An open API service indexing awesome lists of open source software.

https://github.com/djeada/cybersecurity-notes

The repository is a collection of resources and notes on various cybersecurity topics designed to help learners and professionals enhance their understanding and skills in the field. It includes cheat sheets, best practices, and summaries on key areas such as penetration testing, network security, cryptography, and more.
https://github.com/djeada/cybersecurity-notes

Last synced: 10 months ago
JSON representation

The repository is a collection of resources and notes on various cybersecurity topics designed to help learners and professionals enhance their understanding and skills in the field. It includes cheat sheets, best practices, and summaries on key areas such as penetration testing, network security, cryptography, and more.

Awesome Lists containing this project

README

          

# Cybersecurity

The repository is a **collection of resources and notes on various cybersecurity topics** designed to help learners and professionals enhance their understanding and skills in the field. It includes cheat sheets, best practices, and summaries on key areas such as penetration testing, network security, cryptography, and more. **No malicious code or offensive tools are present** in the repository, ensuring that it serves purely as an educational and informational resource.

## Gigs

1. **HackerOne** - [https://www.hackerone.com/](https://www.hackerone.com/)
2. **Bugcrowd** - [https://www.bugcrowd.com/](https://www.bugcrowd.com/)
3. **Cobalt** - [https://cobalt.io/](https://cobalt.io/)
4. **Synack Red Team** - [https://www.synack.com/red-team/](https://www.synack.com/red-team/)
5. **BountyFactory** - [https://bountyfactory.io/](https://bountyfactory.io/)
6. **YesWeHack** - [https://www.yeswehack.com/](https://www.yeswehack.com/)

## References

### Blogs
1. **Krebs on Security** - [https://krebsonsecurity.com/](https://krebsonsecurity.com/)
2. **Schneier on Security** - [https://www.schneier.com/](https://www.schneier.com/)
3. **The Hacker News** - [https://thehackernews.com/](https://thehackernews.com/)
4. **Dark Reading** - [https://www.darkreading.com/](https://www.darkreading.com/)
5. **Bleeping Computer** - [https://www.bleepingcomputer.com/](https://www.bleepingcomputer.com/)
6. **SANS Internet Storm Center** - [https://isc.sans.edu/](https://isc.sans.edu/)
7. **SecurityWeek** - [https://www.securityweek.com/](https://www.securityweek.com/)
8. **WeLiveSecurity by ESET** - [https://www.welivesecurity.com/](https://www.welivesecurity.com/)
9. **Naked Security by Sophos** - [https://nakedsecurity.sophos.com/](https://nakedsecurity.sophos.com/)
10. **Troy Hunt’s Blog** - [https://www.troyhunt.com/](https://www.troyhunt.com/)
11. https://www.stationx.net/how-to-use-wireshark-to-capture-network-traffic/

### Books
1. **"The Web Application Hacker's Handbook" by Dafydd Stuttard, Marcus Pinto** - [Link](https://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470)
2. **"Hacking: The Art of Exploitation" by Jon Erickson** - [Link](https://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441)
3. **"Practical Malware Analysis" by Michael Sikorski, Andrew Honig** - [Link](https://www.amazon.com/Practical-Malware-Analysis-Dissecting-Malicious/dp/1593272901)
4. **"The Art of Computer Virus Research and Defense" by Peter Szor** - [Link](https://www.amazon.com/Art-Computer-Virus-Research-Defense/dp/0321304543)
5. **"Metasploit: The Penetration Tester's Guide" by David Kennedy et al.** - [Link](https://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X)
6. **"The Shellcoder's Handbook" by Chris Anley et al.** - [Link](https://www.amazon.com/Shellcoders-Handbook-Discovering-Exploiting-Security/dp/047008023X)
7. **"Applied Cryptography" by Bruce Schneier** - [Link](https://www.amazon.com/Applied-Cryptography-Protocols-Algorithms-Source/dp/1119096723)
8. **"Social Engineering: The Science of Human Hacking" by Christopher Hadnagy** - [Link](https://www.amazon.com/Social-Engineering-Science-Human-Hacking/dp/111943338X)
9. **"The Cybersecurity Playbook" by Allison Cerra** - [Link](https://www.amazon.com/Cybersecurity-Playbook-Business-Protection-Preventing/dp/1119442199)
10. **"Black Hat Python" by Justin Seitz** - [Link](https://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900)

### University Lectures and Courses
1. **Stanford University - Computer and Network Security** - [https://www.youtube.com/playlist?list=PLoCMsyE1cvdWKsLVyf6cPwCLDIZnOj0NS](https://www.youtube.com/playlist?list=PLoCMsyE1cvdWKsLVyf6cPwCLDIZnOj0NS)
2. **Harvard University - Cybersecurity: Managing Risk in the Information Age** - [https://online-learning.harvard.edu/course/cybersecurity-managing-risk-information-age](https://online-learning.harvard.edu/course/cybersecurity-managing-risk-information-age)
3. **MIT OpenCourseWare - Computer Systems Security** - [https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/lecture-notes/](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/lecture-notes/)
4. **University of Maryland - Cybersecurity Specialization (Coursera)** - [https://www.coursera.org/specializations/cyber-security](https://www.coursera.org/specializations/cyber-security)
5. **University of London - Introduction to Cyber Security (Coursera)** - [https://www.coursera.org/learn/intro-cyber-security](https://www.coursera.org/learn/intro-cyber-security)
6. **Georgia Tech - Network Security (Udacity)** - [https://www.udacity.com/course/network-security--ud199](https://www.udacity.com/course/network-security--ud199)
7. **NYU Tandon School of Engineering - Offensive Security, Incident Response, and Internet Security (OSIRIS)** - [https://engineering.nyu.edu/research-innovation/offensive-security-incident-response-and-internet-security-osiris-lab](https://engineering.nyu.edu/research-innovation/offensive-security-incident-response-and-internet-security-osiris-lab)
8. **University of Washington - Designing and Executing Information Security Strategies** - [https://www.pce.uw.edu/certificates/information-security-and-risk-management](https://www.pce.uw.edu/certificates/information-security-and-risk-management)
9. **UC Berkeley - Fundamentals of Information Security (edX)** - [https://www.edx.org/course/fundamentals-of-information-security](https://www.edx.org/course/fundamentals-of-information-security)
10. **Carnegie Mellon University - CyLab Security and Privacy Institute** - [https://www.cylab.cmu.edu/education/courses/index.html](https://www.cylab.cmu.edu/education/courses/index.html)
11. **Information Security Lessons** - [https://www.youtube.com/watch?v=zBFB34YGK1U&list=PL1LIXLIF50uWgPqWAfO1wh7GNlCyQLfxi&ab_channel=Dr.DanielSoper](https://www.youtube.com/watch?v=zBFB34YGK1U&list=PL1LIXLIF50uWgPqWAfO1wh7GNlCyQLfxi&ab_channel=Dr.DanielSoper)
12. **IT Security Lectures** - [https://www.youtube.com/watch?v=GXEW07Uakms&list=PLvifRcqOOwF9-XSGfm-3uA9DfF7plasCF&ab_channel=StevenGordon](https://www.youtube.com/watch?v=GXEW07Uakms&list=PLvifRcqOOwF9-XSGfm-3uA9DfF7plasCF&ab_channel=StevenGordon)
13. **Bug Bounty Hunting Course** - [https://youtu.be/Rp69edBmFFo](https://youtu.be/Rp69edBmFFo)

### Tools and Additional Resources
1. **Pentest Cheat Sheets** - [https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets](https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets)
2. https://exampremium.com/