Legal Disclaimer

This page is created strictly for educational purposes. All concepts, tools, and techniques described here are intended to help learners understand how systems work and how to defend them. Never apply any technique on systems, networks, or accounts you do not own or have explicit written permission to test. Unauthorized access to computer systems is illegal in most countries and can result in criminal prosecution. Practice only in legal environments: your own lab, CTF platforms (HackTheBox, TryHackMe), or with signed authorization.


History

How

  • Cybersecurity emerged as a discipline in the 1970s–1980s as networked computing grew.
  • The Morris Worm (1988) — first major internet worm — infected ~6,000 machines and triggered the creation of the first CERT (Computer Emergency Response Team).
  • The 1990s saw the rise of the web, firewalls, antivirus software, and SSL/TLS encryption.
  • The 2000s brought large-scale data breaches, botnets, and formalization of ethical hacking certifications (CEH, OSCP).
  • The 2010s–present: nation-state attacks, ransomware epidemics (WannaCry, NotPetya), cloud security, zero-day markets, and AI-driven threats.

Who

  • Whitfield Diffie & Martin Hellman — invented public-key cryptography (1976).
  • Ron Rivest, Adi Shamir, Leonard Adleman — created RSA encryption (1977).
  • Bruce Schneier — cryptographer, security author (Applied Cryptography).
  • Kevin Mitnick — famous social engineer turned security consultant.
  • Organizations: NSA, CISA, NIST, OWASP, SANS Institute, Offensive Security.

Why

  • Protect sensitive data (personal, financial, national security).
  • Ensure trust in digital systems (banking, healthcare, government).
  • Defend critical infrastructure (power grids, hospitals, water systems).
  • Combat evolving threats: malware, ransomware, phishing, APTs, insider threats.

Core Concepts & Terminology

The CIA Triad

graph LR
   CIA["🔐 CIA Triad"]
   C["Confidentiality\nOnly authorized access\nEncryption · ACL · Auth"]
   I["Integrity\nData is accurate & unaltered\nHashing · Signatures · Checksums"]
   A["Availability\nSystems accessible when needed\nRedundancy · DDoS Protection · Backups"]
   CIA --> C
   CIA --> I
   CIA --> A

AAA Framework

Authentication  → verify WHO you are     (password, MFA, biometrics)
Authorization   → verify WHAT you can do  (RBAC, ACLs, permissions)
Accounting      → track WHAT you did       (audit logs, SIEM)

Key Security Terms

TermDefinition
VulnerabilityA weakness in a system that can be exploited
ThreatA potential event that could cause harm
RiskLikelihood × Impact of a threat exploiting a vulnerability
ExploitCode or technique that takes advantage of a vulnerability
Zero-DayVulnerability unknown to the vendor — no patch exists
CVECommon Vulnerabilities and Exposures (public database)
CVSSVulnerability severity score (0.0 – 10.0)
IOCIndicator of Compromise — evidence of a breach
TTPsTactics, Techniques, and Procedures — attacker behavior
Attack SurfaceAll possible entry points into a system

Defense Principles

Hacker Classifications

TypeDescription
White HatEthical hackers, authorized security testers
Black HatMalicious hackers, criminal intent
Grey HatFind vulnerabilities without permission, no harm intended
Script KiddieUses pre-made tools without understanding them
HacktivistHacks for political/social causes
Nation-StateGovernment-sponsored APT groups
Insider ThreatMalicious or negligent employee with internal access

Networking Fundamentals for Security

OSI Model — Security Perspective

graph TD
   L7["Layer 7 — Application\nHTTP · HTTPS · DNS · FTP · SMTP\nAttacks: XSS · SQLi · Phishing · MITM"]
   L6["Layer 6 — Presentation\nSSL/TLS · Encoding · Encryption\nAttacks: SSL Stripping · Weak Ciphers"]
   L5["Layer 5 — Session\nSession Management · Cookies\nAttacks: Session Hijacking · Replay"]
   L4["Layer 4 — Transport\nTCP · UDP · Ports\nAttacks: SYN Flood · Port Scanning"]
   L3["Layer 3 — Network\nIP · ICMP · Routing\nAttacks: IP Spoofing · Route Poisoning"]
   L2["Layer 2 — Data Link\nMAC · ARP · Switches\nAttacks: ARP Spoofing · MAC Flooding"]
   L1["Layer 1 — Physical\nCables · Hardware · Wireless\nAttacks: Wiretapping · Signal Jamming"]
   L7 --> L6 --> L5 --> L4 --> L3 --> L2 --> L1

