Cybersecurity Roadmap By: @MrM8BRH

Cybersecurity Roadmap

Get Started. It's Free
or sign up with your email address
Cybersecurity Roadmap By: @MrM8BRH by Mind Map: Cybersecurity Roadmap By: @MrM8BRH

1. 6. Cybersecurity Fundamentals

1.1. Foundations

1.1.1. Foundations

1.1.1.1. • Asset • Vulnerability • Threat • Risk • Countermeasure • Likelihood • CIA Triad • AAA • APT • IoC & IoA

1.1.2. Classification Criteria

1.1.2.1. • Value • Age • Replacement Cost • Useful Life Time

1.1.3. Classifying Vulnerabilities

1.1.3.1. • Policy Flaws • Design Errors • Protocol Weaknesses • Misconfiguration • Software Vulnerability • Human Factor • Malicious Software • Hardware Vulnerability • Physical Access to Network Resource • Natural Factors

1.1.4. Classification Roles

1.1.4.1. • Owner • Custodian • User

1.1.5. Classifying Countermeasures

1.1.5.1. • Administrative • Physical • Logical

1.1.6. Supply Chain Risk Management

1.1.6.1. • Prevention • Preparedness • Response • Recovery

1.1.7. Risk Management Decisions

1.1.7.1. • Accept • Mitigate • Transfer • Avoid

1.1.8. Threat Modeling Methods

1.1.8.1. • CVSS • MITRE ATT&CK • Cyber Kill Chain • STRIDE • PASTA • DREAD • TRIKE • VAST • Attack Trees • OCTAVE • QTMM • LINDDUN • NIST SP 800-30

1.2. Cybersecurity Teams

1.2.1. • Blue Team • Red Team • Purple Team

1.3. Cybersecurity Domains

1.3.1. • Network Security • System Security • Application Security • Security Management • Physical Security • User Education

1.4. Cybersecurity Topics

1.4.1. Penetration Testing

1.4.2. Network Security

1.4.3. Email Security

1.4.4. Web Security

1.4.5. Bug Bounty

1.4.6. Cloud Security

1.4.7. API Security

1.4.8. Mobile Security

1.4.9. IoT Security

1.4.10. ICS/SCADA Security

1.4.11. RFID Security

1.4.12. Hardware Security

1.4.13. Cryptography

1.4.14. Blockchain Security

1.4.15. Development, Security, and Operations (DevSecOps)

1.4.16. Social Engineering (SE)

1.4.17. Threat Hunting (TH)

1.4.18. Reverse Engineering (RE)

1.4.19. Malware Analysis (MA)

1.4.20. Exploit Development (ED)

1.4.21. Digital Forensics (DF)

1.4.22. Incident Response (IR)

1.4.23. Secure Code Review

1.4.24. Cyber Threat Intelligence (CTI)

1.4.25. Security Operation Center (SOC)

1.4.26. Governance, Risk Management, and Compliance (GRC)

1.4.27. Open Source Intelligence (OSINT)

1.4.28. Deep/Dark Web Investigation

2. 4. Operating Systems

2.1. Book: Operating System Concepts / Ninth Edition

2.2. Linux Server & Bash Script

2.2.1. Course: (Linux Essentials - Cisco Networking Academy)

2.2.2. Book: (UNIX and Linux System Administration Handbook / 5th Edition)

2.3. Windows Server & Batch Script

2.3.1. Course: Microsoft Certified Solutions Associate (MCSA)

3. 5. Cryptography

3.1. Topics: - Symmetric Encryption - Asymmetric Encryption - Hashing - Obfuscation - Encoding - Steganography - Digital Signatures - Digital Certificates

3.2. Book: Cryptography and Network Security: Principles and Practice / Edition 7

4. 1. IT Fundamentals

4.1. Topics: - IT Concepts and Terminology - Computer Hardware and Operating Systems - Applications and Software - Programming Languages and Database Fundamentals - Networking and Storage - Cloud Computing - Security

5. 2. Networking

5.1. Courses:

5.1.1. Cisco Certified Network Associate (CCNA)

5.1.2. CompTIA Network+

6. 3. Programming

6.1. C++ || JAVA

6.1.1. Basics

6.1.2. Object-oriented programming (OOP)

6.1.3. Data Structure (Optional)

6.2. Basics of

6.2.1. Python

6.2.2. PHP & API

6.2.3. Oracle || MySQL

6.2.4. HTML, CSS, JavaScript

6.2.5. Intel x86 Assembly (Optional)