Skip to content

jb49088/cybersecurity_notes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 

Repository files navigation

cybersecurity_notes

1,000+ interconnected cybersecurity notes built in Obsidian, complete with links, tags, and scripts. Designed for both learning and long-term knowledge management.

Code Statistics

-------------------------------------------------------------------------------
Language                     files          blank        comment           code
-------------------------------------------------------------------------------
Markdown                      1266           9258              4          19285
Python                           3             31             36            103
-------------------------------------------------------------------------------
SUM:                          1269           9289             40          19388
-------------------------------------------------------------------------------

Project Structure

cybersecurity_notes
├── Meta
│   ├── Diagrams
│   │   ├── Diagram 1.00.md
│   │   ├── Diagram 1.01.md
│   │   ├── Diagram 1.02.md
│   │   ├── Diagram 1.03.md
│   │   ├── Diagram 1.04.md
│   │   ├── Diagram 1.05.md
│   │   ├── Diagram 1.06.md
│   │   ├── Diagram 1.07.md
│   │   ├── Diagram 1.08.md
│   │   ├── Diagram 1.09.md
│   │   ├── Diagram 1.10.md
│   │   ├── Diagram 1.11.md
│   │   ├── Diagram 1.12.md
│   │   ├── Diagram 1.13.md
│   │   ├── Diagram 1.14.md
│   │   ├── Diagram 1.15.md
│   │   ├── Diagram 1.16.md
│   │   ├── Diagram 1.17.md
│   │   ├── Diagram 1.18.md
│   │   ├── Diagram 1.19.md
│   │   ├── Diagram 1.20.md
│   │   ├── Diagram 1.21.md
│   │   └── Diagram 1.22.md
│   ├── Help
│   │   ├── Bold, italics, highlights.md
│   │   ├── Callouts.md
│   │   ├── Code.md
│   │   ├── Flashcards.md
│   │   ├── Headings.md
│   │   ├── Line break.md
│   │   ├── Lists.md
│   │   ├── Non-breaking space.md
│   │   └── Quotes.md
│   ├── Images
│   │   ├── Image 1.00.png
│   │   ├── Image 1.01.png
│   │   ├── Image 1.02.png
│   │   ├── Image 1.03.png
│   │   ├── Image 1.04.png
│   │   ├── Image 1.05.png
│   │   ├── Image 1.06.png
│   │   ├── Image 1.07.png
│   │   ├── Image 1.08.png
│   │   ├── Image 1.09.png
│   │   ├── Image 1.10.png
│   │   ├── Image 1.11.png
│   │   ├── Image 1.12.png
│   │   ├── Image 1.13.png
│   │   ├── Image 1.14.png
│   │   ├── Image 1.15.png
│   │   ├── Image 1.16.png
│   │   ├── Image 1.17.png
│   │   ├── Image 1.18.png
│   │   ├── Image 1.19.png
│   │   ├── Image 1.20.png
│   │   ├── Image 1.21.png
│   │   ├── Image 1.22.png
│   │   ├── Image 1.23.png
│   │   ├── Image 1.24.png
│   │   ├── Image 1.25.png
│   │   ├── Image 1.26.png
│   │   ├── Image 1.27.png
│   │   ├── Image 1.28.png
│   │   ├── Image 1.29.png
│   │   ├── Image 1.30.png
│   │   ├── Image 1.31.png
│   │   ├── Image 1.32.png
│   │   ├── Image 1.33.png
│   │   ├── Image 1.34.png
│   │   ├── Image 1.35.png
│   │   ├── Image 1.36.png
│   │   ├── Image 1.37.png
│   │   ├── Image 1.38.png
│   │   ├── Image 1.39.png
│   │   ├── Image 1.40.png
│   │   ├── Image 1.41.png
│   │   ├── Image 1.42.png
│   │   ├── Image 1.43.png
│   │   ├── Image 1.44.png
│   │   ├── Image 1.45.png
│   │   ├── Image 1.46.png
│   │   ├── Image 1.47.png
│   │   ├── Image 1.48.png
│   │   ├── Image 1.49.png
│   │   ├── Image 1.50.png
│   │   ├── Image 1.51.png
│   │   ├── Image 1.52.png
│   │   ├── Image 1.53.png
│   │   ├── Image 1.54.png
│   │   ├── Image 1.55.png
│   │   ├── Image 1.56.png
│   │   ├── Image 1.57.png
│   │   ├── Image 1.58.png
│   │   ├── Image 1.59.png
│   │   ├── Image 1.60.png
│   │   ├── Image 1.61.png
│   │   ├── Image 1.62.png
│   │   ├── Image 1.63.png
│   │   ├── Image 1.64.png
│   │   ├── Image 1.65.png
│   │   ├── Image 1.66.png
│   │   ├── Image 1.67.png
│   │   ├── Image 1.68.png
│   │   ├── Image 1.69.png
│   │   ├── Image 1.70.png
│   │   ├── Image 1.71.png
│   │   ├── Image 1.72.png
│   │   ├── Image 1.73.png
│   │   ├── Image 1.74.png
│   │   ├── Image 1.75.png
│   │   ├── Image 1.76.png
│   │   ├── Image 1.77.png
│   │   ├── Image 1.78.png
│   │   ├── Image 1.79.png
│   │   ├── Image 1.80.png
│   │   ├── Image 1.81.png
│   │   ├── Image 1.82.png
│   │   ├── Image 1.83.png
│   │   ├── Image 1.84.png
│   │   ├── Image 1.85.png
│   │   ├── Image 1.86.png
│   │   ├── Image 1.87.png
│   │   ├── Image 1.88.png
│   │   ├── Image 1.89.png
│   │   ├── Image 1.90.png
│   │   ├── Image 1.91.png
│   │   ├── Image 1.92.png
│   │   ├── Image 1.93.png
│   │   ├── Image 1.94.png
│   │   ├── Image 1.95.png
│   │   ├── Image 1.96.png
│   │   ├── Image 1.97.png
│   │   ├── Image 1.98.png
│   │   ├── Image 1.99.png
│   │   ├── Image 2.00.png
│   │   ├── Image 2.01.png
│   │   ├── Image 2.02.png
│   │   ├── Image 2.03.png
│   │   ├── Image 2.04.png
│   │   ├── Image 2.05.png
│   │   ├── Image 2.06.png
│   │   ├── Image 2.07.png
│   │   ├── Image 2.08.png
│   │   ├── Image 2.09.png
│   │   ├── Image 2.10.png
│   │   ├── Image 2.11.png
│   │   ├── Image 2.12.png
│   │   ├── Image 2.13.png
│   │   ├── Image 2.14.png
│   │   ├── Image 2.15.png
│   │   ├── Image 2.16.png
│   │   ├── Image 2.17.png
│   │   ├── Image 2.18.png
│   │   ├── Image 2.19.png
│   │   ├── Image 2.20.png
│   │   ├── Image 2.21.png
│   │   ├── Image 2.22.png
│   │   ├── Image 2.23.png
│   │   ├── Image 2.24.png
│   │   ├── Image 2.25.png
│   │   ├── Image 2.26.png
│   │   ├── Image 2.27.png
│   │   ├── Image 2.28.png
│   │   ├── Image 2.29.png
│   │   ├── Image 2.30.png
│   │   ├── Image 2.31.png
│   │   ├── Image 2.32.png
│   │   ├── Image 2.33.png
│   │   ├── Image 2.34.png
│   │   ├── Image 2.35.png
│   │   ├── Image 2.36.png
│   │   ├── Image 2.37.png
│   │   ├── Image 2.38.png
│   │   ├── Image 2.39.png
│   │   ├── Image 2.40.png
│   │   ├── Image 2.41.png
│   │   ├── Image 2.42.png
│   │   ├── Image 2.43.png
│   │   ├── Image 2.44.png
│   │   ├── Image 2.45.png
│   │   ├── Image 2.46.png
│   │   ├── Image 2.47.png
│   │   ├── Image 2.48.png
│   │   ├── Image 2.49.png
│   │   ├── Image 2.50.png
│   │   ├── Image 2.51.png
│   │   ├── Image 2.52.png
│   │   ├── Image 2.53.png
│   │   ├── Image 2.54.png
│   │   ├── Image 2.55.png
│   │   ├── Image 2.56.png
│   │   ├── Image 2.57.png
│   │   ├── Image 2.58.png
│   │   ├── Image 2.59.png
│   │   ├── Image 2.60.png
│   │   ├── Image 2.61.png
│   │   ├── Image 2.62.png
│   │   ├── Image 2.63.png
│   │   ├── Image 2.64.png
│   │   ├── Image 2.65.png
│   │   ├── Image 2.66.png
│   │   ├── Image 2.67.png
│   │   ├── Image 2.68.png
│   │   ├── Image 2.69.png
│   │   ├── Image 2.70.png
│   │   ├── Image 2.71.png
│   │   ├── Image 2.72.png
│   │   ├── Image 2.73.png
