├── 5-skills-for-IT-Professional.pdf ├── 7-technical-skills-for-software-developer.pdf ├── Git-Fundamentals-Flexmind.pdf ├── How-to-build-career-in-CyberSecurity.pdf ├── LICENSE ├── README.md ├── Regular-Expression-for-Everyone.pdf ├── Social-Engineering-Basics.pdf ├── cloud-security ├── Cloud-Security-101.pdf ├── Pentesting-AWS-v2.pdf ├── cloud-computing-overview.pdf ├── cloud-security-101-2024.pdf └── cloud-security-certifications-which-one-for-you.pdf ├── cybersecurity-awareness-for-everyone.pdf ├── cybersecurity-roadmap-for-beginners-v2.pdf ├── cybersecurity-roadmap-for-beginners-v3.pdf ├── python ├── 5-IDEs-for-Python-Programming.pdf ├── Overview-of-Python.pdf ├── Python-Projects-for-beginners.pdf ├── Python-for-Web-Security.pdf ├── Python3(Boto3)-for-AWS.pdf └── python-books-for-beginners.pdf ├── software-security ├── Threat-Modeling-Hands-On.pdf └── threat-modeling-primer-2025.pdf └── web-security ├── perl-basics-for-pentesters-Part-1.pdf └── perl-basics-for-pentesters-Part-2.pdf /5-skills-for-IT-Professional.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/5-skills-for-IT-Professional.pdf -------------------------------------------------------------------------------- /7-technical-skills-for-software-developer.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/7-technical-skills-for-software-developer.pdf -------------------------------------------------------------------------------- /Git-Fundamentals-Flexmind.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/Git-Fundamentals-Flexmind.pdf -------------------------------------------------------------------------------- /How-to-build-career-in-CyberSecurity.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/How-to-build-career-in-CyberSecurity.pdf -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/LICENSE -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/README.md -------------------------------------------------------------------------------- /Regular-Expression-for-Everyone.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/Regular-Expression-for-Everyone.pdf -------------------------------------------------------------------------------- /Social-Engineering-Basics.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/Social-Engineering-Basics.pdf -------------------------------------------------------------------------------- /cloud-security/Cloud-Security-101.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/cloud-security/Cloud-Security-101.pdf -------------------------------------------------------------------------------- /cloud-security/Pentesting-AWS-v2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/cloud-security/Pentesting-AWS-v2.pdf -------------------------------------------------------------------------------- /cloud-security/cloud-computing-overview.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/cloud-security/cloud-computing-overview.pdf -------------------------------------------------------------------------------- /cloud-security/cloud-security-101-2024.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/cloud-security/cloud-security-101-2024.pdf -------------------------------------------------------------------------------- /cloud-security/cloud-security-certifications-which-one-for-you.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/cloud-security/cloud-security-certifications-which-one-for-you.pdf -------------------------------------------------------------------------------- /cybersecurity-awareness-for-everyone.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/cybersecurity-awareness-for-everyone.pdf -------------------------------------------------------------------------------- /cybersecurity-roadmap-for-beginners-v2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/cybersecurity-roadmap-for-beginners-v2.pdf -------------------------------------------------------------------------------- /cybersecurity-roadmap-for-beginners-v3.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/cybersecurity-roadmap-for-beginners-v3.pdf -------------------------------------------------------------------------------- /python/5-IDEs-for-Python-Programming.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/python/5-IDEs-for-Python-Programming.pdf -------------------------------------------------------------------------------- /python/Overview-of-Python.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/python/Overview-of-Python.pdf -------------------------------------------------------------------------------- /python/Python-Projects-for-beginners.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/python/Python-Projects-for-beginners.pdf -------------------------------------------------------------------------------- /python/Python-for-Web-Security.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/python/Python-for-Web-Security.pdf -------------------------------------------------------------------------------- /python/Python3(Boto3)-for-AWS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/python/Python3(Boto3)-for-AWS.pdf -------------------------------------------------------------------------------- /python/python-books-for-beginners.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/python/python-books-for-beginners.pdf -------------------------------------------------------------------------------- /software-security/Threat-Modeling-Hands-On.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/software-security/Threat-Modeling-Hands-On.pdf -------------------------------------------------------------------------------- /software-security/threat-modeling-primer-2025.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/software-security/threat-modeling-primer-2025.pdf -------------------------------------------------------------------------------- /web-security/perl-basics-for-pentesters-Part-1.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/web-security/perl-basics-for-pentesters-Part-1.pdf -------------------------------------------------------------------------------- /web-security/perl-basics-for-pentesters-Part-2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/HEAD/web-security/perl-basics-for-pentesters-Part-2.pdf --------------------------------------------------------------------------------