forked from yatulearn/yatulearn
-
Notifications
You must be signed in to change notification settings - Fork 0
/
yatu_learn_cs.html
345 lines (340 loc) · 19.4 KB
/
yatu_learn_cs.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<link rel="stylesheet" href="yatu_learn_cn.css">
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.5.1/css/all.min.css"
integrity="sha512-DTOQO9RWCH3ppGqcWaEA1BIZOC6xxalwEsw9c2QQeAIftl+Vegovlnee1c9QX4TctnWMn13TZye+giMm8e2LwA=="
crossorigin="anonymous" referrerpolicy="no-referrer" />
<title>Topics</title>
<link rel="icon" href="./assets/images/YATU Learn - YL icon Black (2).png" type="image/x-icon">
</head>
<body>
<nav class="main-nav">
<div class="main_logo">
<div class="logo">
<a href="index.html"><img src="YATU Learn - YL icon Black (2).png" alt="" height="40px"
width="50px"></a>
</div>
</div>
<input type="checkbox" id="check">
<label for="check" class="checkbtn"><i class="fa-solid fa-bars"></i></label>
<ul>
<a href="index.html" class="Courses btn-home">Home<i class="gfg-icon gfg-icon-black-up-carrot "
style="float: right; margin-right: -12px; line-height: 1.5;"></i></a>
<div class="dropdown1qp">
<a href="yatu_learn_qp.html" class="qp"> <span>Question Papers<i
class="fa-solid fa-angle-down"></i></span></a>
<div class="dropdown-content1qp">
<h2>CSE</h2>
<div class="links">
<a href="yatu_learn_qp.html#border1">1st Sem</a>
<a href="yatu_learn_qp.html#border2">2nd Sem</a>
<a href="yatu_learn_qp.html#border3">3rd Sem</a>
<a href="yatu_learn_qp.html#border4">4th Sem</a>
<a href="yatu_learn_qp.html#border5">5th Sem</a>
</div>
<h2>IT</h2>
<div class="links">
<a href="yatu_learn_qp.html#border1">1st Sem</a>
<a href="yatu_learn_qp.html#border2">2nd Sem</a>
<a href="yatu_learn_qp.html#border3">3rd Sem</a>
<a href="yatu_learn_qp.html#border4">4th Sem</a>
<a href="yatu_learn_qp.html#border5">5th Sem</a>
</div>
<h2>ECE</h2>
<div class="links">
<a href="yatu_learn_qp.html#border1">1st Sem</a>
<a href="yatu_learn_qp.html#border2">2nd Sem</a>
<a href="yatu_learn_qp.html#border3">3rd Sem</a>
<a href="yatu_learn_qp.html#border4">4th Sem</a>
<a href="yatu_learn_qp.html#border5">5th Sem</a>
</div>
<h2>MECH</h2>
<div class="links">
<a href="yatu_learn_qp.html#border1">1st Sem</a>
<a href="yatu_learn_qp.html#border2">2nd Sem</a>
<a href="yatu_learn_qp.html#border3">3rd Sem</a>
<a href="yatu_learn_qp.html#border4">4th Sem</a>
<a href="yatu_learn_qp.html#border5">5th Sem</a>
</div>
</div>
</div>
<a href="yatu_learn_notes.html" class="btn-notes">Notes</a>
<a href="yatu_learn_about.html" class="About btn-about">About</a>
</ul>
<button class="btn"><a href="https://forms.gle/v4cY8FfyyhuJnWeSA">Doubts</a></button>
</nav>
<h1>Cyber Security</h1>
<div class="content-box">
<h2>What is Cyber Security?</h2><br>
<p class="p">Cyber Security is the practice of protecting systems, networks, and data from digital attacks, unauthorized
access, or damage. It encompasses a range of processes, technologies, and practices designed to secure
computers, networks, and data from malicious attacks, damage, or unauthorized access. In today’s digital world,
where almost everything is interconnected, cyber security is vital for protecting sensitive information,
maintaining the integrity of systems, and ensuring the availability of critical services.
Cyber security involves multiple layers of defense, spread across the computers, networks, programs, or data
that one intends to keep safe. There are various types of cyber threats, including hacking, malware, phishing,
ransomware, and social engineering, each requiring specific countermeasures.</p><br>
<h2>Types of Cyber Security Engineers and Their Roadmaps</h2><br>
<p class="p">Cyber security engineers specialize in different areas depending on their roles and the needs of their
organizations. Below are some of the main types of cyber security engineers, their roles, and the roadmaps to
becoming one: <br><br>
<b>1. Network Security Engineer</b>: <br>
<br>* Role: Focuses on protecting an organization’s network infrastructure from unauthorized access, misuse, or
attack.
