-
Notifications
You must be signed in to change notification settings - Fork 17
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
15 changed files
with
159 additions
and
127 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
# Explore | ||
|
||
<details open> | ||
<summary>Dive In</summary> | ||
<br> | ||
|
||
--> [**Cyber Starter Pack**](starter-pack.md) | ||
|
||
--> [**Security Books**](books.md) | ||
|
||
--> [**Cyber Careers**](career.md) | ||
|
||
--> [**Security Conferences and Podcasts**](conf-pod.md) | ||
|
||
--> [**Youtube Channels**](video.md) | ||
</details> | ||
|
||
|
||
Personal Favourites to stay updated (_I use feedly in Mobile to track em all_) | ||
|
||
- [Hackernoon](https://hackernoon.com/tagged/security) - HackerNoon reflects the technology industry with insightful, educational, and timely stories written by real tech professionals | ||
|
||
- [Packet Storm](https://packetstormsecurity.com/) - Information security website offering current and historical computer security tools, exploits, and security advisories | ||
|
||
- [Dark Reading](https://www.darkreading.com/) - Long one of the most widely read cybersecurity news sites, It is also the most trusted online community for security professionals | ||
|
||
- [Bleeping Computer](https://www.bleepingcomputer.com/) - A website covering technology news and offering free computer help via its forums | ||
|
||
--------- | ||
Thanks for Reading | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,12 +1,12 @@ | ||
## Career in Cyber | ||
|
||
- [Cybrary](https://www.cybrary.it/) - The Cybersecurity and IT Career Development Platform. | ||
--- To be Updated --- | ||
|
||
- [SANS Cybersecurity Career](https://www.sans.org/cybertalent/cybersecurity-career/seekers) - SANS CyberTalent Immersion Academies are 100% scholarship-based and no cost to participants. Academies are offered throughout the year in a variety of learning formats. | ||
- [SANS Cybersecurity Career](https://www.sans.org/cybertalent/cybersecurity-career/seekers) - SANS CyberTalent Immersion Academies are 100% scholarship-based and no cost to participants. Academies are offered throughout the year in a variety of learning formats | ||
|
||
- [CyberCareers.gov](https://www.cybercareers.gov/) - We worked closely with agencies and the cybersecurity communities to identify existing and forward-leaning strategies that will help the Federal Government build a cybersecurity workforce pipeline; and recruit, hire, develop, and retain top talent. | ||
- [CyberCareers.gov](https://www.cybercareers.gov/) - We worked closely with agencies and the cybersecurity communities to identify existing and forward-leaning strategies that will help the Federal Government build a cybersecurity workforce pipeline; and recruit, hire, develop, and retain top talent | ||
|
||
- [National Security Agency](https://www.intelligencecareers.gov/NSA/nsacyber.html) - The National Security Agency employs a wide variety of cyber professionals to help protect and defend U.S. government IT systems, and to help exploit the intelligence of adversaries. | ||
- [National Security Agency](https://www.intelligencecareers.gov/NSA/nsacyber.html) - The National Security Agency employs a wide variety of cyber professionals to help protect and defend U.S. government IT systems, and to help exploit the intelligence of adversaries | ||
|
||
--------- | ||
Thanks for Reading |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,39 +1,63 @@ | ||
## Conferences | ||
|
||
- [OWASP Seasides](https://www.owaspseasides.com/) Aim to provide free of cost premium workshops and talks to all the participants. | ||
- [OWASP Global Appsec](https://www.globalappsec.org/) The premier application security conference for European developers and security experts. Designed for private and public sector infosec professionals. | ||
- [DEF CON](https://defcon.org/) DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge to absorb cutting edge hacking research from the most brilliant minds in the world and test their skills in contests of hacking might. | ||
- [H.O.P.E.](https://hope.net/) Hackers On Planet Earth, one of the most creative and diverse hacker events in the world. | ||
- [OWASP Seasides](https://www.owaspseasides.com/) Aim to provide free of cost premium workshops and talks to all the participants | ||
|
||
- [OWASP Global Appsec](https://www.globalappsec.org/) The premier application security conference for European developers and security experts. Designed for private and public sector infosec professionals | ||
|
||
- [DEF CON](https://defcon.org/) DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge to absorb cutting edge hacking research from the most brilliant minds in the world and test their skills in contests of hacking might | ||
|
||
- [H.O.P.E.](https://hope.net/) Hackers On Planet Earth, one of the most creative and diverse hacker events in the world | ||
|
||
- [Toor Camp](http://toorcamp.toorcon.net/) An American hacker camp where you can show off your crazy projects and brilliant ideas | ||
|
||
- [CyberSec Summit](https://cybersummitusa.com/2017-boston/) Connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts | ||
- [ENIGMA](https://www.usenix.org/conference/enigma2017#main%5C) Focusses on current and emerging threats and defenses in the growing intersection of society and technology. To foster an intelligent and informed conversation with the community and with the world, including a wide variety of perspectives, backgrounds, and experiences. | ||
|
||
- [ENIGMA](https://www.usenix.org/conference/enigma2017#main%5C) Focusses on current and emerging threats and defenses in the growing intersection of society and technology. To foster an intelligent and informed conversation with the community and with the world, including a wide variety of perspectives, backgrounds, and experiences | ||
|
||
- [CyberSec Manchester](https://infosec-conferences.com/events-in-2019/cyber-security-manchester/) Aid people working in data analytics, AI and software development as well as anyone working on IOT or Blockchain projects | ||
- [SANS](https://www.sans.org/event/miami-2019) Cyber security training on cutting edge. Chance to learn from the best and get certified. | ||
- [RSA Conf](https://www.rsaconference.com/events/us19) Enables the security community to come together and present the latest approaches, technologies and strategies that drive progress in the industry. | ||
- [HITB SecConf](https://conference.hitb.org/) A place where ideas are exchanged, talent discovered and genius celebrated. | ||
- [IEEE Security](https://www.ieee-security.org/TC/SP2019/) It's a symposium on Security and Privacy with a forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. | ||
- [**BlackHat**](https://blackhat.com/) Inspire professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. | ||
- [USENIX CONFS](https://www.usenix.org/conferences) Each year, USENIX hosts more than a dozen conferences and workshops on topics in advanced computing systems. | ||
|
||
- [SANS](https://www.sans.org/event/miami-2019) Cyber security training on cutting edge. Chance to learn from the best and get certified | ||
|
||
- [RSA Conf](https://www.rsaconference.com/events/us19) Enables the security community to come together and present the latest approaches, technologies and strategies that drive progress in the industry | ||
|
||
- [HITB SecConf](https://conference.hitb.org/) A place where ideas are exchanged, talent discovered and genius celebrated | ||
|
||
- [IEEE Security](https://www.ieee-security.org/TC/SP2019/) It's a symposium on Security and Privacy with a forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field | ||
|
||
- [**BlackHat**](https://blackhat.com/) Inspire professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors | ||
|
||
- [USENIX CONFS](https://www.usenix.org/conferences) Each year, USENIX hosts more than a dozen conferences and workshops on topics in advanced computing systems | ||
|
||
|
||
## Webinars | ||
- [The Ethical Hacker Network](https://ethicalhacker.net/) - Online magazine and community for security professionals. | ||
|
||
- [Bright Talk](https://www.brighttalk.com/topic/cyber-security/) - Discover the latest collection of talks and videos on Cyber Security from industry experts. | ||
- [The Ethical Hacker Network](https://ethicalhacker.net/) - Online magazine and community for security professionals | ||
|
||
- [Bright Talk](https://www.brighttalk.com/topic/cyber-security/) - Discover the latest collection of talks and videos on Cyber Security from industry experts | ||
|
||
- [Do We Need a New Internet?](http://www.bbc.co.uk/programmes/p05y10x8) BBC Tomorrow's World episode entitled "Do We Need a New Internet?". | ||
- [Do We Need a New Internet?](http://www.bbc.co.uk/programmes/p05y10x8) BBC Tomorrow's World episode entitled "Do We Need a New Internet?" | ||
|
||
- [EC Council Webinar](https://ciso.eccouncil.org/webinars/) - EC Council brings together the best and brightest of the information security leaders via educational resources, and highly successful CISO events in order to advance the cause of information security | ||
|
||
- [EC Council Webinar](https://ciso.eccouncil.org/webinars/) - EC Council brings together the best and brightest of the information security leaders via educational resources, and highly successful CISO events in order to advance the cause of information security. | ||
|
||
## Podcasts | ||
|
||
- [**Darknet Diaries**](https://darknetdiaries.com/) True stories from the dark side of the Internet. This is a podcast about hackers, breaches, APTs, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network. | ||
- [Daily Stormcasts by SANS Internet Stormcasts](https://isc.sans.edu/podcast.html#stormcast) provide regular information security threat updates. | ||
- [Crypto Gram Security Podcasts](https://crypto-gram.libsyn.com/) discussions on issues such as security risks of work from home and more. | ||
- [The Hated One](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q) importance of why privacy matters to you even if you have nothing to hide. | ||
- [The Cyberwire](https://www.thecyberwire.com/podcasts/) cybersecurity-focused news service and a trusted delivery of concise, accessible, and relevant content, separating the signal from the noise in a burgeoning industry, overloaded with information and competing messages. | ||
- [Risky Business](http://risky.biz/netcasts/risky-business) Weekly information security podcast featuring news and in-depth interviews with industry luminaries. | ||
- [Security Now with Steve Gibson](https://twit.tv/shows/security-now) Discusses the hot topics in security. | ||
- [Down the Security Rabbit Hole](http://podcast.wh1t3rabbit.net/) Podcast alternates between interesting interviews and news analysis. | ||
- [**Darknet Diaries**](https://darknetdiaries.com/) True stories from the dark side of the Internet. This is a podcast about hackers, breaches, APTs, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network | ||
|
||
- [Daily Stormcasts by SANS Internet Stormcasts](https://isc.sans.edu/podcast.html#stormcast) provide regular information security threat updates | ||
|
||
- [Crypto Gram Security Podcasts](https://crypto-gram.libsyn.com/) discussions on issues such as security risks of work from home and more | ||
|
||
- [The Hated One](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q) importance of why privacy matters to you even if you have nothing to hide | ||
|
||
- [The Cyberwire](https://www.thecyberwire.com/podcasts/) cybersecurity-focused news service and a trusted delivery of concise, accessible, and relevant content, separating the signal from the noise in a burgeoning industry, overloaded with information and competing messages | ||
|
||
- [Risky Business](http://risky.biz/netcasts/risky-business) Weekly information security podcast featuring news and in-depth interviews with industry luminaries | ||
|
||
- [Security Now with Steve Gibson](https://twit.tv/shows/security-now) Discusses the hot topics in security | ||
|
||
- [Down the Security Rabbit Hole](http://podcast.wh1t3rabbit.net/) Podcast alternates between interesting interviews and news analysis | ||
|
||
|
||
--------- | ||
Thanks for Reading |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,11 +1,15 @@ | ||
## Starter Packs for Beginners | ||
|
||
- [How To Become A Hacker](http://www.catb.org/~esr/faqs/hacker-howto.html) How To Become A Hacker FAQ & Pointers by Eric Steven Raymond | ||
|
||
- [Should I Use Kali Linux?](https://www.kali.org/docs/introduction/should-i-use-kali-linux/) What’s Different About Kali Linux? Is Kali Linux Right For You? | ||
|
||
- [Learn how to hack](https://www.hackerone.com/blog/resources-for-new-hackers) Useful Online Resources for New Hackers from HackerOne | ||
- [Bug Bounty Guide](https://blog.dunicot.com/getting-started-in-bug-bounty-hunting-complete-guide/) Complete guide for getting started in Bug-bounty hunting | ||
- [Metasploit](https://www.metasploit.com/get-started) The world’s most used penetration testing framework. Helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness | ||
- [Overthewire](https://overthewire.org/) The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games | ||
|
||
- [Overthewire](https://overthewire.org/) The wargames offered by them can help you to learn and practice security concepts in the form of fun-filled games | ||
|
||
- [Cybrary](https://www.cybrary.it/) - The Cybersecurity and IT Career Development Platform | ||
|
||
|
||
--------- | ||
Thanks for Reading |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.