│   │   ├── Image 2.74.png
│   │   ├── Image 2.75.png
│   │   ├── Image 2.76.png
│   │   ├── Image 2.77.png
│   │   ├── Image 2.78.png
│   │   ├── Image 2.79.png
│   │   ├── Image 2.80.png
│   │   ├── Image 2.81.png
│   │   ├── Image 2.82.png
│   │   ├── Image 2.83.png
│   │   ├── Image 2.84.png
│   │   ├── Image 2.85.png
│   │   ├── Image 2.86.jpg
│   │   ├── Image 2.87.png
│   │   ├── Image 2.88.png
│   │   ├── Image 2.89.png
│   │   ├── Image 2.90.png
│   │   ├── Image 2.91.png
│   │   ├── Image 2.92.png
│   │   ├── Image 2.93.png
│   │   ├── Image 2.94.png
│   │   ├── Image 2.95.png
│   │   ├── Image 2.96.png
│   │   ├── Image 2.97.png
│   │   ├── Image 2.98.png
│   │   ├── Image 2.99.png
│   │   ├── Image 3.00.png
│   │   ├── Image 3.01.png
│   │   ├── Image 3.02.png
│   │   ├── Image 3.03.png
│   │   ├── Image 3.04.png
│   │   ├── Image 3.05.png
│   │   ├── Image 3.06.png
│   │   ├── Image 3.07.png
│   │   ├── Image 3.08.png
│   │   ├── Image 3.09.png
│   │   ├── Image 3.10.png
│   │   ├── Image 3.11.png
│   │   ├── Image 3.12.png
│   │   ├── Image 3.13.png
│   │   ├── Image 3.14.png
│   │   ├── Image 3.15.png
│   │   ├── Image 3.16.png
│   │   ├── Image 3.17.png
│   │   ├── Image 3.18.png
│   │   ├── Image 3.19.png
│   │   ├── Image 3.20.png
│   │   ├── Image 3.21.png
│   │   ├── Image 3.22.png
│   │   ├── Image 3.23.png
│   │   ├── Image 3.24.png
│   │   ├── Image 3.25.png
│   │   ├── Image 3.26.png
│   │   ├── Image 3.27.png
│   │   ├── Image 3.28.png
│   │   ├── Image 3.29.png
│   │   ├── Image 3.30.png
│   │   ├── Image 3.31.png
│   │   ├── Image 3.32.png
│   │   ├── Image 3.33.png
│   │   ├── Image 3.34.png
│   │   ├── Image 3.35.png
│   │   ├── Image 3.36.png
│   │   ├── Image 3.37.png
│   │   ├── Image 3.38.png
│   │   ├── Image 3.39.png
│   │   ├── Image 3.40.png
│   │   ├── Image 3.41.png
│   │   ├── Image 3.42.png
│   │   ├── Image 3.43.png
│   │   ├── Image 3.44.png
│   │   ├── Image 3.45.png
│   │   ├── Image 3.46.png
│   │   ├── Image 3.47.png
│   │   ├── Image 3.48.png
│   │   ├── Image 3.49.png
│   │   ├── Image 3.50.png
│   │   ├── Image 3.51.png
│   │   ├── Image 3.52.png
│   │   ├── Image 3.53.png
│   │   ├── Image 3.54.png
│   │   ├── Image 3.55.png
│   │   ├── Image 3.56.png
│   │   ├── Image 3.57.png
│   │   └── Image 3.58.png
│   ├── Inbox
│   │   ├── Cables and Connectors.md
│   │   ├── Cooling Systems.md
│   │   ├── Expansion Cards.md
│   │   ├── Passkey.md
│   │   ├── Standards & Standard Bodies
│   │   │   ├── Center for Internet Security (CIS).md
│   │   │   ├── FedRAMP.md
│   │   │   ├── Institute of electrical and electronics engineers (IEEE).md
│   │   │   ├── International Organization for Standardization (ISO).md
│   │   │   ├── ISO ∕ IEC 270001.md
│   │   │   ├── National Institute of Standards and Technology (NIST).md
│   │   │   └── Research and development in advanced communications technologies in Europe (RACE).md
│   │   └── Storage Devices.md
│   ├── MOCs
│   │   ├── Notes (A-Z).md
│   │   ├── Notes (Newest First).md
│   │   ├── Notes (Oldest First).md
│   │   ├── Tags (A-Z).md
│   │   └── Tags (Most Used First).md
│   ├── Prompts
│   │   ├── Categorizer (threat archive).md
│   │   ├── Categorizer (top level).md
│   │   └── Page writer.md
│   ├── Scripts
│   │   ├── find-unused-diagrams.py
│   │   ├── find-unused-images.py
│   │   └── find-unused-tables.py
│   ├── Tables
│   │   ├── Table 1.00.md
│   │   ├── Table 1.01.md
│   │   ├── Table 1.02.md
│   │   ├── Table 1.03.md
│   │   ├── Table 1.04.md
│   │   ├── Table 1.05.md
│   │   ├── Table 1.06.md
│   │   ├── Table 1.07.md
│   │   ├── Table 1.08.md
│   │   ├── Table 1.09.md
│   │   ├── Table 1.10.md
│   │   ├── Table 1.11.md
│   │   ├── Table 1.12.md
│   │   ├── Table 1.13.md
│   │   ├── Table 1.14.md
│   │   ├── Table 1.15.md
│   │   ├── Table 1.16.md
│   │   ├── Table 1.17.md
│   │   ├── Table 1.18.md
│   │   ├── Table 1.19.md
│   │   ├── Table 1.20.md
│   │   ├── Table 1.21.md
│   │   ├── Table 1.22.md
│   │   ├── Table 1.23.md
│   │   ├── Table 1.24.md
│   │   ├── Table 1.25.md
│   │   ├── Table 1.26.md
│   │   ├── Table 1.27.md
│   │   ├── Table 1.28.md
│   │   ├── Table 1.29.md
│   │   ├── Table 1.30.md
│   │   ├── Table 1.31.md
│   │   ├── Table 1.32.md
│   │   ├── Table 1.33.md
│   │   ├── Table 1.34.md
│   │   ├── Table 1.35.md
│   │   ├── Table 1.36.md
│   │   ├── Table 1.37.md
│   │   ├── Table 1.38.md
│   │   ├── Table 1.39.md
│   │   ├── Table 1.40.md
│   │   ├── Table 1.41.md
│   │   ├── Table 1.42.md
│   │   ├── Table 1.43.md
│   │   ├── Table 1.44.md
│   │   ├── Table 1.45.md
│   │   ├── Table 1.46.md
│   │   ├── Table 1.47.md
│   │   ├── Table 1.48.md
│   │   ├── Table 1.49.md
│   │   ├── Table 1.50.md
│   │   ├── Table 1.51.md
│   │   ├── Table 1.52.md
│   │   ├── Table 1.53.md
│   │   ├── Table 1.54.md
│   │   ├── Table 1.55.md
│   │   ├── Table 1.56.md
│   │   ├── Table 1.57.md
│   │   ├── Table 1.58.md
│   │   ├── Table 1.59.md
│   │   ├── Table 1.60.md
│   │   ├── Table 1.61.md
│   │   ├── Table 1.62.md
│   │   ├── Table 1.63.md
│   │   ├── Table 1.64.md
│   │   ├── Table 1.65.md
│   │   ├── Table 1.66.md
│   │   ├── Table 1.67.md
│   │   ├── Table 1.68.md
│   │   ├── Table 1.69.md
│   │   ├── Table 1.70.md
│   │   ├── Table 1.71.md
│   │   ├── Table 1.72.md
│   │   ├── Table 1.73.md
│   │   ├── Table 1.74.md
│   │   ├── Table 1.75.md
│   │   ├── Table 1.76.md
│   │   ├── Table 1.77.md
│   │   ├── Table 1.78.md
│   │   ├── Table 1.79.md
│   │   └── Table 1.80.md
│   ├── Tags
│   │   ├── 🏷️Access control model.md
│   │   ├── 🏷️Asymmetric encryption algorithm.md
│   │   ├── 🏷️Authentication methods.md
│   │   ├── 🏷️Business agreement.md
│   │   ├── 🏷️Cryptographic attack.md
│   │   ├── 🏷️Cryptography.md
│   │   ├── 🏷️Cybersecurity tool.md
│   │   ├── 🏷️Data structure.md
│   │   ├── 🏷️Data type.md
│   │   ├── 🏷️Development.md
│   │   ├── 🏷️Framework.md
│   │   ├── 🏷️Hash function.md
│   │   ├── 🏷️Injection attack.md
│   │   ├── 🏷️Key derivation function.md
│   │   ├── 🏷️Key exchange algorithm.md
│   │   ├── 🏷️Key exchange protocol.md
│   │   ├── 🏷️Linux command.md
│   │   ├── 🏷️Linux distribution.md
│   │   ├── 🏷️Malware.md
│   │   ├── 🏷️Network attack.md
│   │   ├── 🏷️Networking device.md
│   │   ├── 🏷️Networking.md
│   │   ├── 🏷️Network protocol.md
│   │   ├── 🏷️Network security.md
│   │   ├── 🏷️Network topology.md
│   │   ├── 🏷️Network type.md
│   │   ├── 🏷️News outlet.md
│   │   ├── 🏷️Obfuscation.md
│   │   ├── 🏷️Operating system.md
│   │   ├── 🏷️OS component.md
│   │   ├── 🏷️Password attack.md
│   │   ├── 🏷️Password security.md
│   │   ├── 🏷️PC hardware.md
│   │   ├── 🏷️Physical security.md
