Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ✅ Security Analyst Topics
- ☑️ CIA Triad
- ☑️ CISSP Security Fundamentals
- ☑️ NIST Security Frameworks
- ☑️ OWASP Security Principle
- ☑️ Security Audits
- ☑️ Incidents Response
- ☑️ Playbook
- ☑️ Security information and event management (SIEM)
- ☑️ Security orchestration, automation, and response (SOAR)
- ☑️ Network LAN WAN
- ☑️ Hub Switch Router Modem, Virtualization Tools, Firewall
- ☑️ SaaS PaaS IaaS
- ☑️ Packets
- ☑️ TCP UDP
- ☑️ TCP/IP Model: Network Access layer, Internet Layer, Transport Layer, Application Layer
- ☑️ OSI Model
- ☑️ IPV4 IPV6
- ☑️ VPN
- ☑️
- ☑️
- ☑️
- ☑️
- ☑️
- ☑️
- ✅ Web Application Functions
- ☑️ HTML Coding
- ✔️ Introduction
- ✔️ Tags
- ✔️ Comments
- ✔️ Meta Tags
- ✔️ Titles
- ✔️ Images
- ✔️ Hyperlink
- ✔️ Tables
- ✔️ Iframe
- ✔️ Object
- ✔️ Audio
- ✔️ Video
- ✔️ Many more from w3c
- ☑️ CSS Coding
- ✔️ Introduction
- ✔️ Syntax
- ✔️ Selectors
- ✔️ Comments
- ✔️ Colors
- ✔️ Margins
- ✔️ Fonts
- ✔️ Many more from w3c
- ☑️ JavaScript Coding
- ✔️ Introduction
- ✔️ Statements
- ✔️ Syntax
- ✔️ Comments
- ✔️ Variables
- ✔️ Loops
- ✔️ Functions
- ✔️ Many more form w3c
- ☑️ Inspect Element
- ✔️ Debugger
- ✔️ Console
- ✔️ Network
- ✔️ Storage
- ✔️ Cookies
- ✔️ And others
- ☑️ Special Tips
- ✅ Network+
- ☑️ TCP/IP
- ☑️ OSI Model
- ☑️ TCP UDP Common ports
- ☑️ Mac Address
- ☑️ Switch
- ☑️ Router
- ☑️ Bridge
- ☑️ and everything from CompTIA Network+
- ✅ Linux+ (https://www.comptia.jp/pdf/comptia-linux-xk0-004-exam-objectives.pdf)
- ☑️ Directory Structure
- ☑️ Bash Shell Commands
- ✔️ Piping
- ✔️ Grep
- ✔️ cut
- ✔️ more
- ✔️ less
- ✔️ curl
- ✔️ Others
- ☑️ Command Line Common Tools
- ✔️ Nano
- ✔️ VIM
- ✔️ Git
- ✔️ Others
- ☑️ More from Tutorialspoint
- ✅ Understanding Tools (https://www.professormesser.com/security-plus/sy0-501/sy0-501-training-course/)
- ☑️ Common Tools in Kali Linux
- ☑️ NetCat
- ☑️ NMap
- ☑️ SQLMap
- ☑️ NGROK
- ☑️ Metasploit
- ☑️ BurpSuite
- ✔️ Installation
- ✔️ Setup
- ✔️ Proxy
- ✔️ Repeater
- ✔️ Intruder
- ✔️ Other Tabs one by one
- ✅ Bug Bounty Common Bugs
- ☑️ Introduction (bugbountyguide.com)
- ☑️ Relfected XSS
- ☑️ Stored XSS
- ☑️ CSRF
- ☑️ SQLi
- ☑️ More from Portswigger (https://portswigger.net/web-security)
- ✅ Automation
- ☑️ Python
- ✔️ Introduction
- ✔️ Syntax
- ✔️ Comments
- ✔️ Variables
- ✔️ Strings
- ✔️ Lists
- ✔️ Tupels
- ✔️ Modules
- ✔️ More from w3c
- ☑️ Bash Scripting
- ✔️ https://linuxconfig.org/bash-scripting-tutorial-for-beginners
- ✅ Packet Capture
- ☑️ Wireshark
- ☑️ TCP DUMP
- ✅ WiFi Hacking
- ☑️ Introduction
- ☑️ Tools
- ✔️ AirCrack-NG
- ✔️ WifiPhisher
- ✔️ Others
- ☑️ Encryption Types
- ✔️ WEP
- ✔️ WPA
- ✔️ WPA2
- ☑️ Special Tips
- ✅ Common Topics
- ☑️ Passive Information Gathering
- ☑️ Active Information Gathering
- ✅ Advance Topics
- ☑️ Buffer Overflow
- ☑️ Privilege Escalation
- ✔️ Common CVE
- ✔️ Use of Metasploit
- ✔️ Kernel Exploit
- ✔️ linenum
- ✔️ searchsploit
- ☑️ Working with Exploits
- ☑️ Password Attacks
- ✔️ John The Ripper
- ✔️ Hydra
- ✔️ Hashcat
- ☑️ Anti Virus Evasion
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement