CRLJ
CRLJ copied to clipboard
The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-depth materials and guides for various cybersecurity domains.
سبحان الله وبحمده سبحان الله العظيم
اللهم صل على محمد وعلى آل محمد
Cybersecurity Resources and Learning Journey
A Swiss Army Knife for Cybersecurity Professionals/Students/Pentesters/Hackers.
Who is Eligible to Utilize This Repository?
This repository is for anyone interested in cybersecurity, including professionals, students, and hackers. It is a comprehensive resource for anyone actively working or learning in the cybersecurity domain.
IStandWithPalestine
![](https://external-content.duckduckgo.com/iu/?u=http%3A%2F%2Fgetwallpapers.com%2Fwallpaper%2Ffull%2Ff%2F4%2Fe%2F1399635-palestine-wallpaper-3840x2160-windows-7.jpg&f=1&nofb=1ipt=9bbbeda7144f1745c72fe7a389658d0b0e4091405154f5845ebb87a13a4a8706&ipo=images)
Cybersecurity beginners should learn IT fundamentals, Network, Programming, Scripting, and Linux. Also, systematically go through the table of contents without skipping any topics.
Table of Contents
- What You Need to Know
- Cybersecurity
- Cybersecurity Learning Roadmap
- Books
- Blue Team & SOC Analyst
- Cybersecurity Fundamentals
- Cybersecurity Standards
- Advanced Persistent Threat
- Cyber Kill Chain
- MITRE ATT&CK
- Governance, Risk Management, and Compliance
- Logging Services and Log File Formats
- Security Information and Event Management
- Network Security Monitoring & Continuous Security Monitoring
- Security Operations Center
- Threat Hunting
- Incident Response
- Digital Forensics and Incident Response
- Indicators of Compromise & Indicators of Attack & Indicators of Behavior
- Cyber Threat Intelligence
- Blue Team
- Malware Analysis
- Red Team & Penetration Testing
- Purple Team
- MISC
- Islam and Cybersecurity