Key Protocols & Security Implications

ProtocolPortSecurity Note
HTTP80Unencrypted — use HTTPS
HTTPS443HTTP over TLS — always use
FTP21Unencrypted — use SFTP
SSH22Encrypted remote shell — replaces Telnet
Telnet23Unencrypted — never use
DNS53Vulnerable to poisoning — use DNSSEC/DoH
DHCP67/68Vulnerable to rogue DHCP server
SNMP161v1/v2 insecure — use SNMPv3
RDP3389Common attack target — restrict access
SMB445EternalBlue target — patch and restrict
LDAP389Use LDAPS (636) for encryption

IP Addressing & Subnetting

Private ranges (RFC 1918 — not routable on internet):
  10.0.0.0/8        → 10.0.0.0 – 10.255.255.255
  172.16.0.0/12     → 172.16.0.0 – 172.31.255.255
  192.168.0.0/16    → 192.168.0.0 – 192.168.255.255
  127.0.0.0/8       → loopback (localhost)
  169.254.0.0/16    → APIPA (link-local, no DHCP)

CIDR: 192.168.1.0/24 → 256 addresses, 254 usable
/24 = 255.255.255.0 | /16 = 255.255.0.0 | /8 = 255.0.0.0

Network Segmentation Architecture

graph LR
   Internet["🌐 Internet\n(Untrusted)"]
   FW1["🔥 Perimeter Firewall"]
   DMZ["🟡 DMZ\nWeb · Mail · DNS servers"]
   FW2["🔥 Internal Firewall"]
   LAN["🟢 Internal LAN\n(Trusted)"]
   MGMT["🔒 Management Network\n(Admin only)"]
   Internet --> FW1 --> DMZ --> FW2 --> LAN
   FW2 --> MGMT

DNS Record Types

RecordPurpose
ADomain → IPv4 address
AAAADomain → IPv6 address
CNAMEAlias → another domain
MXMail server for domain
NSAuthoritative name servers
TXTSPF, DKIM, DMARC, verification
PTRReverse DNS (IP → domain)
SOAStart of Authority (zone info)

Cryptography

collapsed:: true

Symmetric vs Asymmetric Encryption

graph LR
   subgraph Symmetric["🔑 Symmetric Encryption"]
       SK["Same Key\nEncrypt + Decrypt"]
       AES["AES-256 ✅\nChaCha20 ✅\nDES ❌ BROKEN\n3DES ❌ Deprecated"]
   end
   subgraph Asymmetric["🗝️ Asymmetric Encryption"]
       PK["Public Key → Encrypt\nPrivate Key → Decrypt"]
       RSA["RSA-2048/4096 ✅\nECC / ECDH ✅\nDSA (sign only) ✅"]
   end

Symmetric Encryption

AES (Advanced Encryption Standard)
  → 128/192/256-bit keys, block cipher, current gold standard
  → Modes: ECB (weak ❌) | CBC | CTR | GCM (authenticated ✅)
ChaCha20 → stream cipher, fast on mobile, used in TLS 1.3
DES      → 56-bit, BROKEN ❌ — do not use
3DES     → deprecated, slow ❌

Asymmetric Encryption

RSA   → 2048/4096-bit, based on prime factorization
ECC   → Elliptic Curve, smaller keys, same security as RSA
ECDSA → EC Digital Signature Algorithm
ECDH  → EC Diffie-Hellman key exchange (used in TLS 1.3)
DH    → Diffie-Hellman key agreement (not encryption)

Hashing Algorithms

AlgorithmOutputStatus
MD5128-bit❌ BROKEN — checksums only
SHA-1160-bit❌ BROKEN — deprecated
SHA-256256-bit✅ Secure — widely used
SHA-512512-bit✅ More secure, slower
SHA-3Variable✅ Keccak-based, different design
bcryptVariable✅ Password hashing with salt
Argon2Variable✅ Best for passwords (PHC winner)
HMAC-SHA256256-bit✅ Integrity + authenticity

TLS Handshake Flow

sequenceDiagram
   participant C as 🖥️ Client
   participant S as 🌐 Server
   C->>S: ClientHello (TLS version + cipher suites)
   S->>C: ServerHello (chosen cipher + Certificate)
   C->>C: Verify certificate (CA chain, expiry, domain)
   C->>S: Key Exchange (ECDH public key)
   S->>C: Key Exchange (ECDH public key)
   Note over C,S: Both derive same session keys
   C->>S: Finished (encrypted)
   S->>C: Finished (encrypted)
   Note over C,S: 🔒 Encrypted communication begins

Common Cryptographic Attacks

AttackDescriptionDefense
Brute ForceTry all possible keys/passwordsLong keys, rate limiting
DictionaryTry common passwords from wordlistStrong passwords, MFA
Rainbow TablePrecomputed hash lookupSalt passwords
Birthday AttackFind two inputs with same hashUse SHA-256+
MITMIntercept + modify communicationTLS, certificate pinning
Padding OracleExploit CBC padding to decryptUse AES-GCM
Timing AttackMeasure execution time to infer secretsConstant-time comparison
Replay AttackRe-send captured auth messagesNonces, timestamps

Threat Landscape & Attack Types

Malware Categories

TypeDescription
VirusAttaches to files, spreads when executed
WormSelf-replicates across networks without user action
TrojanDisguised as legitimate software, opens backdoor
RansomwareEncrypts files, demands payment for decryption key
SpywareSecretly monitors user activity, steals data
RootkitHides deep in OS (kernel level), hard to detect
BootkitInfects MBR/bootloader, loads before OS
KeyloggerRecords keystrokes to steal passwords
RATRemote Access Trojan — full remote control
FilelessLives in memory only, no file on disk, evades AV
BotnetNetwork of infected machines (C2 server controlled)
CryptominerUses victim’s CPU/GPU to mine cryptocurrency

Social Engineering Attacks

OWASP Top 10 (2021)

graph TD
   A01["A01 — Broken Access Control\nUser accesses unauthorized resources"]
   A02["A02 — Cryptographic Failures\nWeak/missing encryption"]
   A03["A03 — Injection\nSQL · Command · LDAP · XPath"]
   A04["A04 — Insecure Design\nMissing security in design phase"]
   A05["A05 — Security Misconfiguration\nDefault creds · Open storage · Verbose errors"]
   A06["A06 — Vulnerable Components\nOutdated libraries with known CVEs"]
   A07["A07 — Auth Failures\nWeak passwords · No MFA · Session issues"]
   A08["A08 — Integrity Failures\nInsecure deserialization · CI/CD attacks"]
   A09["A09 — Logging Failures\nNo monitoring · No alerting"]
   A10["A10 — SSRF\nServer fetches internal resources for attacker"]

Injection Attacks Deep Dive

Password Attack Types

AttackMethodDefense
Brute ForceTry every combinationLong passwords, rate limiting
DictionaryTry wordlist (rockyou.txt = 14M)Strong unique passwords
Credential StuffingUse leaked username:password pairsMFA, breach monitoring
Password SprayingOne common password → many accountsAccount lockout policies
Rainbow TablePrecomputed hash lookupSalt passwords
Pass-the-HashUse NTLM hash directlyCredential Guard, MFA
KerberoastingRequest + crack service tickets offlineStrong service account passwords
AS-REP RoastingAttack accounts without pre-authEnable Kerberos pre-auth

Security Architecture

Defense in Depth

graph TD
   L8["Layer 8 — Monitoring & Response\nSIEM · SOC · Incident Response · Threat Hunting"]
   L7["Layer 7 — Identity & Access\nMFA · Least Privilege · PAM · SSO"]
   L6["Layer 6 — Data Security\nEncryption at Rest/Transit · DLP · Backups"]
   L5["Layer 5 — Application Security\nWAF · Secure Coding · SAST/DAST · Auth"]
   L4["Layer 4 — Endpoint Security\nEDR · Host Firewall · Disk Encryption · Patching"]
   L3["Layer 3 — Network Segmentation\nVLANs · Micro-segmentation · Zero Trust"]
   L2["Layer 2 — Network Perimeter\nFirewall · IDS/IPS · DMZ · VPN · DDoS Protection"]
   L1["Layer 1 — Physical Security\nLocked Rooms · Badge Access · CCTV · Cable Locks"]
   L8 --> L7 --> L6 --> L5 --> L4 --> L3 --> L2 --> L1

Zero Trust Architecture

Pillars:
  Identity   → verify every user with strong auth (MFA, passwordless)
  Device     → verify device health before granting access
  Network    → micro-segment, encrypt all traffic
  Application → per-app access control, not network-level
  Data       → classify + protect data regardless of location

