Security Trybe Profile picture
Oct 26 9 tweets 2 min read Read on X
CyberSecurity Study Guide

Estimated Duration: 6-8 Months 👇
What To Learn (Part 1):

The Basics
*CIA Triad
*Cybercrimes & Cyberattacks
*OWASP Framework
*OSINT
*Recon,Scanning & Enumeration
*Exploitation & Attacking Vectors
*Privilege Escalation
*Windows Active Directory
*Exploit Dev & Payloads

Advanced
*Malwares, Rootkits, Reserve Engineering
*Pivoting and Persistence
(Post Exploitation)
What To Learn (Part 2):

*Linux

*Networking:
-OSI Models
-Network Topologies
-Common Protocols and their uses
-Common Ports and their uses
-IPv4 and IPv6
-Basics of Subnetting

*Programming Languages (At least 1 These):
-Python
-C/C++
-JavaScript
-HTML
Tools to Master (Must Learn):
*Nmap
*BurpSuite
*Wireshark
*Metasploit

Operating System (OS):
Kali Linux

Playgrounds :
*TryHackMe
*HackTheBox
*Cybrary
*HackerOne (BugBounty)
Resources- YouTube (FREE)

*Ethical Hacking in 15 Hours- The Cyber Mentor

*Beginner to Advanced Bug Bounty- PHD Security

*Wireshark Master Class- Chris Greer

*The 50 Most Popular Linux & Terminal Commands (Full Course of Beginners) - FreeCodeCamp
Resources (Paid)

*
-By far the best collection in one place

*Getting Started with Wireshark (Udemy) - Chris Greer

*The Complete NMAP Ethical Hacking Course (Udemy) - Nathan House

*Web Hacking: Become a Professional Web PenTesters (Udemy)- Geri Revayacademy.tcm-sec.com
Certifications To Get:

* eLearnSecurity Junior Penetration Tester (eJPT)

*Certified Ethical Hacker (CEH)

*CompTIA Security+

*CompTIA PenTest+
Additional Subjects:

*MITRE ATT&CK
*NIST Framework - GRC
*ISO 27001 - GRC
For More Cybersecurity Posts and Updates

Follow us on TikTok-@thesecuritytrybe
Link- tiktok.com/@thesecuritytr

Follow us on IG-@SecurityTrybe
Link- instagram.com/securitytrybe

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Security Trybe

Security Trybe Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @SecurityTrybe

Oct 16
The Cybersecurity Threat Universe: A Thread Image
Malware:

Malware is a term that describes any malicious software that can harm your devices or data.

Types of malware and what they do:

-Virus:
A code that inserts itself into an application and executes when the app is run. It can damage or delete files, corrupt data, or spread to other programs.

-Ransomware:
A type of malware that encrypts your data and demands a ransom for the decryption key.

-Spyware:
It collects information about your activities, such as passwords, payment details, or messages, without your consent.

-Trojan:
A Trojan disguises itself as a legitimate or desirable program, but performs malicious actions once installed. It can take control of your system, steal data, or download more malware.

-Worm:
A type of malware that spreads through a network by replicating itself. It can consume bandwidth, slow down performance, or damage network devices.
Social Engineering:

This is the use of psychological tricks and manipulation to get people to release sensitive information.

Types of social engineering and what they do:

-Phishing:
Sending fake emails that look like they are from a trusted source, such as a bank or a company, and asking for personal or financial information.

-Vishing:
This known as ‘voice phishing’, it involves calling someone on the phone and pretending to be someone else, such as a tech support person or a government official, and asking for information or money.

-Smishing:
This is referred to a ‘SMS Phishing’ it involves sending fake text messages that look like they are from a trusted source, such as a delivery service or a lottery, and asking for information or money.

-Whaling:
Targeting high-level executives or important people with phishing or vishing attacks, and trying to get access to their accounts or sensitive data.

-Spear Phishing:
Targeting a specific person or group with phishing or vishing attacks, and using information about them to make the messages more convincing.
Read 9 tweets
Oct 10
Cybersecurity Study Guide👇 Image
What to learn- Part 1 Image
What to learn- Part 2 Image
Read 6 tweets
Oct 9
VPN explained… A Thread
 
A Virtual Private Network (VPN) is a technology that creates a secure and encrypted connection over a less secure network, such as the Internet. VPNs are commonly used to protect sensitive data, enhance online privacy, and allow users to access region-restricted websites.Image
How VPNs Work:

When you connect to a VPN, your internet traffic is routed through a secure server operated by the VPN provider. This process masks your IP address and encrypts your online activities, making it difficult for hackers, government entities, and ISPs (Internet Service Providers) to monitor your actions. Here’s how it works:

• Encryption: VPNs use encryption protocols (like OpenVPN, L2TP/IPsec, or IKEv2) to secure the data being transmitted. This means that even if someone intercepts the data, they cannot read it without the encryption key.

• Tunneling: VPNs create a "tunnel" through which your data travels, ensuring it is shielded from outside interference. The tunnel can be established using various protocols that differ in security levels and speed.
Types of VPN Image
Read 5 tweets
Oct 4
Red Team: What You Need To Know

In cybersecurity, the red team is responsible for simulating realistic cyberattacks and testing organization security defenses.
Their primary focus is on finding and exploiting vulnerabilities, mimicking adversary tactics and objectives, and providing feedback and recommendations to the blue team.Image
Red Team Job Roles:

· Penetration Tester: A penetration tester uses various tools and techniques to conduct authorized attacks on a system or network, identifying and exploiting vulnerabilities and weaknesses. They also document and report their findings and suggestions for improvement.

· Ethical Hacker: Ethical hackers are similar to penetration testers, but have a wider scope and a more creative approach. Their methods and mindset are similar to those of malicious hackers, but with the goal of improving the target's security.

· Red Team Operator: A red team operator is a skilled penetration tester or ethical hacker who performs advanced and covert attacks, using customized tools and frameworks, to mimic real-world adversaries and scenarios.
Exercises That Red Team Can Perform To Improve Their Skills:
· Capture The Flag (CTF)
· HackTheBox (HTB)
· Red Team vs Blue Team Exercises

Red Teamer Required Skillset:
· Technical Skills
· Communication Skills
· Creative Skills
Read 5 tweets
Oct 4
BLUE TEAM: What You Need To Know

The blue Team represents the defensive side of cybersecurity, responsible for protecting an organization's systems, networks, and data from cybersecurity threats.

Their primary focus is on proactive defense strategies, threat detection, incident response, and vulnerability management.Image
Blue Team Job Roles:

· Security Analyst: A security analyst is responsible for monitoring and analyzing security events and alerts generated by different sources, like firewalls, antivirus, intrusion detection systems, and so on.

· Security Architect: A security architect creates and oversees the security architecture and policies of an organization.

· Security Engineer: A security engineer designs, implements, and maintains the security infrastructure and controls of an organization.
Exercises That Blue Team Can Perform To Improve Their Skills:

· Capture The Flag (CTF)
· Red Team vs Blue Team Exercises
· Tabletop Exercises (TTX)

Blue Teamer Required Skillset:
· Communication Skills
· Technical Skills
· Analytical Skills
· Team Work
Read 5 tweets
Oct 1
Cybersecurity Study Guide👇 Image
What to Learn (Part 1) Image
What to Learn (Part 2) Image
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(