│   │   ├── 🏷️Policy.md
│   │   ├── 🏷️Principle.md
│   │   ├── 🏷️Programming.md
│   │   ├── 🏷️Python.md
│   │   ├── 🏷️Regulation.md
│   │   ├── 🏷️Risk management.md
│   │   ├── 🏷️Security hardware.md
│   │   ├── 🏷️Social engineering.md
│   │   ├── 🏷️Software.md
│   │   ├── 🏷️SQL.md
│   │   ├── 🏷️Subreddit.md
│   │   ├── 🏷️Symmetric encryption algorithm.md
│   │   ├── 🏷️Threat intelligence.md
│   │   ├── 🏷️Web application attack.md
│   │   ├── 🏷️Web application security.md
│   │   └── 🏷️Youtube channel.md
│   ├── Templates
│   │   ├── Note Callout.md
│   │   └── See also.md
│   └── To-Do List
├── Notes
│   ├── AAA server.md
│   ├── Abstraction.md
│   ├── Acceptable use policy (AUP).md
│   ├── Access badge cloning.md
│   ├── Access badge.md
│   ├── Access control list (ACL).md
│   ├── Access control vestibule.md
│   ├── Access point (AP).md
│   ├── Access Restrictions.md
│   ├── Accountability.md
│   ├── Account Change Audit.md
│   ├── Account.md
│   ├── Active directory (AD).md
│   ├── Active packet sniffing.md
│   ├── Adaptive identity.md
│   ├── Address resolution protocol (ARP).md
│   ├── Address space layout randomization (ASLR).md
│   ├── Ad hoc assessment.md
│   ├── Advanced encryption standard (AES).md
│   ├── Advanced Package Tool (APT).md
│   ├── Advanced Persistent Threat (APT).md
│   ├── Adversarial AI.md
│   ├── Adversarial tactics, techniques, and common knowledge (ATT&CK).md
│   ├── Adware.md
│   ├── Aggregate functions.md
│   ├── Aircrack-ng.md
│   ├── Air gap.md
│   ├── Alert.md
│   ├── Algorithm.md
│   ├── alias.md
│   ├── Alteration.md
│   ├── Amplification attack.md
│   ├── Analysis.md
│   ├── AND.md
│   ├── Angler phishing.md
│   ├── Annual loss expectancy (ALE).md
│   ├── Annual rate of occurrence (ARO).md
│   ├── Anomaly-based detection.md
│   ├── Anonymization.md
│   ├── Antivirus (AV).md
│   ├── API token.md
│   ├── Application allow list ⁄ deny list.md
│   ├── Application.md
│   ├── Application programming interface (API).md
│   ├── Application security monitoring.md
│   ├── Archiving.md
│   ├── Arch linux.md
│   ├── Argon2.md
│   ├── Argument (Linux).md
│   ├── Argument (Python).md
│   ├── Armor virus.md
│   ├── ARP poisoning.md
│   ├── Artificial Intelligence (AI).md
│   ├── Asset classification.md
│   ├── Asset inventory.md
│   ├── Asset lifecycle management.md
│   ├── Asset.md
│   ├── Asset ownership.md
│   ├── Asset tracking.md
│   ├── Assign and reassign variables in python.md
│   ├── Asymmetric encryption.md
│   ├── Asynchronous Transfer Mode (ATM).md
│   ├── Attack surface.md
│   ├── Attack vector.md
│   ├── Attestation.md
│   ├── Attribute-based access control (ABAC).md
│   ├── Audit checklist.md
│   ├── Authentication, Authorization, and Accounting (AAA).md
│   ├── Authentication & Authorization Technologies.md
│   ├── Authentication header (AH).md
│   ├── Authentication.md
│   ├── Authorization.md
│   ├── Authorization model.md
│   ├── Automated indicator sharing (AIS).md
│   ├── Automation.md
│   ├── Autopsy.md
│   ├── Availability.md
│   ├── Backdoor.md
│   ├── Backout plan.md
│   ├── Backup.md
│   ├── Baiting.md
│   ├── Bandwidth.md
│   ├── Baseline.md
│   ├── Bash.md
│   ├── Basic Auth.md
│   ├── Basic filters on SQL queries.md
│   ├── Basic Input ⧸ Output System (BIOS).md
│   ├── Basic queries.md
│   ├── Basic service set identifier (BSSID).md
│   ├── Basic SQL query.md
│   ├── bcrypt.md
│   ├── Best practices for log collection and management.md
│   ├── BETWEEN.md
│   ├── Biometrics.md
│   ├── Birthday attack.md
│   ├── Bit.md
│   ├── Blockchain.md
│   ├── Block cipher.md
│   ├── Blowfish.md
│   ├── BlueBorne.md
│   ├── BlueSmack.md
│   ├── Bluesnarfing.md
│   ├── Bluetooth.md
│   ├── Bogus DNS.md
│   ├── Bollards.md
│   ├── Boolean.md
│   ├── Bootkit.md
│   ├── Bootloader.md
│   ├── Boot sector virus.md
│   ├── Border gateway protocol (BGP).md
│   ├── Botnet.md
│   ├── Bracket notation.md
│   ├── Brand impersonation.md
│   ├── Breach.md
│   ├── Bridge.md
│   ├── Bridge protocol data unit (BPDU).md
│   ├── Bring your own device (BYOD).md
│   ├── Brute force attack.md
│   ├── Buffer overflow.md
│   ├── Bug bounty.md
│   ├── Built-in function.md
│   ├── Burp Suite.md
│   ├── Business continuity considerations.md
│   ├── Business continuity plan (BCP).md
│   ├── Business Email Compromise (BEC).md
│   ├── Business impact analysis (BIA).md
│   ├── Business partners agreement (BPA).md
│   ├── Bus topology.md
│   ├── C2 Node.md
│   ├── cal.md
│   ├── Capacity planning.md
│   ├── CAPTCHA.md
│   ├── Carriage Return Line Feed (CRLF) Injection.md
│   ├── Cascading Style Sheets (CSS).md
│   ├── cat, echo & less.md
│   ├── cd.md
│   ├── CEF (Common Event Format).md
│   ├── Cellular network.md
│   ├── CentOS.md
│   ├── Central Processing Unit (CPU).md
│   ├── Certificate authority (CA).md
│   ├── Certificate of destruction.md
│   ├── Certificate revocation list (CRL).md
│   ├── Certificate signing request (CSR).md
│   ├── Chain of custody.md
│   ├── Challenge Handshake Authentication Protocol (CHAP).md
│   ├── Change management.md
│   ├── Channel service unit (CSU).md
│   ├── Checksum.md
│   ├── chmod & chown.md
│   ├── Choose your own device (CYOD).md
│   ├── Chronicle.md
│   ├── CIA triad.md
│   ├── Cipher-based Message Authentication Code (CMAC).md
│   ├── Cipher block chaining (CBC).md
│   ├── Cipher feedback (CFB).md
│   ├── Cipher lock.md
│   ├── Cipher.md
│   ├── Ciphertext.md
│   ├── CISSP Security Domains.md
│   ├── Classless Inter-Domain Routing (CIDR).md
│   ├── clear.md
│   ├── Client-Server model.md
│   ├── Clone Phishing.md
│   ├── Closed-circuit television (CCTV).md
│   ├── Cloud access security broker (CASB).md
│   ├── Cloud computing.md
│   ├── Cloud-managed access points.md
│   ├── Cloud responsibility matrix.md
│   ├── Cloud Service Provider (CSP).md
│   ├── Code injection.md
│   ├── Code.md
│   ├── Code signing.md
│   ├── Cold site.md
│   ├── Combining operators.md
│   ├── Command and control (C2).md
│   ├── Command injection.md
│   ├── Command line interface (CLI).md
│   ├── Command.md
│   ├── Comma Separated Value (CSV).md
│   ├── Comment.md
│   ├── Common Event Format (CEF).md
│   ├── Common vulnerabilities and exposures (CVE).md
│   ├── Common vulnerability scoring system (CVSS).md
│   ├── Communicate effectively with stakeholders.md
│   ├── Compare operating systems.md
│   ├── Comparison operators.md
│   ├── Compliance.md
│   ├── Compliance monitoring.md
│   ├── Compliance reporting.md
│   ├── Components of a detection signature.md
│   ├── Computer emergency response team (CERT).md
│   ├── Computer incident response team (CIRT).md