Key Technologies:
  IAM  → Identity & Access Management
  MFA  → Multi-Factor Authentication
  PAM  → Privileged Access Management
  ZTNA → Zero Trust Network Access (replaces VPN)
  CASB → Cloud Access Security Broker
  EDR  → Endpoint Detection & Response

Security Frameworks

graph LR
   NIST["NIST CSF\nIdentify → Protect\nDetect → Respond → Recover"]
   ISO["ISO/IEC 27001\nISMS Standard\nRisk · Controls · Audits"]
   CIS["CIS Controls v8\n18 Prioritized Controls\nIG1 → IG2 → IG3"]
   MITRE["MITRE ATT&CK\nAdversary TTPs\nRecon → Impact"]
   OWASP["OWASP\nTop 10 · ASVS\nTesting Guide · SAMM"]

MITRE ATT&CK Tactics (Kill Chain)

TacticDescription
ReconnaissanceGather info about target
Resource DevelopmentAcquire infrastructure, tools
Initial AccessGet into the target environment
ExecutionRun malicious code
PersistenceMaintain foothold after reboot
Privilege EscalationGain higher permissions
Defense EvasionAvoid detection
Credential AccessSteal credentials
DiscoveryExplore the environment
Lateral MovementMove to other systems
CollectionGather data of interest
Command & ControlCommunicate with compromised systems
ExfiltrationSteal data out of the environment
ImpactDisrupt, destroy, or ransom

SOC (Security Operations Center)

TierRoleResponsibilities
Tier 1Alert TriageMonitor SIEM, classify alerts, escalate
Tier 2Incident HandlerInvestigate escalated alerts, contain threats
Tier 3Threat HunterProactively hunt for hidden threats
Tier 4SOC ManagerStrategy, reporting, team management

Ethical Hacking & Penetration Testing

What is Ethical Hacking?

Penetration Testing Phases

graph LR
   P1["1️⃣ Planning & Scoping\nDefine scope · Get written auth\nRules of Engagement"]
   P2["2️⃣ Reconnaissance\nPassive: OSINT · DNS · WHOIS\nActive: Port scan · Enum"]
   P3["3️⃣ Scanning & Enumeration\nOpen ports · Services · Versions\nUsers · Shares · Subdomains"]
   P4["4️⃣ Vulnerability Analysis\nMap CVEs · Nessus/OpenVAS\nManual analysis"]
   P5["5️⃣ Exploitation\nAuthorized only\nDocument every action"]
   P6["6️⃣ Post-Exploitation\nPrivilege escalation\nLateral movement · Impact"]
   P7["7️⃣ Reporting\nExecutive summary\nTechnical findings · Remediation"]
   P1 --> P2 --> P3 --> P4 --> P5 --> P6 --> P7

Test Types

TypeKnowledgeSimulates
Black BoxNoneExternal attacker
White BoxFull (source, arch, creds)Internal audit
Grey BoxPartialCompromised account / insider
Red TeamNoneFull adversary simulation
Purple TeamSharedRed + Blue collaboration

OSINT (Open Source Intelligence)

Sources:
  Google Dorks       → site:example.com filetype:pdf
                       intitle:"index of" "password"
  WHOIS              → domain registration info
  DNS Records        → A, MX, NS, TXT reveal infrastructure
  Shodan             → search engine for internet-connected devices
  Censys             → certificate + banner data
  crt.sh             → find subdomains via SSL certificate logs
  GitHub             → accidentally committed secrets, API keys
  LinkedIn           → employee names, job titles, tech stack
  Wayback Machine    → archived website versions

OSINT Tools:
  theHarvester  → emails, subdomains, IPs from public sources
  Maltego       → visual relationship mapping
  Recon-ng      → modular web reconnaissance framework
  SpiderFoot    → automated OSINT collection
  Amass         → subdomain enumeration

Security Tools Overview

Network Analysis

tcpdump — CLI packet capture
tcpdump -i eth0 -w capture.pcap          # capture to file
tcpdump -r capture.pcap port 80          # read + filter
tcpdump -i eth0 'tcp and host 10.0.0.1'  # filter by host

Port & Service Scanning

Nmap common usage
nmap -sV -O target          # service version + OS detection
nmap -sS -T4 target         # SYN scan, aggressive timing
nmap -p- target             # all 65535 ports
nmap -sC -sV target         # default scripts + version
nmap -A target              # aggressive: OS + version + scripts + traceroute
nmap --script=safe target   # run safe NSE scripts only
nmap -oA output target      # save all output formats

Vulnerability Scanners

ToolTypeNotes
NessusCommercialIndustry standard, CVE + compliance
OpenVAS / GreenboneOpen SourceFree Nessus alternative
NiktoWeb ServerChecks misconfigs, outdated software
NucleiTemplate-basedFast, community CVE templates

Web Application Testing

ModulePurpose
ProxyIntercept and modify HTTP/HTTPS requests
RepeaterManually resend and modify requests
IntruderAutomated fuzzing and parameter testing
ScannerAutomated vulnerability detection (Pro)
DecoderEncode/decode Base64, URL, HTML, hex
ComparerDiff two requests or responses

Password Analysis

Hashcat — GPU password hash analysis
# -m hash type: 0=MD5 | 100=SHA1 | 1000=NTLM | 3200=bcrypt
hashcat -m 0 hash.txt wordlist.txt           # dictionary attack
hashcat -m 0 -a 3 hash.txt ?a?a?a?a?a?a      # brute force mask
hashcat -m 1000 hash.txt wordlist.txt -r best64.rule  # with rules
hashcat -m 0 hash.txt --show                 # show cracked

Forensics & Reverse Engineering Tools

ToolPurpose
Autopsy / Sleuth KitDisk forensics, deleted file recovery
VolatilityMemory forensics — analyze RAM dumps
GhidraNSA’s open-source reverse engineering framework
IDA ProIndustry-standard disassembler (commercial)
BinwalkFirmware analysis and extraction
WiresharkNetwork packet analysis
FTK ImagerDisk imaging and forensic acquisition

Identity & Access Management (IAM)

Authentication Methods

FactorTypeExamples
Something you KNOWKnowledgePassword, PIN, security question
Something you HAVEPossessionOTP token, smart card, YubiKey
Something you AREInherenceFingerprint, face, iris, voice
Somewhere you ARELocationGeolocation, IP-based access

Authorization Models

ModelDescriptionUse Case
DACOwner controls accessLinux file permissions, Windows ACLs
MACSystem enforces labels (Top Secret, etc.)Military, government (SELinux)
RBACAccess based on job roleEnterprise apps (admin, editor, viewer)
ABACAccess based on attributes (dept, time, device)Cloud IAM (AWS policies)
ReBACAccess based on relationshipsGoogle Zanzibar, modern SaaS

SSO & Federation Protocols

ProtocolTypeUse Case
SAML 2.0XML-basedEnterprise SSO (Okta, ADFS)
OAuth 2.0Authorization framework”Login with Google/GitHub”
OpenID ConnectIdentity layer on OAuth 2.0Returns JWT with user info
KerberosTicket-basedWindows Active Directory

Active Directory Security

graph TD
   DC["🏛️ Domain Controller\nAuthentication · AD Database\nKerberos KDC"]
   T0["Tier 0 — Domain Controllers\nHighest privilege — most protected"]
   T1["Tier 1 — Servers\nApp servers, databases"]
   T2["Tier 2 — Workstations\nUser endpoints"]
   DC --> T0 --> T1 --> T2

Cloud Security

Shared Responsibility Model

graph LR
   subgraph Provider["☁️ Cloud Provider Responsible"]
       P1["Physical data center security"]
       P2["Hypervisor + host OS"]
       P3["Network infrastructure"]
       P4["Managed service patching"]
   end
   subgraph Customer["👤 Customer Responsible"]
       C1["Data classification + encryption"]
       C2["IAM — identity and access"]
       C3["OS + app patching (IaaS)"]
       C4["Network config (security groups)"]
       C5["Monitoring and logging"]
   end

Common Cloud Misconfigurations

Cloud Security Services

PlatformServicePurpose
AWSGuardDutyML-based threat detection
AWSSecurity HubCentralized security findings
AWSInspectorVulnerability assessment
AWSMacieSensitive data discovery in S3
AWSCloudTrailAPI call logging
AzureDefender for CloudCSPM + workload protection
AzureSentinelCloud-native SIEM
GCPSecurity Command CenterThreat detection + compliance
MultiWiz / Prisma CloudCSPM across clouds

Incident Response

IR Lifecycle (NIST SP 800-61)

graph LR
   P["1️⃣ Preparation\nIR plan · Playbooks\nTools · Training · SIEM"]
   D["2️⃣ Detection & Analysis\nIdentify IOCs · Triage\nScope + Severity · Preserve evidence"]
   C["3️⃣ Containment\nIsolate systems\nNetwork quarantine"]
   E["4️⃣ Eradication\nRemove malware\nPatch · Reset credentials"]
   R["5️⃣ Recovery\nRestore from backups\nMonitor closely"]
   L["6️⃣ Lessons Learned\nRoot cause analysis\nUpdate IR plan + detections"]
   P --> D --> C --> E --> R --> L --> P

Common IOCs (Indicators of Compromise)

Critical Windows Event IDs

Event IDDescriptionSignificance
4624Successful logonBaseline
4625Failed logonBrute force indicator
4648Logon with explicit credentialsLateral movement
4720User account createdPersistence
4732Member added to security groupPrivilege escalation
7045New service installedMalware persistence
1102Audit log clearedCritical — attacker covering tracks
4698Scheduled task createdPersistence
4776NTLM auth attemptPass-the-Hash indicator

Digital Forensics — Order of Volatility

Secure Development (DevSecOps)

Secure SDLC — Shift Left

graph LR
   R["Requirements\nSecurity requirements\nThreat modeling\nCompliance needs"]
   D["Design\nSTRIDE threat model\nSecurity architecture\nData flow diagrams"]
   DEV["Development\nSecure coding standards\nSAST · SCA\nNo hardcoded secrets"]
   T["Testing\nDAST · IAST\nPenetration testing\nDependency scanning"]
   DEP["Deployment\nSecrets management\nContainer image scanning\nIaC security scan"]
   OPS["Operations\nRuntime protection\nSIEM monitoring\nPatch management"]
   R --> D --> DEV --> T --> DEP --> OPS

STRIDE Threat Modeling

LetterThreatExampleDefense
SSpoofingImpersonating another userStrong authentication
TTamperingModifying data in transitIntegrity checks, TLS
RRepudiationDenying an action occurredAudit logging, signatures
IInfo DisclosureExposing sensitive dataEncryption, access control
DDenial of ServiceMaking system unavailableRate limiting, redundancy
EElevation of PrivilegeGaining higher accessLeast privilege, RBAC

Secrets Management

Scan for accidentally committed secrets
# truffleHog — scan git history for secrets
trufflehog git https://github.com/org/repo
 
# git-secrets — prevent committing secrets
git secrets --install
git secrets --register-aws
SolutionUse Case
.env files + .gitignoreLocal development
Environment variablesBasic deployment
HashiCorp VaultEnterprise secrets management
AWS Secrets ManagerAWS workloads
Azure Key VaultAzure workloads
GCP Secret ManagerGCP workloads

Container Security Best Practices

Wireless & Physical Security

Wi-Fi Security Protocols

ProtocolYearEncryptionStatus
WEP1997RC4 (weak IV)❌ BROKEN — never use
WPA2003TKIP❌ Deprecated
WPA2-Personal2004AES-CCMP✅ Current standard
WPA2-Enterprise2004AES + 802.1X/RADIUS✅ Best for organizations
WPA32018SAE + AES✅ Most secure — use if supported

Physical Security Controls

CategoryControls
PreventiveLocked server rooms · Badge access · Biometrics · Cable locks · Clean desk policy
DetectiveCCTV cameras · Motion sensors · Access logs · Security guards
Physical AttacksTailgating · Shoulder surfing · Dumpster diving · USB drop · Evil maid

Certifications & Career Paths

Certification Roadmap

graph TD
   B["🟢 Beginner\nCompTIA Network+\nCompTIA Security+\nISC2 CC (free)\nGoogle Cybersecurity Cert"]
   I["🟡 Intermediate\nCEH · CompTIA CySA+\nCompTIA PenTest+\neJPT (practical)"]
   A["🔴 Advanced\nOSCP (hands-on pentest)\nCISSP (management)\nGPEN / GWAPT\nCRTO (Red Team)"]
   C["☁️ Cloud Security\nAWS Security Specialty\nAZ-500 (Azure)\nCCSP"]
   B --> I --> A
   I --> C

Career Paths

PathRoles
🔵 Blue Team (Defense)SOC Analyst · Incident Responder · Threat Hunter · Security Engineer · Cloud Security
🔴 Red Team (Offense)Penetration Tester · Red Team Operator · Bug Bounty Hunter · Malware Analyst
🟣 Purple TeamSecurity Researcher · Detection Engineer · Threat Intelligence Analyst
⚙️ ManagementCISO · Security Architect · GRC Analyst · Security Manager

More Learn

Github & Webs

Master Playlists YouTube