├── 5-skills-for-IT-Professional.pdf ├── 7-technical-skills-for-software-developer.pdf ├── Git-Fundamentals-Flexmind.pdf ├── How-to-build-career-in-CyberSecurity.pdf ├── LICENSE ├── README.md ├── Regular-Expression-for-Everyone.pdf ├── Social-Engineering-Basics.pdf ├── cloud-security ├── Cloud-Security-101.pdf ├── Pentesting-AWS-v2.pdf ├── cloud-computing-overview.pdf ├── cloud-security-101-2024.pdf └── cloud-security-certifications-which-one-for-you.pdf ├── cybersecurity-awareness-for-everyone.pdf ├── cybersecurity-roadmap-for-beginners-v2.pdf ├── cybersecurity-roadmap-for-beginners-v3.pdf ├── python ├── 5-IDEs-for-Python-Programming.pdf ├── Overview-of-Python.pdf ├── Python-Projects-for-beginners.pdf ├── Python-for-Web-Security.pdf ├── Python3(Boto3)-for-AWS.pdf └── python-books-for-beginners.pdf ├── software-security ├── Threat-Modeling-Hands-On.pdf └── threat-modeling-primer-2025.pdf └── web-security ├── perl-basics-for-pentesters-Part-1.pdf └── perl-basics-for-pentesters-Part-2.pdf /5-skills-for-IT-Professional.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/5-skills-for-IT-Professional.pdf -------------------------------------------------------------------------------- /7-technical-skills-for-software-developer.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/7-technical-skills-for-software-developer.pdf -------------------------------------------------------------------------------- /Git-Fundamentals-Flexmind.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/Git-Fundamentals-Flexmind.pdf -------------------------------------------------------------------------------- /How-to-build-career-in-CyberSecurity.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/How-to-build-career-in-CyberSecurity.pdf -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2022 Sanjeev Jaiswal 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Collection of my public presentations 2 | Collection of my presentations and useful presentation from various known public sources on various topics like Cybersecurity, python, cloud security, devsecops and so on... 3 | 4 | I will keep adding more presentations which I will present publicly here. Stay tuned for more security focused slides. 5 | 6 | ## Here are the quicklinks for all my presentation shared: 7 | 8 | ### Tech Focused 9 | 1. [5 skills for IT Professionals](5-skills-for-IT-Professional.pdf) 10 | 2. [7 Technical skills for software developers](7-technical-skills-for-software-developer.pdf) 11 | 3. [Cybersecurity Roadmap for beginners](cybersecurity-roadmap-for-beginners.pdf) 12 | 4. [Git Fundamentals for Everyone](Git-Fundamentals-Flexmind.pdf) 13 | 5. [How to build career in Cybersecurity](How-to-build-career-in-CyberSecurity.pdf) 14 | 6. [Regular Expression for Everyone](Regular-Expression-for-Everyone.pdf) 15 | 7. [Social Engineering Basics](Social-Engineering-Basics.pdf) 16 | 17 | ### Cloud Security 18 | 1. [Cloud Computing Overview](cloud-security/cloud-computing-overview.pdf) 19 | 2. [Cloud Security 101](cloud-security/Cloud-Security-101.pdf) 20 | 3. [Cloud Security Certifications](cloud-security/cloud-security-certifications-which-one-for-you.pdf) 21 | 4. [Pentesting AWS](cloud-security/Pentesting-AWS-v2.pdf) 22 | 23 | ### Python 24 | 1. [5 IDEs for Python Programmers](python/5-IDEs-for-Python-Programming.pdf) 25 | 2. [Python Overview: what and why with its uses](python/Overview-of-Python.pdf) 26 | 3. [Python for AWS](python/Python3(Boto3)-for-AWS.pdf) 27 | 4. [Python books for beginners](python/python-books-for-beginners.pdf) 28 | 5. [Python for Web Security](python/Python-for-Web-Security.pdf) 29 | 6. [Python projects for beginners](python/Python-Projects-for-beginners.pdf) 30 | 31 | ### Software Security 32 | 1. [Threat Modeling Hands-on](software-security/Threat-Modeling-Hands-On.pdf) 33 | 34 | ### Web Security 35 | 1. [Perl basics for Pentesters: Part 1](web-seucrity/perl-basics-for-pentesters-Part-1.pdf) 36 | 2. [Perl basics for Pentesters: Part 2](web-seucrity/perl-basics-for-pentesters-Part-2.pdf) 37 | 38 | ### Security Presentations from various public sources 39 | 40 | ### Coming Soon below categories 41 | 1. DevSecOps 42 | 2. Infrastructure as Code (IaC) 43 | 44 | ### I have plans to work on below presentations: 45 | 1. [ ] Linux Commands for everyone 46 | 2. [ ] Docker Fundamentals with examples 47 | 3. [ ] Kubernetes Fundamentals with examples 48 | 4. [ ] Ansible 101 49 | 5. [ ] Terraform 101 50 | 6. [ ] Practical AWS 51 | 7. [ ] Practical AWS Security 52 | 8. [ ] Practical GCP 53 | 9. [ ] Practical GCP Security 54 | 10. [ ] Terraform for GCP Resources 55 | 11. [ ] OWASP Top 10 explained 56 | 12. [ ] Cybersecurity Fundamentals 57 | 13. [ ] DevOps Essentials 58 | 14. [ ] Docker Security 59 | 15. [ ] Kubernetes Security 60 | 16. [ ] NIST CSF (Cybersecurity Framework) 61 | 17. [ ] NIST RMF (Risk Management Framework) 62 | 18. [ ] Secure Code Review 63 | 19. [ ] Secure Design Principles 64 | 20. [ ] How to perform Secure Code Review effectively 65 | 21. [ ] Cryptography Essentials 66 | 22. [ ] Python Secure Coding 67 | 68 | 69 | 70 | 71 | 72 | -------------------------------------------------------------------------------- /Regular-Expression-for-Everyone.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/Regular-Expression-for-Everyone.pdf -------------------------------------------------------------------------------- /Social-Engineering-Basics.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/Social-Engineering-Basics.pdf -------------------------------------------------------------------------------- /cloud-security/Cloud-Security-101.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/cloud-security/Cloud-Security-101.pdf -------------------------------------------------------------------------------- /cloud-security/Pentesting-AWS-v2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/cloud-security/Pentesting-AWS-v2.pdf -------------------------------------------------------------------------------- /cloud-security/cloud-computing-overview.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/cloud-security/cloud-computing-overview.pdf -------------------------------------------------------------------------------- /cloud-security/cloud-security-101-2024.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/cloud-security/cloud-security-101-2024.pdf -------------------------------------------------------------------------------- /cloud-security/cloud-security-certifications-which-one-for-you.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/cloud-security/cloud-security-certifications-which-one-for-you.pdf -------------------------------------------------------------------------------- /cybersecurity-awareness-for-everyone.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/cybersecurity-awareness-for-everyone.pdf -------------------------------------------------------------------------------- /cybersecurity-roadmap-for-beginners-v2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/cybersecurity-roadmap-for-beginners-v2.pdf -------------------------------------------------------------------------------- /cybersecurity-roadmap-for-beginners-v3.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/cybersecurity-roadmap-for-beginners-v3.pdf -------------------------------------------------------------------------------- /python/5-IDEs-for-Python-Programming.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/python/5-IDEs-for-Python-Programming.pdf -------------------------------------------------------------------------------- /python/Overview-of-Python.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/python/Overview-of-Python.pdf -------------------------------------------------------------------------------- /python/Python-Projects-for-beginners.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/python/Python-Projects-for-beginners.pdf -------------------------------------------------------------------------------- /python/Python-for-Web-Security.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/python/Python-for-Web-Security.pdf -------------------------------------------------------------------------------- /python/Python3(Boto3)-for-AWS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/python/Python3(Boto3)-for-AWS.pdf -------------------------------------------------------------------------------- /python/python-books-for-beginners.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/python/python-books-for-beginners.pdf -------------------------------------------------------------------------------- /software-security/Threat-Modeling-Hands-On.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/software-security/Threat-Modeling-Hands-On.pdf -------------------------------------------------------------------------------- /software-security/threat-modeling-primer-2025.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/software-security/threat-modeling-primer-2025.pdf -------------------------------------------------------------------------------- /web-security/perl-basics-for-pentesters-Part-1.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/web-security/perl-basics-for-pentesters-Part-1.pdf -------------------------------------------------------------------------------- /web-security/perl-basics-for-pentesters-Part-2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/jassics/cybersecurity-slides/6a77f5a64c6f8adaadefd1d3774ea04a85e25b94/web-security/perl-basics-for-pentesters-Part-2.pdf --------------------------------------------------------------------------------