│   ├── Conditional statement.md
│   ├── Confidentiality.md
│   ├── Configuration enforcement.md
│   ├── Configuration file.md
│   ├── Containerization.md
│   ├── Containment.md
│   ├── Content filtering.md
│   ├── Content management system (CMS).md
│   ├── Contingency planning (CP).md
│   ├── Continuity of operations planning (COOP).md
│   ├── Continuous integration.md
│   ├── Continuous learning in SQL.md
│   ├── Controlled zone.md
│   ├── Controller-based access point (CAP).md
│   ├── Control objectives.md
│   ├── Control plane.md
│   ├── Cookie.md
│   ├── Corporate owned, personally enabled (COPE).md
│   ├── Corrective action report (CAR).md
│   ├── Cost.md
│   ├── Counter mode CBC-MAC protocol (CCMP).md
│   ├── Counter mode (CTM).md
│   ├── cp & mv.md
│   ├── Credential stuffing.md
│   ├── Crossover error rate (CER).md
│   ├── Cross-site request forgery (CSRF).md
│   ├── Cross-site request.md
│   ├── Cross-site scripting (XSS).md
│   ├── Crowdsourcing.md
│   ├── Cryptographic erasure.md
│   ├── Cryptographic key.md
│   ├── Cryptography.md
│   ├── Cryptojacking.md
│   ├── CSO Online.md
│   ├── curl.md
│   ├── CVE Numbering Authority (CNA).md
│   ├── CVSS Metrics.md
│   ├── CyberHAC.md
│   ├── Cybersecurity insurance.md
│   ├── Cyber Threat Framework (CTF).md
│   ├── Cyber threat intelligence (CTI).md
│   ├── Cyclical redundancy check (CRC).md
│   ├── Dark web intelligence.md
│   ├── Dark web.md
│   ├── Database administrator (DBA).md
│   ├── Database.md
│   ├── Data center.md
│   ├── Data classifications.md
│   ├── Data encryption standard (DES).md
│   ├── Data execution prevention (DEP).md
│   ├── Data exfiltration.md
│   ├── Data Governance Policy.md
│   ├── Datagram Congestion Control Protocol (DCCP).md
│   ├── Data inventory.md
│   ├── Data lifecycle stages.md
│   ├── Data loss prevention (DLP).md
│   ├── Data masking.md
│   ├── Data.md
│   ├── Data Minimization.md
│   ├── Data Packet.md
│   ├── Data plane.md
│   ├── Data Protection Policy.md
│   ├── Data retention.md
│   ├── Data roles.md
│   ├── Data sovereignty.md
│   ├── Data states.md
│   ├── Data Structures.md
│   ├── Data subject.md
│   ├── Data types.md
│   ├── dd.md
│   ├── Deauthentication attack.md
│   ├── Debian.md
│   ├── Debugger.md
│   ├── Debugging.md
│   ├── Decommissioning.md
│   ├── Decoy directories.md
│   ├── Decryption.md
│   ├── Deep packet inspection (DPI).md
│   ├── Defense in depth.md
│   ├── Demilitarized zone (DMZ).md
│   ├── Denial of service (DoS).md
│   ├── Dependencies.md
│   ├── Desktop environment.md
│   ├── Destination network address translation (DNAT).md
│   ├── Detection.md
│   ├── Detection tools and techniques.md
│   ├── Determining Scan Frequency.md
│   ├── df & mount.md
│   ├── Diameter.md
│   ├── Dictionary attack.md
│   ├── Dictionary.md
│   ├── diff, cmp & comm.md
│   ├── Diffie-Hellman (DH).md
│   ├── Diffie-Hellman Ephemeral (DHE).md
│   ├── Digital certificate.md
│   ├── Digital forensics.md
│   ├── Digital Security Standard (DSS).md
│   ├── Digital signature algorithm (DSA).md
│   ├── Digital signature.md
│   ├── Digital subscriber line (DSL).md
│   ├── Directory.md
│   ├── Directory traversal.md
│   ├── Disassociation attack.md
│   ├── Disaster recovery plan (DRP).md
│   ├── Disclosure.md
│   ├── Discretionary access control (DAC).md
│   ├── Distance Vector Routing Protocol (DVRP).md
│   ├── Distributed denial of service (DDoS).md
│   ├── DLL injection.md
│   ├── DLL sideloading.md
│   ├── DNS filtering.md
│   ├── DNS over HTTPS (DoH).md
│   ├── DNS poisoning.md
│   ├── DNS tunneling.md
│   ├── Domain-based message authentication, reporting, and conformance (DMARC).md
│   ├── Domain hijacking.md
│   ├── DomainKeys identified mail (DKIM).md
│   ├── Domain.md
│   ├── Domain name system (DNS).md
│   ├── Downgrade attack.md
│   ├── dpkg.md
│   ├── Dropper.md
│   ├── Due diligence.md
│   ├── Dumpster diving.md
│   ├── Dynamic code analysis.md
│   ├── Dynamic host configuration protocol (DHCP).md
│   ├── Dynamic-link library (DLL).md
│   ├── Dynamic page generation.md
│   ├── Ease of deployment.md
│   ├── Easter egg.md
│   ├── Eavesdropping.md
│   ├── E-discovery.md
│   ├── Electronic codebook (ECB).md
│   ├── Electronic serial number (ESN).md
│   ├── Elliptic-curve cryptography (ECC).md
│   ├── Elliptic Curve Diffie-Hellman (ECDH).md
│   ├── Elliptic-curve diffie-hellman ephemeral (ECDHE).md
│   ├── Elliptic Curve Digital Signature Algorithm (ECDSA).md
│   ├── Email Header Injection.md
│   ├── Email Phishing.md
│   ├── Embedded systems.md
│   ├── Encapsulating security payload (ESP).md
│   ├── Encapsulation.md
│   ├── Encrypted virus.md
│   ├── Encrypting file system (EFS).md
│   ├── Encryption.md
│   ├── End of life (EOL).md
│   ├── End of service life (EOSL).md
│   ├── Endpoint detection and response (EDR).md
│   ├── Endpoint.md
│   ├── End-to-End Encryption (E2EE).md
│   ├── Enhanced Interior Gateway Routing Protocol (EIGRP).md
│   ├── Enterprise resource planning (ERP).md
│   ├── Enumeration.md
│   ├── Enum.md
│   ├── Environment variable.md
│   ├── Eric Parker.md
│   ├── Escalation.md
│   ├── Escalation Policy.md
│   ├── Ethernet.md
│   ├── Ettercap.md
│   ├── Evil twin.md
│   ├── Exception.md
│   ├── Exclusive or (XOR).md
│   ├── Exploitable gaps in databases.md
│   ├── export.md
│   ├── Exposure factor (EF).md
│   ├── Extended detection and response (XDR).md
│   ├── Extensible authentication protocol (EAP).md
│   ├── Extensible markup language (XML).md
│   ├── Exterior Gateway Protocol (EGP).md
│   ├── Fail-open ⁄ fail-closed.md
│   ├── Failover.md
│   ├── False acceptance rate (FAR).md
│   ├── False flag attack.md
│   ├── False rejection rate (FRR).md
│   ├── Fast Re-Route (FRR).md
│   ├── Federal Information Processing Standards (FIPS 140-3).md
│   ├── Federal Information Security Management Act (FISMA).md
│   ├── Federation.md
│   ├── Fencing.md
│   ├── FERC-NERC.md
│   ├── FIDO2.md
│   ├── Field programmable gate array (FPGA).md
│   ├── File integrity monitoring (FIM).md
│   ├── Fileless exploits.md
│   ├── Fileless malware.md
│   ├── File system access control list (FACL).md
│   ├── Filesystem hierarchy standard (FHS).md
│   ├── File transfer protocol (FTP).md
│   ├── File transfer protocol secure (FTPS).md
│   ├── Filter content in Linux.md
│   ├── Filter dates and numbers.md
│   ├── Filtering.md
│   ├── Filters with AND, OR, and NOT.md
│   ├── Firewall.md
│   ├── Firmware.md
│   ├── Float.md
│   ├── Foreign key.md
│   ├── Frame Relay.md
│   ├── Framework.md
│   ├── FROM.md
│   ├── FULL OUTER JOIN.md
│   ├── Full Packet Capture (FPC).md
│   ├── Function (Python).md
│   ├── Functions and variables.md
│   ├── Fuzzing.md
│   ├── Galois counter mode (GCM).md
│   ├── Galois message authentication code (GMAC).md
│   ├── Gap analysis.md
│   ├── General data protection regulation (GDPR).md
│   ├── Generator.md
│   ├── Generic routing encapsulation (GRE).md
│   ├── Geofencing.md
│   ├── Geolocation.md
│   ├── Global positioning system (GPS).md
│   ├── GNU.md
│   ├── GNU privacy guard (GPG).md
│   ├── gobuster.md
│   ├── Graphical user interface (GUI).md
│   ├── grep.md
│   ├── Group policy object (GPO).md
│   ├── Guardrails.md
│   ├── Hacker.md
│   ├── HackerSploit.md
│   ├── Handshake.md
│   ├── Hardening.md
│   ├── Hardware Security Module (HSM).md
│   ├── Hash-based Message Authentication Code (HMAC).md
│   ├── Hashcat.md
│   ├── Hash collision.md
│   ├── Hashing.md
│   ├── Hash value.md
│   ├── Header manipulation.md
│   ├── head & tail.md
│   ├── Health Information Trust Alliance (HITRUST).md
│   ├── Health Insurance Portability and Accountability Act (HIPAA).md
│   ├── Hierarchical database.md
│   ├── High availability (HA).md
│   ├── High-Level Data Link Control (HDLC).md
│   ├── HMAC-based one-time password (HOTP).md
│   ├── Hoaxes.md
│   ├── Honeyfiles.md
│   ├── Honeynet.md
│   ├── Honeypot.md
│   ├── Honeytokens.md
│   ├── Host Header Injection.md
│   ├── Hosting models.md
│   ├── Hot site.md
│   ├── How to read a Wireshark TCP ⁄ HTTP log.md
│   ├── HTML injection.md
│   ├── Hub.md
│   ├── Hybrid cloud.md
│   ├── Hybrid topology.md
│   ├── Hypertext markup language (HTML).md
│   ├── Hypertext transfer protocol (HTTP).md
│   ├── Hypertext transfer protocol secure (HTTPS).md
│   ├── Hypervisor.md
│   ├── ICMP Flood.md
│   ├── Identity and access management (IAM).md
│   ├── Identity.md
│   ├── Identity proofing.md
│   ├── Identity provider (IdP).md
│   ├── IEEE 802.11 (Wi-Fi).md
│   ├── IEEE 802.1X.md
│   ├── ifconfig & traceroute.md
│   ├── Immutable.md
│   ├── Impersonation.md
│   ├── Import files into python.md
│   ├── Import modules and libraries in python.md
│   ├── Improper usage.md
│   ├── Incident.md
│   ├── Incident response plan (IRP).md
│   ├── Incident Response Policy.md
│   ├── Incorporating comparison operators.md
│   ├── Indentation.md
│   ├── Index.md
│   ├── Indicators of attack (IoA).md
│   ├── Indicators of compromise (IoC).md
│   ├── Industrial control system (ICS).md
│   ├── Infared (IR).md
│   ├── Influence campagins.md
│   ├── Information privacy∶ Regulations and compliance.md
│   ├── Information Security (InfoSec).md
│   ├── Information Security Policy.md
│   ├── Information-sharing organization.md
│   ├── Information Systems Security.md
│   ├── Information technology (IT).md
│   ├── Infrastructure as a service (IaaS).md
│   ├── Infrastructure as code (IaC).md
│   ├── Initialization vector (IV).md
│   ├── Injection attack.md
│   ├── INNER JOIN.md
│   ├── Input sanitization.md
│   ├── Input validation.md
│   ├── Insecure Protocols.md
│   ├── Inside operating systems.md
│   ├── Insider Threat.md
│   ├── Instant messaging (IM).md
│   ├── Integer.md
│   ├── Integrated development environment (IDE).md
│   ├── Integrity.md
│   ├── Intermediate distribution frame (IDF).md
│   ├── Intermediate System to Intermediate System (IS-IS).md
│   ├── International Data Encryption Algorithm (IDEA).md
│   ├── Internet Assigned Numbers Authority (IANA).md
│   ├── Internet Control Message Protocol (ICMP).md
│   ├── Internet Group Management Protocol (IGMP).md
│   ├── Internet key exchange (IKE).md
│   ├── Internet.md
│   ├── Internet message access protocol (IMAP).md
│   ├── Internet message access protocol secure (IMAPS).md
│   ├── Internet of Things (IoT).md
│   ├── Internet protocol (IP).md
│   ├── Internet protocol security (IPsec).md
│   ├── Internet relay chat (IRC).md
│   ├── Internet Service Provider (ISP).md
│   ├── Interoperability.md
│   ├── Interpreter.md
│   ├── Interpreting the CVSS Vector.md
│   ├── Interpret network communications with packets.md
│   ├── Introduction to databases.md
│   ├── Intrusion detection system (IDS).md
│   ├── Intrusion prevention system (IPS).md
│   ├── Investigate packet details.md
│   ├── IP address.md
│   ├── IP spoofing.md
│   ├── iptables.md
│   ├── Iterative statement.md
│   ├── Jailbreaking ⁄ Rooting.md
│   ├── JavaScript.md
│   ├── JavaScript Object Notation (JSON).md
│   ├── John The Ripper.md
│   ├── Join tables in SQL.md
│   ├── Journaling.md
│   ├── Jump server.md
│   ├── Just-in-time permissions.md
│   ├── Kali linux.md
│   ├── Kerberos.md
│   ├── Kerchoff’s principle.md
│   ├── Kernel-based Virtual Machine (KVM).md
│   ├── Key Derivation Function (KDF).md
│   ├── Key distribution center (KDC).md
│   ├── Key encryption key (KEK).md
│   ├── Key escrow.md
│   ├── Key exchange.md
│   ├── Keylogger.md
│   ├── Key management system.md
│   ├── Key rotation.md
│   ├── Key stretching.md
│   ├── Krebs on Security.md
│   ├── Lateral movement.md
│   ├── Layer 2 tunneling protocol (L2TP).md
│   ├── LDAP Injection.md
│   ├── Least privilege.md
│   ├── LEFT JOIN.md
│   ├── Legacy platforms.md
│   ├── Legal hold.md
│   ├── Library.md
│   ├── Lighting.md
│   ├── Lightweight directory access protocol (LDAP).md
│   ├── Lightweight directory access protocol secure (LDAPS).md
│   ├── Lightweight extensible authentication protocol (LEAP).md
│   ├── LIKE.md
│   ├── Linux architecture.md
│   ├── Linux commands cheat sheet.md
│   ├── Linux kernel.md
│   ├── Linux.md
│   ├── Linux resources.md
│   ├── List concatenation.md
│   ├── List.md
│   ├── Lists and the security analyst.md
│   ├── Living off the land (LoL).md
│   ├── ln.md
│   ├── Load balancer.md
│   ├── Loader.md
│   ├── Local Area Network (LAN).md
│   ├── Log forwarders.md
│   ├── Logic bomb.md
│   ├── Logic error.md
│   ├── Login banner.md
│   ├── Log management.md
│   ├── Log.md
│   ├── Loopback address.md
│   ├── Lost Key Pairs.md
│   ├── ls.md
│   ├── MAC address.md
│   ├── Machine Learning (ML).md
│   ├── macOS.md
│   ├── Macro virus.md
│   ├── Mad Hat.md
│   ├── Mail gateway.md
│   ├── Main distribution frame (MDF).md
│   ├── Maintain awareness with network monitoring.md
│   ├── Malware.md
│   ├── Managed security service provider (MSSP).md
│   ├── Managed service provider (MSP).md
│   ├── Management information base (MIB).md
│   ├── Mandatory access control (MAC).md
│   ├── man.md
│   ├── Masquerading.md
│   ├── Master boot record (MBR).md
│   ├── Master service agreement (MSA).md
│   ├── Maximum transmission unit (MTU).md
│   ├── Mean time between failures (MTBF).md
│   ├── Mean time to failure (MTTF).md
│   ├── Mean time to recover (MTTR).md
│   ├── Media access control (MAC).md
│   ├── Memorandum of agreement (MOA).md
│   ├── Memorandum of understanding (MOU).md
│   ├── Memory injection.md
│   ├── Memory (RAM).md
│   ├── Mesh access points.md
│   ├── Mesh topology.md
│   ├── Message Authentication Code (MAC).md
│   ├── Message Digest 5 (MD5).md
│   ├── Message integrity code (MIC).md
│   ├── Metadata.md
│   ├── Metamorphic virus.md
│   ├── Metasploit.md
│   ├── Method.md
│   ├── Metrics.md
│   ├── Metropolitan Area Network (MAN).md
│   ├── Microservice architecture.md
│   ├── Microsoft challenge handshake authentication protocol (MSCHAP).md
│   ├── Misinformation and Disinformation.md
│   ├── mkdir.md
│   ├── Mobile device management (MDM).md
│   ├── Modem.md
│   ├── Module.md
│   ├── Monitoring as a service (MaaS).md
│   ├── Monolithic architecture.md
│   ├── More about regular expressions.md
│   ├── More on conditionals in python.md
│   ├── More on filters with AND, OR, and NOT.md
│   ├── More on loops in python.md
│   ├── Motherboard.md
│   ├── Multi-factor authentication (MFA).md
│   ├── Multifunction device (MFD).md
│   ├── Multifunction printer (MFP).md
│   ├── Multimedia message service (MMS).md
│   ├── Multipartite virus.md
│   ├── Multi-protocol label switching (MPLS).md
│   ├── nano.md
│   ├── Near field communication (NFC).md
│   ├── Need-To-Know.md
│   ├── NetFlow.md
│   ├── Network access control (NAC).md
│   ├── Network address translation (NAT).md
│   ├── Network attached storage (NAS).md
│   ├── Network-based firewall.md
│   ├── NetworkChuck.md
│   ├── Network Configuration Protocol (NETCONF).md
│   ├── Network database.md
│   ├── Network hardening.md
│   ├── Network hardening tools.md
│   ├── Network Interface Card (NIC).md
│   ├── Network.md
│   ├── Network protocol analyzer.md
│   ├── Network Protocol.md
│   ├── Network security applications.md
│   ├── Network Security Policy.md
│   ├── Network segmentation.md
│   ├── Network stack.md
│   ├── Network time protocol (NTP).md
│   ├── Network Traffic.md
│   ├── Network Virtual Appliance (NVA).md
│   ├── New technology file system (NTFS).md
│   ├── New technology LAN manager (NTLM).md
│   ├── Next-generation firewall (NGFW).md
│   ├── nftables.md
│   ├── NIST Cybersecurity Framework (CSF).md
│   ├── NIST Incident Response Lifecycle.md
│   ├── NIST Risk Management Framework (RMF).md
│   ├── NIST Special Publication (S.P.) 800-53.md
│   ├── NixOS.md
│   ├── nmap.md
│   ├── Nonce.md
│   ├── Non-disclosure agreement (NDA).md
│   ├── Non-repudiation and hashing.md
│   ├── Non-repudiation.md
│   ├── NoSQL Injection.md
│   ├── NOT.md
│   ├── OAuth.md
│   ├── Obfuscation.md
│   ├── Object identifier (OID).md
│   ├── Object.md
│   ├── OCSP stapling.md
│   ├── One-Time Password (OTP).md
│   ├── Online certificate status protocol (OCSP).md
│   ├── On-path attack.md
│   ├── On-path browser attack.md
│   ├── OpenID Connect.md
│   ├── OpenID.md
│   ├── Open shortest path first (OSPF).md
│   ├── Open Shortest Path First Version 3 (OSPFv3).md
│   ├── Open source intelligence.md
│   ├── Open-source intelligence (OSINT).md
│   ├── Open-source.md
│   ├── OpenSSL.md
│   ├── openSUSE.md
│   ├── Open systems interconnection (OSI) model.md
│   ├── Open Vulnerability and Assessment Language (OVAL).md
│   ├── Operating system (OS).md
│   ├── Operational technology (OT).md
│   ├── Operator.md
│   ├── Operators for filtering dates and numbers.md
│   ├── Operators.md
│   ├── Ophcrack.md
│   ├── ORDER BY.md
│   ├── OR.md
│   ├── Out-of-bounds write.md
│   ├── Over the air (OTA).md
│   ├── Overview of detection tools.md
│   ├── Overview of tcmdump.md
│   ├── Package management tool.md
│   ├── Package manager.md
│   ├── Package.md
│   ├── Package monitoring.md
│   ├── Packet capture (PCAP).md
│   ├── Packet captures with tcpdump.md
│   ├── Packet mirroring.md
│   ├── Packet sniffing.md
│   ├── Parallel processing.md
│   ├── Parameter (Python).md
│   ├── Parameters.md
│   ├── ParrotOS.md
│   ├── Parsing.md
│   ├── Passive packet sniffing.md
│   ├── Pass-the-Hash (PtH) attack.md
│   ├── passwd.md
│   ├── Password authentication protocol (PAP).md
│   ├── Password-based key derivation function 2 (PBKDF2).md
│   ├── Passwordless authentication.md
│   ├── Password manager.md
│   ├── Password.md
│   ├── Password policy.md
│   ├── Password spraying.md
│   ├── Password vault.md
│   ├── Path hijacking.md
│   ├── Payment Card Industry Data Security Standard (PCI DSS).md
│   ├── Peer-to-Peer model.md
│   ├── Peer to peer (P2P).md
│   ├── Penetration test.md
│   ├── Pen test classification.md
│   ├── Pen testing strategies.md
│   ├── Perfect forward secrecy (PFS).md
│   ├── Peripheral devices.md
│   ├── Permission commands (Linux).md
│   ├── Permissions.md
│   ├── Personal Area Network (PAN).md
│   ├── Personal electronic device (PED).md
│   ├── Personal identity verification (PIV).md
│   ├── Personally identifiable information (PII).md
│   ├── Phases of pen tests.md
│   ├── Phishing.md
│   ├── Piggybacking.md
│   ├── Ping of Death.md
│   ├── pipe.md
│   ├── PKCS 12 (P12).md
│   ├── Plain old telephone service (POTS).md
│   ├── Plaintext.md
│   ├── Platform as a service (PaaS).md
│   ├── Playbook.md
│   ├── Pluggable authentication modules (PAM).md
│   ├── Pointer.md
│   ├── Point-to-Point Protocol (PPP).md
│   ├── Point-to-point tunneling protocol (PPTP).md
│   ├── Policy administrator.md
│   ├── Policy-based access control (PBAC).md
│   ├── Policy decision point (PDP).md
│   ├── Policy enforcement point (PEP).md
│   ├── Policy engine.md
│   ├── Policy.md
│   ├── Polymorphic virus.md
│   ├── Port address translation (PAT).md
│   ├── Port filtering.md
│   ├── Port forwarding.md
│   ├── Port.md
│   ├── Port mirroring.md
│   ├── Port triggering.md
│   ├── Post office protocol (POP).md
│   ├── Post office protocol version 3 secure (POP3S).md
│   ├── Posture assessment.md
│   ├── Potentially unwanted application (PUA).md
│   ├── Potentially unwanted program (PUP).md
│   ├── Power distribution unit (PDU).md
│   ├── Power-On Self-Test (POST).md
│   ├── PowerShell.md
│   ├── Power Supply.md
│   ├── Prepared statement.md
│   ├── Pre-shared key (PSK).md
│   ├── Pretexting.md
│   ├── Pretty good privacy (PGP).md
│   ├── Primary key.md
│   ├── Principle.md
│   ├── Privacy enhanced mail (PEM).md
│   ├── Private branch exchange (PBX).md
│   ├── Private key.md
│   ├── Privilege Audit.md
│   ├── Privileged access management (PAM).md
│   ├── Privilege escalation.md
│   ├── Process hollowing.md
│   ├── Process of Attack Simulation and Threat Analysis (PASTA).md
│   ├── Professor Messer.md
│   ├── Program virus.md
│   ├── Proprietary intelligence.md
│   ├── Protected extensible authentication protocol (PEAP).md
│   ├── Protected health information (PHI).md
│   ├── Proxy auto-configuration (PAC).md
│   ├── Proxy server.md
│   ├── ps, kill & killall.md
│   ├── Public key cryptography standards (PKCS).md
│   ├── Public key Infrastructure (PKI).md
│   ├── Public key.md
│   ├── pwd.md
│   ├── Pyramid of pain.md
│   ├── Python and cybersecurity.md
│   ├── Python environments.md
│   ├── Python functions in cybersecurity.md
│   ├── Python.md
│   ├── Quality of service (QoS).md
│   ├── Query a database.md
│   ├── Query.md
│   ├── Query Minimization.md
│   ├── Quid Pro Quo.md
│   ├── Race condition.md
│   ├── RACE Integrity Primitive Evaluation Message Digest (RIPEMD).md
│   ├── Radio Frequency Identification (RFID).md
│   ├── Radio frequency (RF) jamming.md
│   ├── Radio Frequency (RF).md
│   ├── Rainbow table.md
│   ├── Ransomware.md
│   ├── Rapid application development (RAD).md
│   ├── r ⁄ cybersecurity.md
│   ├── Real-life DDoS attack.md
│   ├── Real-time operating system (RTOS).md
│   ├── Real-time transport protocol (RTP).md
│   ├── Reconnaissance.md
│   ├── Recovery agent (RA).md
│   ├── Recovery.md
│   ├── Recovery point objective (RPO).md
│   ├── Recovery testing.md
│   ├── Recovery time objective (RTO).md
│   ├── Red, blue & purple teams.md
│   ├── Red hat enterprise linux (RHEL).md
│   ├── Redirection (Linux).md
│   ├── Redundant array of independent disks (RAID).md
│   ├── Reference Guide SQL.md
│   ├── Reflection attack.md
│   ├── Registration authority (RA).md
│   ├── Regular expression (regex).md
│   ├── Regulation.md
│   ├── Relational database management system (RDBMS).md
│   ├── Relational database.md
│   ├── Relative file path.md
│   ├── Reliable User Datagram Protocol (RUDP).md
│   ├── Relying Party (RP).md
│   ├── Remote Access Policy.md
│   ├── Remote access server (RAS).md
│   ├── Remote Access Trojan (RAT).md
│   ├── Remote authentication dial-in user service (RADIUS).md
│   ├── Remote code execution (RCE).md
│   ├── Remote desktop protocol (RDP).md
│   ├── Remotely triggered black hole (RTBH).md
│   ├── Replay attack.md
│   ├── Replication.md
│   ├── Reporting.md
│   ├── Resilience.md
│   ├── Resource reuse.md
│   ├── Responsible disclosure program.md
│   ├── Responsiveness.md
│   ├── Restricted Zone.md
│   ├── r ⁄ ethicalhacking.md
│   ├── Return on investment (ROI).md
│   ├── Return statement.md
│   ├── Reverse Address Resolution Protocol (RARP).md
│   ├── RIGHT JOIN.md
│   ├── Right-to-audit clause.md
│   ├── r ⁄ infosec.md
│   ├── Ring topogoly.md
│   ├── Risk appetite.md
│   ├── Risk assessment.md
│   ├── Risk-based authentication (RBA).md
│   ├── Risk identification.md
│   ├── Risk management.md
│   ├── Risk.md
│   ├── Risk register.md
│   ├── Risk report.md
│   ├── Risk tolerance.md
│   ├── Risk transference.md
│   ├── Rivest Cipher 4 (RC4).md
│   ├── Rivest Cipher 5 (RC5).md
│   ├── Rivest Cipher 6 (RC6).md
│   ├── Rivest shamir adleman (RSA).md
│   ├── rm.md
│   ├── r ⁄ netsec.md
│   ├── Role-based access control (RBAC).md
│   ├── Roles in response.md
│   ├── Root cause analysis (RCA).md
│   ├── Root directory.md
│   ├── Rootkit.md
│   ├── Root of trust.md
│   ├── Router.md
│   ├── Routing Information Protocol (RIP).md
│   ├── Routing Information Protocol Version 2 (RIPv2).md
│   ├── Rule-based access control (RBAC).md
│   ├── Rules of engagement (RoE).md
│   ├── Salting.md
│   ├── Sandbox.md
│   ├── Sanitization.md
│   ├── Scalability.md
│   ├── Scanner Maintenance.md
│   ├── Scareware.md
│   ├── Script.md
│   ├── scrypt.md
│   ├── Search methods with SIEM tools.md
│   ├── Search Processing Language (SPL).md
│   ├── Secure access service edge (SASE).md
│   ├── Secure boot.md
│   ├── Secure cookies.md
│   ├── Secure enclave.md
│   ├── Secure Hash Algorithm 1 (SHA-1).md
│   ├── Secure Hash Algorithm 2 (SHA-2).md
│   ├── Secure Hash Algorithm 3 (SHA-3).md
│   ├── Secure hypertext transfer protocol (SHTTP).md
│   ├── Secure ⁄ multipurpose internet mail extensions (S ⁄ MIME).md
│   ├── Secure real-time transport protocol (SRTP).md
│   ├── Secure shell (SSH).md
│   ├── Secure sockets layer (SSL).md
│   ├── Secure socket tunneling protocol (SSTP).md
│   ├── Secure the cloud.md
│   ├── Secure web gateway (SWG).md
│   ├── Security assertion markup language (SAML).md
│   ├── Security assessment.md
│   ├── Security Audits.md
│   ├── Security baselines.md
│   ├── Security content automation protocol (SCAP).md
│   ├── Security controls.md
│   ├── Security guards.md
│   ├── Security guidelines in action.md
│   ├── Security information and event management (SIEM).md
│   ├── Security key.md
│   ├── Security measure.md
│   ├── Security Operations Center (SoC).md
│   ├── Security orchestration, automation, response (SOAR).md
│   ├── Security posture.md
│   ├── Security zones.md
│   ├── SELECT.md
│   ├── Self-encrypting drives (SED).md
│   ├── Self-signed certificate.md
│   ├── SELinux.md
│   ├── Sender policy framework (SPF).md
│   ├── Sensitive personally identifiable information (SPII).md
│   ├── Sensors.md
│   ├── Separation of duties (SoD).md
│   ├── Server clustering.md
│   ├── Serverless architecture.md
│   ├── Server.md
│   ├── Server message block (SMB).md
│   ├── Service-level agreement (SLA).md
│   ├── service.md
│   ├── Service set identifier (SSID).md
│   ├── Session fixation.md
│   ├── Session hijacking.md
│   ├── Session ID.md
│   ├── Session key.md
│   ├── Session.md
│   ├── Session timeout.md
│   ├── Set.md
│   ├── Shared responsibility.md
│   ├── Shellcode.md
│   ├── Shell.md
│   ├── Shell scripting.md
│   ├── Shim.md
│   ├── Short message service (SMS).md
│   ├── Shoulder surfing.md
│   ├── Side-Channel Attacks.md
│   ├── Sideloading.md
│   ├── Signature-based detection.md
│   ├── Simple certificate enrollment protocol (SCEP).md
│   ├── Simple mail transfer protocol (SMTP).md
│   ├── Simple main transfer protocol secure (SMTPS).md
│   ├── Simple network management protocol (SNMP).md
│   ├── Simple object access protocol (SOAP).md
│   ├── Simulation.md
│   ├── Simultaneous authentication of equals (SAE).md
│   ├── Single loss expectancy (SLE).md
│   ├── Single sign-on (SSO).md
│   ├── Site survey.md
│   ├── Smishing.md
│   ├── Smurf attack.md
│   ├── Snapshot.md
│   ├── Social engineering.md
│   ├── Social Engineering Policy.md
│   ├── Social media phishing.md
│   ├── Software as a service (SaaS).md
│   ├── Software-defined networking (SDN).md
│   ├── Software-defined wide area network (SD-WAN).md
│   ├── Software development kit (SDK).md
│   ├── Software Development Life Cycle Methodology (SDLM).md
│   ├── Software development lifecycle (SDLC).md
│   ├── Software update.md
│   ├── sort.md
│   ├── Spam over internet messaging (SPIM).md
│   ├── Spear phishing.md
│   ├── Speed.md
│   ├── Splunk Cloud.md
│   ├── Splunk Enterprise.md
│   ├── Spyware.md
│   ├── SQL cheat sheet.md
│   ├── SQL injection (SQLi).md
│   ├── SSH file transfer protocol (SFTP).md
│   ├── ssh.md
│   ├── SSL stripping.md
│   ├── Standalone access point.md
│   ├── Standard error.md
│   ├── Standard error (stderr).md
│   ├── Standard input (stdin).md
│   ├── Standard.md
│   ├── Standard output (stdout).md
│   ├── Star topology.md
│   ├── Statement of work (SOW).md
│   ├── Static code analyzer.md
│   ├── Stealth virus.md
│   ├── Steganography.md
│   ├── Storage Area Network (SAN).md
│   ├── Stream cipher.md
│   ├── Stream Control Transmission Protocol (SCTP).md
│   ├── String concatenation.md
│   ├── String.md
│   ├── Strings and the security analyst.md
│   ├── Structured exception handler (SEH).md
│   ├── Structured Query Language (SQL).md
│   ├── Structured threat information expression (STIX).md
│   ├── Style Guide.md
│   ├── Subject alternative name (SAN).md
│   ├── Subnet.md
│   ├── Subnetting.md
│   ├── Subscriber identity module (SIM).md
│   ├── Substring.md
│   ├── sudoers file.md
│   ├── sudo.md
│   ├── Summarizing CVSS Scores.md
│   ├── Supervisory control and data acquisition (SCADA).md
│   ├── Supply chain analysis.md
│   ├── Supply-chain attack.md
│   ├── Suricata.md
│   ├── Switched port analyzer (SPAN).md
│   ├── Switch.md
│   ├── Symmetric encryption.md
│   ├── SYN Flood.md
│   ├── Syntax error.md
│   ├── Syntax.md
│   ├── Syslog.md
│   ├── System and Organization Controls (SOC) Reports.md
│   ├── System hardening.md
│   ├── System on chip (SoC).md
│   ├── Tabletop exercise.md
│   ├── Tactics, techniques, and procedures (TTP).md
│   ├── Tailgating.md
│   ├── tar, zip & unzip.md
│   ├── tcpdump cheat sheet.md
│   ├── tcpdump.md
│   ├── TCP ⁄ IP model.md
│   ├── Technical debt.md
│   ├── Telemetry.md
│   ├── Telnet.md
│   ├── Temporal key integrity protocol (TKIP).md
│   ├── Terminal access controller access control system plus (TACACS+).md
│   ├── Test access point (TAP).md
│   ├── THC Hydra.md
│   ├── The containment, eradication, and recovery phase of the lifecycle.md
│   ├── The evolution of hash functions.md
│   ├── The Hacker News.md
│   ├── The OWASP Top 10.md
│   ├── The PC Security Channel.md
│   ├── The triage process.md
│   ├── The value of documentation.md
│   ├── The WHERE clause and basic operators.md
│   ├── Threat actor.md
│   ├── Threat hunting.md
│   ├── Threat intelligence.md
│   ├── Threat landscape.md
│   ├── Threat.md
│   ├── Threat modeling.md
│   ├── Ticket granting ticket (TGT).md
│   ├── Time-based one-time password (TOTP).md
│   ├── Time-of-check to time-of-use (TOCTOU).md
│   ├── Tokenization.md
│   ├── Tokens.md
│   ├── top.md
│   ├── Topology.md
│   ├── touch.md
│   ├── Transaction signature (TSIG).md
│   ├── Transmission control protocol (TCP).md
│   ├── Transport Layer Security (TLS).md
│   ├── Triage.md
│   ├── Triple DES (3DES).md
│   ├── Trivial File Transfer Protocol (TFTP).md
│   ├── Trojan Horse.md
│   ├── Trunking.md
│   ├── Trusted Automated eXchange of Indicator Information (TAXII).md
│   ├── Trusted platform module (TPM).md
│   ├── Tuple.md
│   ├── Twofish.md
│   ├── Type error.md
│   ├── Types of joins.md
│   ├── Typo-squatting.md
│   ├── Ubuntu.md
│   ├── UDP Flood.md
│   ├── Unauthorized access.md
│   ├── Uncontrolled Zone.md
│   ├── Unified access points.md
│   ├── Unified endpoint management (UEM).md
│   ├── Unified Extensible Firmware Interface (UEFI).md
│   ├── Unified threat management (UTM).md
│   ├── Uniform resource identifier (URI).md
│   ├── Uninterruptible power supply (UPS).md
│   ├── Universal Resource Locator (URL).md
│   ├── Universal serial bus (USB).md
│   ├── Unmanned aerial vehicle (UAV).md
│   ├── Unshielded twisted pair (UTP).md
│   ├── Unskilled Attacker.md
│   ├── URL scanning.md
│   ├── Usage Audit.md
│   ├── USB on the go (USB OTG).md
│   ├── User acceptance testing (UAT).md
│   ├── User access reviews.md
│   ├── useradd & usermod.md
│   ├── User behavior analytics (UBA).md
│   ├── User datagram protocol (UDP).md
│   ├── User Interface.md
│   ├── User.md
│   ├── User provisioning.md
│   ├── Variable length subnet masking (VLSM).md
│   ├── Variables.md
│   ├── Vendor Management Policy.md
│   ├── Vendor monitoring.md
│   ├── Version control.md
│   ├── Video teleconferencing (VTC).md
│   ├── Virtual desktop environment (VDE).md
│   ├── Virtual desktop infrastructure (VDI).md
│   ├── Virtual hosting.md
│   ├── Virtualization.md
│   ├── Virtual Local Area Networks (VLAN).md
│   ├── Virtual machine escape.md
│   ├── Virtual machine (VM).md
│   ├── Virtual private cloud (VPC).md
│   ├── Virtual private network (VPN).md
│   ├── Virus.md
│   ├── VirusTotal.md
│   ├── Vishing.md
│   ├── Visual basic (VB).md
│   ├── Voice over internet protocol (VoIP).md
│   ├── Void linux.md
│   ├── Void.md
│   ├── Vulnerability assessment.md
│   ├── Vulnerability life cycle.md
│   ├── Vulnerability.md
│   ├── Vulnerability scanning.md
│   ├── Vulnerability Scanning Tools.md
│   ├── Warm site.md
│   ├── Watering hole attack.md
│   ├── Web application firewall (WAF).md
│   ├── Web application.md
│   ├── Web-based exploits.md
│   ├── Webcrawler.md
│   ├── wget.md
│   ├── Whaling.md
│   ├── whereis & whatis.md
│   ├── WHERE.md
│   ├── whoami.md
│   ├── Wide Area Network (WAN).md
│   ├── Wi-Fi Protected Access III (WPA3).md
│   ├── Wi-Fi Protected Access II (WPA2).md
│   ├── Wi-Fi Protected Access (WPA).md
│   ├── Wi-Fi protected setup (WPS).md
│   ├── Wildcard certificate.md
│   ├── Wildcard.md
│   ├── Wildcard (SQL).md
│   ├── Window manager.md
│   ├── Windows.md
│   ├── Wired Equivalent Privacy (WEP).md
│   ├── WireGuard.md
│   ├── Wireless jamming.md
│   ├── Wireless LAN Controller (WLC).md
│   ├── Wireless Local Area Network (WLAN).md
│   ├── Wireless Transport Layer Security (WTLS).md
│   ├── Wireshark.md
│   ├── Wordlist.md
│   ├── Work order (WO).md
│   ├── Workstation.md
│   ├── Work with built-in functions.md
│   ├── Work with files in python.md
│   ├── World-writable file.md
│   ├── Worm.md
│   ├── X.500.md
│   ├── X.509.md
│   ├── XML Injection.md
│   ├── XPath Injection.md
│   ├── Yara-L.md
│   ├── Yellowdog Updater Modified (YUM).md
│   ├── Zero-day.md
│   ├── Zero trust.md
│   ├── Zigbee.md
│   └── Zombie.md
└── README.md

15 directories, 1648 files

About

1,000+ interconnected cybersecurity notes built in Obsidian, complete with links, tags, and scripts. Designed for both learning and long-term knowledge management.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages