Skip to content

crac-learning/CybersecurityResources

Repository files navigation

Cybersecurity Resources Repository

Welcome to the Cybersecurity Resources repository! This repository aims to serve as a comprehensive and well-organized collection of resources for anyone interested in learning, practicing, or advancing their skills in cybersecurity.

📋 Contents

🌐 Learning Platforms

Explore these platforms to build a strong foundation in cybersecurity:

  • Nasscom FSP: Comprehensive skill developmemt courses to get Cybersecurity basic knowledge course and labs.
    • Cybrary: Free and paid courses covering a wide range of cybersecurity topics.
  • Hack The Box: Hands-on penetration testing labs and challenges.
  • INE: Comprehensive training in cybersecurity, cloud, and networking.
  • Defhawk: Comprehensive skill developmemt in cybersecurity on trending topics like source code review, mongo db security, nodejs, threat research, AI, docker, Red team, Exploitation and more!
  • Offensive Security: Home of the OSCP certification and various pen-testing resources.

🛠 Tools and Frameworks

Enhance your cybersecurity workflows with these tools:

  • Nmap: Network scanning and enumeration.
  • Metasploit: Penetration testing and exploitation framework.
  • Burp Suite: Web application security testing.
  • Wireshark: Packet analysis tool for network troubleshooting and security.

🎯 Capture the Flag (CTF) Platforms

Practice your skills on these CTF platforms:

  • TryHackMe: Beginner-friendly challenges and rooms.
  • CTFtime: A directory of CTF events around the world.
  • Defhawk: Comprehensive skill developmemt in cybersecurity on trending topics like source code review, mongo db security, nodejs, threat research, AI, docker, Red team, Exploitation and more!
  • Root-Me: Realistic hacking challenges for various skill levels.

📚 Books and Publications

Recommended reading to deepen your knowledge:

  • "The Web Application Hacker's Handbook" by Dafydd Stuttard and Marcus Pinto: A guide to web app security.
  • "Practical Malware Analysis" by Michael Sikorski and Andrew Honig: Essential for malware reverse engineering.
  • "The Art of Exploitation" by Jon Erickson: Learn exploitation techniques from scratch.

🖥 Open Source Projects

Contribute to or learn from these notable projects:

  • OWASP Projects: Includes the OWASP Top 10 and many tools like ZAP.
  • Security Onion: A platform for threat hunting and incident response.
  • Snort: An open-source intrusion detection and prevention system.

⚡ Threat Intelligence Resources

Stay updated on the latest cyber threats:

🤝 Communities and Forums

Connect with other cybersecurity enthusiasts:

💡 Contributing

We welcome contributions! If you have suggestions for new resources or improvements, feel free to create a pull request or open an issue.

📜 License

This repository is licensed under the MIT License. See the LICENSE file for more details.


Happy learning and stay secure! 🚀

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors