Skip to content

khaled1000emad/CAT-Reloaded-CyberSecurity-RoadMap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

6 Commits
ย 
ย 
ย 
ย 

Repository files navigation

CAT-Reloaded-Cyber-Security-Cirlcle-Road-Map

๐Ÿ“š Content ๐Ÿ”Ž Roadmaps
CAT Reloaded Cyber Security PATH Reverse Engineering & Malware Analysis Path (REMAR)
CAT Reloaded Penetration Testing Path
before start you should know Network Security Path (defensive)
ENTRY LEVEL DFIR Path (defensive)
Kickoff Digital Forensics Resources
Technical Mentors Hardware Hacking Course

In the beginning; I must mention Nidal Fikri who brought the Circle back to work and we learned a lot from him, and also Yasser Elsnbary which created this decent tempelate and i owe him so much for being my leader while my period as a member This year, I'm the Leader of the Circle going to put our Mentors vision on this road map you can chat with me any time, feel free to talk with me Khalid Emad

CAT Logo


โ–ถ What is CAT Reloaded?

๐Ÿ“Œ CAT Reloaded Abbreviation for Computer Assistance Team was from 1996 and reloaded again so it gained its name CAT Reloaded from this matter.


โ–ถ What do we do in CAT Reloaded?

๐Ÿ“Œ The team is interested in forming technical circles in order to form communities that help and participate in learning modern software technology such as: Cyber Security, Gaming, Web Development, Mobile Development, Data Science, Embedded system and Graphic Design.


โ–ถ How can you follow us on social media or offline?

๐Ÿ“Œ CAT Reloaded community in Mansoura, you know more about us and our activities through our social media:

๐Ÿ’ปWeb site

๐Ÿ’ปGitHub

๐Ÿ“ฑ Facebook Page

๐Ÿ“ฑ Facebook Group

๐Ÿ“ฑ Twitter

๐Ÿ“ฑ Linkedin

๐Ÿ‘“YouTube


โ–ถ How to be a member of CAT Reloaded?

๐Ÿ“Œ Almost every year we host a recruitment Event in Mansoura University to attract all of the interested students in Computer Science in general, categorizing them in Circles meant for different fields, of course there is a Cyber Security Circle.

CAT Logo

before start you should know:

โ–ถ So what isโ€œCyber Securityโ€?

๐Ÿ“Œ It is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide enriched your mind with these talks from TEDx about cybersecurity and hackers.


โ–ถ What do we need to start?

๐Ÿ“Œ To start you should build your land hard so we have some basics you should know at first to be ready to start your study in cybersecurity. These basics will be in our entry level.

You do not need any requirements to start, you only need Passion, Power and Persistence


โ–ถ What is a good resource to study ?

๐Ÿ“Œ You should know that the Cyber Security path is not easy or clear and it takes time, there is no clear path to you or path from 0 to hero.

๐Ÿ“Œ We make an effort to make our paths in this field or in our life to make it easier from other mentors, good resources, study smart and be in touch with new technologies. This is a way to learn, this field is different from other fields.

๐Ÿ“Œ you should study everytime if you are beginner or expert you will not reach the top because this track is increasing rapidly you can't imagine that it has a lot of branches like Pentesting, Reverse Engineering, Digital Forensics and a lot of them and a lot of jobs in this career to ensure of that please watch this video.


โ–ถ What are our branches in Circle?

  1. Penetration testingโœ…
  2. Reverse Engineering & Malware Analysisโœ…
  3. Network Securityโœ…

ENTRY LEVEL

CAT Logo

โ–ถ Entry level will not make you professionals or have a high level in this topic. Firstly you need to know if your passion is true or false, right or wrong for cyber security to measure your loving and capability in this field

You should take an overview in:

๐Ÿ“Œ 1. Operating System (LINUX)

CAT Logo

why to use Linux ?

๐Ÿ“Œ 2. Programming language (PYTHON)

CAT Logo

why to Learn Python ?

๐Ÿ“Œ 3. Networking

โ–ถ After that you should know what you will study Pentesting or Reverse or Networking

โ–ถ Notes:

๐Ÿ”ด 1. At the end of this level, a member can decide if he joined the right circle for him or not.

๐Ÿ”ด 2. Please note that the links and courses below are my recommended but may not be the best for everyone, so if you struggle during one of these, you should seek something else.

๐Ÿ”ด 3. Every 2 weeks thereโ€™s a seminar with the leader of the branch to discuss whatโ€™s next and what has been achieved so far.


kickoff

๐Ÿ“Œ 1. Before we begin in this level you should know something called:

- โ€œLearning difficultiesโ€:

๐Ÿ”ด How you study books and references, you must know that many difficulties will confront you with everything you learn, so you should not be bored or unable to do what you must do.

๐Ÿ”ด You must know that you will stop a lot and you will not understand too much, but you must return and resist

๐Ÿ”ด You must write and practice for everything you learn so that you do not get lost from you, either in your hand or in a text file on your personal computer. Massive practice .

๐Ÿ“Œ 2. This stage is for those who will pass the Entry Level.

๐Ÿ“Œ 3. Before you start, you must Choose your path from the 3 branches.

๐Ÿ“Œ 4. Please note that the links and courses below are recommended but may not be the best for everyone, so if you struggle during one of these, you should seek something else.

๐Ÿ“Œ 5. This is the longest and most important level in the circleโ€™s technical road map. It may take more than a year but it is really worth it. A circle member with this knowledge will be fully ready to have internships and begin the professional advanced study phase.

๐Ÿ“Œ 6. Itโ€™s recommended to study the materials in the order mentioned below.


CAT Logo

๐Ÿ“Œ 1. Our New Roadmap HERE includes many steps from Zero to Hero BTW you will need to practice more.

๐Ÿ“Œ 2. check out this really nice roadmap made by a fellow CATian!

  • Plan Time-Line Soon

optional to make it easy to study


2๏ธโƒฃ Penetration Testing Path

CAT Logo

๐Ÿ“Œ 1. Our New Roadmap HERE includes many steps from Zero to Hero BTW you will need to practice more.

๐Ÿ“Œ 2. To Practice: - Create account on hackerone , bugcrowd, intigriti - You should practice very well so you should Download OWASP Broken Web Application project Try to install it on VMware or VirtualBox from Here - preferable to download this first and practice very well i love:

1๏ธโƒฃbwapp

2๏ธโƒฃDvwa

3๏ธโƒฃportswigger labs

4๏ธโƒฃ Hack The Box

5๏ธโƒฃOWASP Juicy

6๏ธโƒฃTryHackMe

  • If you are stuck in a lab solution, try searching on Google

  • Plan Time-Line Soon

optional to make it easy to study


๐Ÿ“Œ 1. Our New Roadmap HERE includes many steps from Zero to Hero BTW you will need to practice more.

๐Ÿ“Œ 2. There are many option Courses each course include content may conflict with other courses but there are courses to be unique.

๐Ÿ“Œ 3. We will Practice on Machines HTB , tryHackMe , Vulnhub Walkthrough

  • Plan Time-Line Soon

optional to make it easy to study


๐Ÿ“Œ Under construction โ€ฆ

  • Plan Time-Line Soon

optional to make it easy to study


CAT Logo

๐Ÿ“Œ 1. CCNA course by Jeremy Cioara (well first thing is first we need to understand the basic protocols and concepts of network and this course is the main method to achieve this target).

๐Ÿ“Œ 2. CCNA-security course by CBt nuggets (this course is the real deal when it comes to network security fundamentals as it illustrates so many basic technologies and concepts).

๐Ÿ“Œ 3. Vmware course We will walk ourselves together in the virtual machines world through the intermediate level period in the VMware workstation but if you have any intention in taking this as a real challenge you could check this course as well Vmware course.

๐Ÿ“Œ 4. routeHub - FortiGate 6.0 Firewall Training (this course dives in the firewall technology as it walks us through the fortigate firewall which is one of the most used products in the industry Although itโ€™s a slightly older version but thereโ€™s no huge differences in the new version

Notes:

๐Ÿ”ด All of these courses are in English with English subtitles .. if you struggled with it in the beginning please donโ€™t give up. It's highly recommended that you continue gradually because thereโ€™s no equivalent quality in Vmware course .. And if it's necessary you can check this Arabic channel. We have downloaded all of these courses for you so if you need any of this data offline kindly inform the circle leader before any of the sessions or meetings.

  • Plan Time-Line Soon

optional to make it easy to study


Technical Mentors

๐Ÿ‘‘ Muhammed Gamal

Technical Mentor for Penetration Testing You Can Learn More From Here

๐Ÿ‘‘ Menna Essa

Technical Mentor for Reverse Engineering & Malware Analysis You Can Learn More From Here

๐Ÿ‘‘ Islam Talaat

Technical Mentor for Network Security You Can Learn More From Here

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published