This includes configuring firewalls, monitoring network traffic, and implementing VPNs and IDS/IPS systems.
<br>* Skills Required:
<br>* Networking basics (TCP/IP, DNS, HTTP/S)
<br>* Firewalls, VPNs, IDS/IPS systems
<br>* Network protocols and architecture
<br>* Vulnerability assessment and threat management
<br>* Roadmap:
<br>* Step 1: Learn networking fundamentals, including TCP/IP, subnetting, and routing protocols.
<br>* Step 2: Gain knowledge of basic security principles and the OSI model.
<br>* Step 3: Learn about firewalls, VPNs, and IDS/IPS technologies.
<br>* Step 4: Get hands-on experience with network security tools (e.g., Wireshark, Nmap).
<br>* Step 5: Earn certifications like CompTIA Network+, CompTIA Security+, and Cisco CCNA Security.
<br>* Step 6: Gain experience in network architecture and advanced security practices like penetration testing.
</p>
<p class="p"><b>2. Application Security Engineer</b>: <br>
<br>* Role: Ensures the security of software applications by identifying and mitigating vulnerabilities in code.
They work closely with development teams to integrate security practices into the software development lifecycle
(SDLC).
<br>* Skills Required:
<br>* Secure coding practices (e.g., OWASP Top 10)
<br>* Application security testing (SAST, DAST)
<br>* Software development and scripting languages (e.g., Python, Java)
<br>* Encryption and authentication methods
<br>* Roadmap:
<br>* Step 1: Learn one or more programming languages such as Python, Java, or C#.
<br>* Step 2: Study secure coding practices, including how to avoid common vulnerabilities like SQL injection
and
XSS.
<br>* Step 3: Learn about application security testing tools like Burp Suite, Veracode, and Checkmarx.
<br>* Step 4: Gain knowledge of the software development lifecycle (SDLC) and DevSecOps.
<br>* Step 5: Obtain certifications like Certified Secure Software Lifecycle Professional (CSSLP) or Certified
Ethical Hacker (CEH).
<br>* Step 6: Gain hands-on experience by performing code reviews, penetration testing, and vulnerability
assessments.
</p>
<p class="p"><b>3. Cloud Security Engineer</b>: <br>
<br>* Role: Focuses on securing cloud environments, including designing secure cloud architectures, managing
cloud
security configurations, and ensuring compliance with cloud security standards.
<br>* Skills Required:
<br>* Cloud platforms (AWS, Azure, GCP)
<br>* Identity and Access Management (IAM)
<br>* Cloud security best practices
<br>* Compliance and governance in cloud environments
<br>* Roadmap:
<br>* Step 1: Learn the basics of cloud computing and cloud service providers like AWS, Azure, or Google Cloud.
<br>* Step 2: Study cloud security fundamentals, including encryption, IAM, and secure cloud architecture.
<br>* Step 3: Gain hands-on experience with cloud security tools and services like AWS Shield, Azure Security
Center, or GCP Security.
<br>* Step 4: Obtain certifications like AWS Certified Security – Specialty or Certified Cloud Security
Professional
(CCSP).
<br>* Step 5: Explore advanced topics like container security, serverless security, and multi-cloud security
strategies.
</p>
<p class="p"><b>4. Incident Response Engineer</b>: <br>
<br>* Role: Specializes in responding to and managing cyber security incidents. This involves identifying the
scope
of an attack, containing it, eradicating the threat, and recovering systems. They also analyze incidents to
prevent future occurrences.
<br>* Skills Required:
<br>* Threat detection and analysis
<br>* Incident handling and forensics
<br>* Malware analysis
<br>* Communication and reporting
<br>* Roadmap:
<br>* Step 1: Learn the basics of incident response, including the incident response lifecycle.
<br>* Step 2: Study digital forensics, focusing on the collection and analysis of digital evidence.
<br>* Step 3: Gain expertise in malware analysis and reverse engineering.
<br>* Step 4: Obtain certifications like Certified Incident Handler (GCIH) or Certified Computer Forensics
Examiner
(CCFE).
<br>* Step 5: Practice by participating in incident response simulations and real-world scenarios.
</p>
<p class="p"><b>5. Penetration Tester (Ethical Hacker)</b>: <br>
<br>* Role: Performs simulated cyber attacks to find vulnerabilities in systems, networks, and applications. The
goal is to identify weaknesses before malicious actors can exploit them.
<br>* Skills Required:
<br>* Penetration testing methodologies (e.g., OWASP, PTES)
<br>* Exploitation techniques and tools (e.g., Metasploit, Burp Suite)
<br>* Social engineering
<br>* Vulnerability assessment and reporting
<br>* Roadmap:
<br>* Step 1: Learn the basics of ethical hacking, including the phases of penetration testing.
<br>* Step 2: Gain hands-on experience with penetration testing tools like Metasploit, Nmap, and Burp Suite.
<br>* Step 3: Study web application and network penetration testing techniques.
<br>* Step 4: Obtain certifications like Offensive Security Certified Professional (OSCP) or Certified Ethical
Hacker (CEH).
<br>* Step 5: Participate in bug bounty programs and CTF (Capture the Flag) competitions to sharpen your skills.
</p><br>
<h2>Why Cyber Security?</h2><br>
<p class="p"><b>1. High Demand</b>: The frequency and sophistication of cyber attacks are increasing, leading to a growing
demand for skilled cyber security professionals across all industries</p>
<p class="p"><b>2. Job Security</b>: Cyber security is a critical field, and the need for experts is expected to grow
continuously, providing long-term job security.</p>
<p class="p"><b>3. Impactful Work</b>: Cyber security professionals protect vital systems and sensitive information, playing a
crucial role in safeguarding businesses, governments, and individuals.</p>
<p class="p"><b>4. Continuous Learning</b>: The field of cyber security is dynamic, with new threats and technologies emerging
regularly. This ensures that the work remains challenging and offers opportunities for continuous learning and
professional growth.</p>
<p class="p"><b>5. Lucrative Salaries</b>: Due to the high demand for skilled professionals, cyber security roles often come
with competitive salaries and benefits.</p><br>
<main><img src="Cyber Security.png" alt="dsa-roadmap" height="auto" width="50%">
</main>
<br>
<h2>How to Learn Cyber Security</h2>
<h6>...</h6>
<h6>...</h6>
<p class="p"><b>1. Choose Your Path:</b>
<br>* Decide on a specialization (e.g., network security, application security, cloud security, incident
response,
or penetration testing) or start with a generalist approach to cyber security.
</p>
<p class="p"><b>2. Start with the Basics:</b>
<br>* Networking: Understand how data flows across networks, including knowledge of TCP/IP, DNS, HTTP/S, and
network
devices.
<br>* Operating Systems: Gain a strong understanding of Linux and Windows operating systems, as they are
commonly
used in cyber security.
<br>* Security Fundamentals: Study basic concepts like encryption, firewalls, access control, and the CIA triad
(Confidentiality, Integrity, Availability).
</p>
<p class="p"><b>3. Gain Hands-On Experience:</b>
<br>* Set Up a Home Lab: Create a virtual lab environment using tools like VirtualBox or VMware to practice
different security tasks.
<br>* Capture the Flag (CTF) Challenges: Participate in CTF challenges on platforms like Hack The Box,
TryHackMe, or
CTFtime to build your skills in a practical, competitive setting.
<br>* Online Labs: Use platforms like Cybrary, RangeForce, or PentesterLab for guided hands-on learning.
</p>
<p class="p"><b>4. Learn Tools and Techniques:</b>
<br>* Security Tools: Get familiar with tools like Wireshark, Nmap, Metasploit, Nessus, and Burp Suite.
<br>* Scripting: Learn scripting languages like Python or Bash, which are valuable for automating tasks and
developing custom tools.
</p>
<p class="p"><b>5. Obtain Certifications:</b>
<br>* Start with foundational certifications like CompTIA Security+ to build a strong knowledge base.
<br>* Pursue advanced certifications based on your chosen specialization, such as CISSP, CEH, OSCP, or CCSP.
</p>
<p class="p"><b>6. Stay Updated:</b>
<br>* Follow industry news, blogs, and podcasts to stay informed about the latest trends, threats, and
technologies
in cyber security
</p> <br>
<h2>What to Learn in Cyber Security</h2><br>
<p class="p"><b>1. Networking and Protocols</b>:
<br>* Learn about IP addressing, routing, subnetting, VLANs, and network protocols like TCP/IP, DNS, and HTTP/S.
<br>* Understand how to secure network devices, design secure network architectures, and monitor network traffic
for
anomalies.
</p>
<p class="p"><b>2. Operating Systems and Virtualization</b>:
<br>* Gain proficiency in both Linux and Windows environments.
<br>* Learn how to secure operating systems, manage permissions, and configure firewalls.
</p>
<p class="p"><b>3. Cryptography</b>:
<br>* Study the principles of cryptography, including symmetric and asymmetric encryption, hashing, digital
signatures, and certificates.
<br>* Understand how to implement encryption and key management in real-world scenarios.
</p>
<p class="p"><b>4. Security Tools and Technologies</b>:
<br>* Familiarize yourself with essential security tools for vulnerability assessment, penetration testing,
network
monitoring, and incident response.
<br>* Learn how to use tools like Wireshark, Nmap, Metasploit, and SIEM (Security Information and Event
Management)
systems.
</p>
<p class="p"><b>5. Threat Intelligence and Incident Response</b>:
<br>* Study threat intelligence, including how to gather, analyze, and apply it to defend against cyber threats.
<br>* Learn about the incident response lifecycle, including how to prepare for, detect, and respond to security
incidents.
</p>
<p class="p"><b>6. Compliance and Governance</b>:
<br>* Understand the importance of compliance with industry regulations and standards (e.g., GDPR, HIPAA,
PCI-DSS).
<br>* Learn about risk management, security policies, and governance frameworks.
</p>
<p class="p"><b>7. Penetration Testing and Vulnerability Assessment</b>:
<br>* Study methodologies for identifying, exploiting, and remediating vulnerabilities in systems and
applications.
<br>* Practice penetration testing techniques, including network, web application, and wireless security
testing.
</p><br>
<h2>Conclusion</h2><br>
<p class="p">By following this comprehensive guide, you can embark on a successful journey into the world of cyber security,
equipping yourself with the knowledge and skills needed to protect critical digital assets and combat cyber
threats.</p>
</div>
<script src="yatu_learn_script.js" crossorigin=""></script>
</body>
<footer>
<div class="flex_align">
<div class="box1">
<div class="logo">
<a href="index.html"><img src="YL_Black-removebg-preview2.png" alt="" height="110px"
width="200px"></a>
</div>
<div class="header same">
<p>Explore</p>
<a href="index.html">Home</a>
<a href="yatu_learn_qp.html">Papers</a>
<a href="yatu_learn_notes.html">Notes</a>
<a href="yatu_learn_about.html">About</a>
</div>
<div class="policies same">
<div class="policy">
<p>policy</p>
<a href="privacy_learn.html">Privacy policy</a>
<a href="yatu_learn_about.html#contact">Contact Us</a>
</div>
<div class="media">
<p>Social:</p>
<div class="icon_flex">
<a href="https://www.linkedin.com/company/yatulearn/"><i class="fa-brands fa-linkedin"></i></a>
<a href="https://www.instagram.com/yatulearn/"><i class="fa-brands fa-instagram"></i></a>
<a href="https://www.youtube.com/@YATU_Store"><i class="fa-brands fa-youtube"></i></a>
<a href="https://x.com/yatulearn"><i class="fa-brands fa-x-twitter"></i></a>
</div>
</div>
</div>
<div class="vertical_line">
</div>
<div class="email_adress same">
<p class="mail">address:</p>
<span> Near Panjab University<br> SSGRC, Bajwara, Una<br> road, Hoishiarpur, 146021,<br> Punjab,
India</span><br>
<br>
<div class="num">Ph No. : 7068247779</div>
<a href="https://mail.google.com/mail/u/0/#inbox">E-mail : [email protected]</a>
</div>
</div>
</div>
<div class="course_flex">
<div class="courses">
<p>Courses:</p>
<div class="courses_link">
<a href="yatu_learn_wd.html">Web Dev</a>
<a href="yatu_learn_dsa.html">DSA</a>
<a href="yatu_learn_aiml.html">AI ML</a>
<a href="yatu_learn_cs.html">Cyber Security</a>
<a href="yatu_learn_os.html">Operating System</a>
<a href="yatu_learn_cn.html">Networking</a>
</div>
</div>
</div>
<div class="horizontal_line">
</div>
<div class="copyright">
<p>© 2024 YATU Learn. All Rights Reserved.</p>
</div>
</footer>
</html>