to/sylviapap/bcrypt-explained-4k5c)
- [@video@Password Storage Tier List: encryption, hashing, salting, bcrypt, and beyond](https://www.youtube.com/watch?v=qgpsIBLvrGY)
Original file line number Diff line number Diff line change
@@ -1 +1,9 @@
# Build Pipeline Hardening
# Build Pipeline Hardening

Pipeline hardening focuses on securing the automated process that transforms source code into deployable software. This involves implementing security measures at each stage of the pipeline, from code commit to artifact creation, to prevent vulnerabilities from being introduced or exploited. The goal is to ensure the integrity and confidentiality of the software being built and deployed.

Visit the following resources to learn more:

- [@article@Harden Your CI/CD Pipelines](https://www.paloaltonetworks.com/resources/datasheets/tip-sheet-ci-cd-security)
- [@article@Hardening - CI/CD Recommendations](https://docs.gitlab.com/security/hardening_cicd_recommendations/)
- [@video@Hardening Your CI/CD Pipelines with GitOps and Continuous Security](https://www.youtube.com/watch?v=OHly5mGdhNY)
Original file line number Diff line number Diff line change
@@ -1 +1,11 @@
# Burp Suite
# Burp Suite

Burp Suite is a platform used for performing security testing of web applications. It acts as a proxy, intercepting and analyzing traffic between a browser and a web server. This allows security professionals to identify vulnerabilities such as SQL injection, cross-site scripting (XSS), and other common web application flaws.

Visit the following resources to learn more:

- [@official@Burp](https://portswigger.net/burp)
- [@official@Getting started with Burp Suite](https://portswigger.net/burp/documentation/desktop/getting-started)
- [@article@What is Burp Suite?](https://www.scaler.com/topics/cyber-security/burp-suite/)
- [@video@How to use Burp Suite for Beginners](https://www.youtube.com/watch?v=GxvFqgCBW-8)
- [@video@Master Burp Suite Like A Pro In Just 1 Hour](https://www.youtube.com/watch?v=QiNLNDSLuJY)
Original file line number Diff line number Diff line change
@@ -1 +1,9 @@
# Certificate Lifecycle
# Certificate Lifecycle

Certificate lifecycle management encompasses all the processes involved in creating, deploying, managing, and eventually revoking digital certificates. This includes requesting certificates from a Certificate Authority (CA), securely storing private keys, distributing certificates to servers and applications, monitoring certificate expiration dates, and renewing or replacing certificates before they expire to maintain secure communication and authentication.

Visit the following resources to learn more:

- [@article@What Are the Five Stages of the Certificate Lifecycle?](https://www.digicert.com/faq/certificate-management/what-are-the-five-stages-in-the-certificate-lifecycle)
- [@article@What Are the 5 Stages in the Certificate Lifecycle?](https://www.keyfactor.com/blog/what-are-the-5-stages-in-the-certificate-lifecycle/)
- [@video@What is Certificate Management?](https://www.youtube.com/watch?v=wOeP0KbPUw0)
Original file line number Diff line number Diff line change
@@ -1 +1,8 @@
# CIA Triad
# CIA Triad

The CIA Triad is a model designed to guide security policies for organizations. It consists of three fundamental principles: Confidentiality, ensuring that information is accessible only to authorized individuals; Integrity, maintaining the accuracy and completeness of data; and Availability, guaranteeing that authorized users have reliable access to information and resources when needed.

Visit the following resources to learn more:

- [@article@The CIA Triad](https://www.fortinet.com/resources/cyberglossary/cia-triad)
- [@video@The CIA Triad - Professor Messer](https://www.youtube.com/watch?v=SBcDGb9l6yo)
Original file line number Diff line number Diff line change
@@ -1 +1,8 @@
# Cloud Security
# Cloud Security

Cloud security encompasses the policies, technologies, software, and practices that protect cloud-based systems, data, and infrastructure. It addresses the unique security challenges presented by cloud computing, such as shared responsibility models, data residency, and the dynamic nature of cloud environments. Effective cloud security strategies aim to maintain confidentiality, integrity, and availability of cloud resources while mitigating risks like data breaches, unauthorized access, and denial-of-service attacks.

Visit the following resources to learn more:

- [@article@What is cloud security?](https://www.ibm.com/think/topics/cloud-security)
- [@article@What is Cloud Security? Essential Tools, Best Practices and Strategies](https://www.crowdstrike.com/en-us/cybersecurity-101/cloud-security/)
Original file line number Diff line number Diff line change
@@ -1 +1,8 @@
# Container Security
# Container Security

Container security involves protecting containerized applications and the underlying infrastructure from vulnerabilities and threats. This includes securing the container image build process, managing container runtime environments, and implementing security measures to prevent unauthorized access, data breaches, and other security incidents. Effective container security practices are essential for ensuring the integrity, confidentiality, and availability of applications deployed in containerized environments.

Visit the following resources to learn more:

- [@article@What is Container Security? [Securing Containers 101]](https://www.wiz.io/academy/container-security/what-is-container-security)
- [@article@What Is Container Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-container-security)
Original file line number Diff line number Diff line change
@@ -1 +1,8 @@
# Containment
# Containment

Containment in incident response refers to the actions taken to limit the scope and impact of a security incident. It involves isolating affected systems or networks to prevent the incident from spreading further, minimizing damage, and preserving evidence for investigation. This can include actions like disconnecting compromised machines from the network, shutting down vulnerable applications, or implementing temporary security controls.

Visit the following resources to learn more:

- [@article@Microsoft Security Incident Management: Containment, Eradication, and Recovery](https://learn.microsoft.com/en-us/compliance/assurance/assurance-sim-containment-eradication-recovery)
- [@article@Containment - AWS](https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/containment.html)
Original file line number Diff line number Diff line change
@@ -1 +1,10 @@
# Cryptographic Hashing
# Cryptographic Hashing

Cryptographic hashing is a process that takes an input (or 'message') and produces a fixed-size string of characters, known as a hash. This hash acts as a unique fingerprint of the input data. Even a small change to the input will result in a drastically different hash value. Hashing algorithms are designed to be one-way functions, meaning it's computationally infeasible to reverse the process and derive the original input from the hash.

Visit the following resources to learn more:

- [@article@What is hashing and how does it work?](https://www.techtarget.com/searchdatamanagement/definition/hashing)
- [@article@Hashing Algorithm Overview: Types, Methodologies & Usage](https://www.okta.com/identity-101/hashing-algorithms/)
- [@article@Understanding Cryptography Types](https://geekflare.com/cybersecurity/cryptography-types/)
- [@video@Hashing Explained](https://www.youtube.com/watch?v=EOe1XUykdP4)
Original file line number Diff line number Diff line change
@@ -1 +1,10 @@
# CSPM
# Cloud Security Posture Management (CSPM)

Cloud Security Posture Management (CSPM) involves continuously assessing and improving the security configuration of cloud resources. It helps organizations identify and remediate misconfigurations, compliance violations, and security risks across their cloud environments. CSPM tools automate security assessments, provide visibility into cloud security posture, and offer recommendations for improving security controls.

Visit the following resources to learn more:

- [@article@What is cloud security posture management (CSPM)?](https://www.ibm.com/think/topics/cspm)
- [@article@What is CSPM?](https://www.microsoft.com/en-us/security/business/security-101/what-is-cspm)
- [@video@What is CSPM (Cloud Security Posture Management)?](https://www.youtube.com/watch?v=V4wmb5KVmKM)
- [@video@What is Cloud Security Posture Management (CSPM)?](https://www.youtube.com/watch?v=dZLEngVpKME)
Original file line number Diff line number Diff line change
@@ -1 +1,11 @@
# DDoS Miligation Strategy
# DDoS Mitigation Strategy

A DDoS (Distributed Denial of Service) mitigation strategy is a plan and set of techniques used to protect a system or network from being overwhelmed by malicious traffic. It involves identifying, analyzing, and filtering out illegitimate requests while allowing legitimate users to access the service. This often includes a combination of traffic filtering, rate limiting, content delivery networks (CDNs), and other security measures to maintain availability and performance during an attack.

Visit the following resources to learn more:

- [@article@10 Best Practices to Prevent DDoS Attacks](https://securityscorecard.com/blog/best-practices-to-prevent-ddos-attacks/)
- [@article@How to prevent DDoS attacks | Methods and tools](https://www.cloudflare.com/en-gb/learning/ddos/how-to-prevent-ddos-attacks/)
- [@article@DoS vs DDoS](https://www.fortinet.com/resources/cyberglossary/dos-vs-ddos)
- [@video@hat is Denial-of-Service attack?](https://www.youtube.com/watch?v=Z7xG3b0aL_I)
- [@video@What is a DDoS attack?](https://www.youtube.com/watch?v=z503nLsfe5s)
Original file line number Diff line number Diff line change
@@ -1 +1,9 @@
# Defense in Depth Concepts
# Defense in Depth

Defense in Depth is a security approach that uses multiple layers of security controls to protect assets. If one security measure fails, others are in place to provide continued protection. This layered approach reduces the risk of a single point of failure compromising the entire system.

Visit the following resources to learn more:

- [@article@What is Defense in Depth?](https://www.fortinet.com/resources/cyberglossary/defense-in-depth)
- [@article@What is Defense in Depth? Best Practices for Layered Security](https://www.wiz.io/academy/cloud-security/defense-in-depth)
- [@video@Defense-in-Depth - CompTIA Security+](https://www.youtube.com/watch?v=HLQ4wX8NxQY)
Loading