📌 Cybersecurity has an extensive number of fields , so you should state your position in it.
The next few videos will help you to chose your field,know about them and follow you passion
- Source 1 : So you wanna do security? (Muhammad Gamal’s Video)
- Source 2 : Nakerah Network’’s Playlist
▶ What are our Sub-Circles?
- Penetration testing
- Web Pentesting
- Network Pentesting
- Reverse Engineering & Malware Analysis
- Network Security
- SOC(Security Operation Center)
📌 Take your time while deciding which field to study While doing That we will get into The ENTRY Level so we don't waste time
The content is The first Chapter of CCNA some topics are useless in our case
| Module | Topic | To do |
|---|---|---|
| 1 | Networking Today | Read Only |
| 2 | IOS Navigation | Nothing |
| 3 | Protocols and Models | Study |
| 4 | Physical Layer | Nothing |
| 5 | Number Systems | Nothing |
| 6 | Data Link Layer | Study |
| 7 | Ethernet Switching | Study |
| 8 | Network Layer Characteristics | Study |
| 9 | Address Resolution | Study |
| 10 | Configure Initial Router Settings | Nothing |
| 11 | IPv4 Addressing | Study |
| 12 | IPv6 Addressing | Nothing |
| 13 | ICMP | Study |
| 14 | Transportation of Data | Study |
| 15 | Application Layer | Study |
| 16 | Network Security Fundamentals | Study |
| 17 | Build a Small Network | Nothing |
| Chapter 2 - Module 3 | Network Security Concepts | Important |
- Watch This playlist From 22 -> 29 : Networking Basics
- Watch Amr Talaat Videos : Video 1 Video 2
Additional Resource : Powercert Animated Videos
| Chapter | To Do |
|---|---|
| 1 | Study |
| 2 | Study |
| 3 | Study |
| 4 | Study |
| 5 | Study |
| 6 | Study |
| 7 | Study |
| 8 | Study |
| 9 | Study |
| 10 | Study |
| 11 | Nothing |
| 12 | Study |
| 13 | Study |
| 14 | Study |
| 15 | Nothing |
| 16 | Study |
| 17 | Nothing |
- Arabic Linux Course
- Hassan Saad Cource : Watch The First 13 Video
Solve the following rooms or Try Hack Me:
Room 1 Room 2 Room 3 Room 4 Room 5
📌 That’s not enough, Being good with Linux = Using Linux🔴 1. there are seminars with the leaders of the Sub-Circles to talk about their Fields and what they do in more details.
🔴 2. At the end of this level, a member can decide if he choose the right sub-circle for him or not.
- Here’s our new roadmap, We will make sure to keep it updated.
📌 1. Our old Roadmap HERE By Muhammad Gamal
Here’s The new one base on the old roadmap and more simplified(We will make sure to keep it updated)
📌 2. To Practice:
- Create account on hackerone , bugcrowd, intigriti
- You should practice very well so you should Download OWASP Broken Web Application project Try to install it on VMware or VirtualBox from Here
- preferable to download this first and practice very well i love:
1️⃣bwapp
2️⃣Dvwa
4️⃣ Hack The Box
5️⃣OWASP Juicy
6️⃣TryHackMe
- If you are stuck in a lab solution, try searching on Google
- Plan Time-Line Soon
optional to make it easy to study
📌 1. Our New Roadmap HERE includes many steps from Zero to HeroBTW you will need to practice more.
📌 2. There are many option Courses each course include content may conflict with other courses but there are courses to be unique.
📌 3. We will Practice on Machines HTB , tryHackMe , Vulnhub Walkthrough
optional to make it easy to study
📌 Here is our new Network Security Roadmap
📌 You can go through this path if you like the practical stuff like try hack me and Cyber Defenders... Here's our SOC Practical Path
- Here’s our DFIR roadmap.