Security & Cybersecurity
Foundations
- [[information-security-fundamentals]] - CIA triad, risk management, defense in depth, zero trust, threat actors
- [[cryptography-and-pki]] - symmetric/asymmetric encryption, hashing, TLS/SSL, PKI, digital signatures
- [[authentication-and-authorization]] - MFA, JWT, OAuth 2.0/OIDC, Kerberos, RBAC, PAM
- [[compliance-and-regulations]] - ISO 27001, NIST CSF, PCI DSS, GDPR, audit preparation
Web Application Security
- [[web-application-security-fundamentals]] - XSS, CSRF, SSRF, XXE, IDOR, path traversal, OWASP Top 10
- [[sql-injection-deep-dive]] - in-band, blind, out-of-band SQLi, sqlmap, parameterized queries, NoSQL injection
- [[burp-suite-and-web-pentesting]] - proxy, repeater, intruder, scanner, complementary tools
- [[secure-backend-development]] - NestJS/Express security patterns, validation, guards, ORM safety
- [[web-server-security]] - Nginx/Apache config, TLS with Let's Encrypt, reverse proxy, security headers
Offensive Security
- [[penetration-testing-methodology]] - recon, scanning, exploitation, Metasploit, wireless attacks, reporting
- [[privilege-escalation-techniques]] - Linux SUID/sudo/kernel, Windows tokens/services, lateral movement
- [[active-directory-attacks]] - Kerberoasting, Golden/Silver Ticket, DCSync, BloodHound, Mimikatz
- [[osint-and-reconnaissance]] - Shodan, Google Dorking, metadata extraction, username/email investigation
- [[social-engineering-and-phishing]] - phishing types, pretexting, email authentication (SPF/DKIM/DMARC)
Network Security
- [[network-security-and-protocols]] - OSI model, TCP/IP, DNS, DHCP, VPN (OpenVPN, WireGuard), email auth
- [[firewall-and-ids-ips]] - iptables/ufw, Windows Firewall, Snort, Suricata, WAF (ModSecurity, cloud)
- [[network-traffic-analysis]] - tcpdump, Wireshark, nmap, TCP/IP fingerprinting, diagnostics
System Security
- [[linux-os-fundamentals]] - filesystem hierarchy, kernel, boot process, disk encryption (LUKS), processes
- [[linux-system-hardening]] - SSH config, fail2ban, auditd, sysctl, file permissions, CIS benchmarks
- [[windows-security-and-powershell]] - SAM/LSASS, Event IDs, registry, GPO, AppLocker, PowerShell security
Enterprise Security
- [[siem-and-incident-response]] - SIEM architecture, correlation rules, incident lifecycle, SOC tiers, SOAR
- [[security-solutions-architecture]] - EDR, DLP, IAM/PAM, implementation lifecycle, change management
- [[vulnerability-scanning-and-management]] - Nessus, OpenVAS, CVSS, patch management, prioritization
- [[database-security]] - user privileges, encryption, auditing, backup security, cloud database security
Anti-Fraud & Forensics
- [[browser-and-device-fingerprinting]] - canvas, WebGL, AudioContext, evercookies, hardware signals
- [[tls-fingerprinting-and-network-identifiers]] - IP classification, geolocation, VPN detection, IPv6 leaks
- [[anti-fraud-behavioral-analysis]] - mouse/keystroke dynamics, payment fraud, velocity checks, BIN analysis
- [[deepfake-and-document-forensics]] - deepfake detection, document forgery, image forensics (ELA), email analysis
Security Scripting
- [[python-for-security]] - socket programming, port scanning, log analysis, HTTP testing, tool integration