├── IntroToCyberSecurity.md ├── my-favourite-blogs.md └── my-favourite-podcasts.md /IntroToCyberSecurity.md: -------------------------------------------------------------------------------- 1 | - Cyber Security Roadmap - خارطة الطريق إلى إحتراف الأمن السيبراني 2 | - Prerequisites - متطلبات دراسة الأمن السيبراني 3 | - **IT Prerequisites - أساسيات الحاسب** 4 | - **Networking - الشبكات** 5 | - Networking Theory نظرية الشبكات 6 | - OSI / TCP/IP Models ... 7 | - Networking & Application Protocols البروتوكولات 8 | - TCP, UDP, IP, ICMP ... 9 | - DNS, HTTP, SMTP ... 10 | - [Network+ Objectives](https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-network-n10-007-exam-objectives-(6-0).pdf?sfvrsn=fd21c50b_2) حاول فهم و أستيعاب و تطبيق مفردات المنهج 11 | - **Operating Systems - أنظمة التشغيل** 12 | - Windows نظام الويندوز 13 | - Linux نظام اللينكس 14 | - MacOS نظام الماك 15 | - Mobile: iOS, Android أنظمة الموبايل 16 | - Services: DHCP, DNS, HTTP, Email ( SMTP, POP3, IMAP), FTP ... 17 | - [Linux+ Objectives](https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-linux-xk0-004-exam-objectives4125801ca54144cf9fa97a4e2ed0e77e.pdf?sfvrsn=b31fd13f_6) حاول فهم و أستيعاب و تطبيق مفردات المنهج 18 | - **Cloud Essentials - مبادئئ الأنظمة السحابية** 19 | - [Cloud Essentials](https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-cloud-essentials-clo-002-exam-objectives-(1-0).pdf?sfvrsn=2f3b6aa9_2) حاول فهم و أستيعاب و تطبيق مفردات المنهج 20 | - **Programming Essentials - مبادىء البرمجة** 21 | - Logic, Scripting ( Bash, Powershell … ), python 22 | - **Cyber Security Basics - أساسيات الأمن السيبراني** 23 | - Network Security أمن الشبكات 24 | - Endpoint Security أمن الأجهزة الشخصية 25 | - Server Security أمن الأجهزة الرئيسية 26 | - Data Security أمن البيانات 27 | - Cloud Security أمن الأنظمة السحابية 28 | - Application Security أمن التطبيقات 29 | - Risk/Threats/Vulnerabilities المخاطر / التهديدات / الثغرات 30 | - [OWASP Top Ten](https://owasp.org/www-project-top-ten/) 31 | - Security Devices & Solutions حلول و أجهزة الأمان 32 | - FW - IPTables 33 | - IPS / IDS ( Snort - Suricata ) 34 | - DLP 35 | - Zero Trust Architecture - ZTA 36 | - Segmentation 37 | - [Security+ Objectives](https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-security-sy0-601-exam-objectives-(2-0).pdf?sfvrsn=8c5889ff_2) حاول فهم و أستيعاب و تطبيق مفردات المنهج 38 | - **Cyber Security Fields: تخصصات الأمن السيبراني** 39 | 40 | - Architecture المعمارية 41 | - GRC 42 | - Governance الحوكمة 43 | - Risk المخاطر 44 | - Compliance الإمتثال 45 | - Operation: تشغيل عمليات الأمن اسيبراني 46 | - Blue Team الفريق الأزرق - الدفاعي 47 | - Red Team الفريق الأحمر - الهجومي 48 | - Incident Response - IR الإستجابة للحوادث السيبرانية 49 | - Digital Forensics التحقيقات الجنائية الرقمية 50 | - Threat Hunting 51 | - **S**ecurity **O**peration **C**enter - **SOC** مركز تشغيل عمليات الأمن السيبراني 52 | - Analysts: L1, L2, SME 53 | - OT التقنيات التشغيلية 54 | 55 | - **مبادرات وطنية مفيدة لدراسة الأمن السيبراني** 56 | 57 | - NCA - الهيئة الوطنية للأمن السيبراني 58 | - [SCyWF  -  الإطار السعودي لكوادر الأمن السيبراني - سيوف](https://nca.gov.sa/files/scywf_ar.pdf) 59 | - [The Saudi Cybersecurity Higher Education Framework - الإطار السعودي للتعليم العالي في الأمن السيبراني](https://nca.gov.sa/files/scyberedu_ar.pdf) 60 | - [برنامج سايبر برو \- الأكاديمية الوطنية للأمن السيبراني التابعة للهيئة](https://ncac.edu.sa/) 61 | - [SAFCSP](https://safcsp.org.sa/) \- الإتحاد السعودي للأمن السيبراني و البرمجة و الدرونز 62 | - [أكاديمية طويق](https://tuwaiq.edu.sa/#cyper_section) ( تأسيسي \- دفاعي \- هجومي ) 63 | - **Self Learning - التعلم الذاتي و المتابعة المستمرة** 64 | - Keep up to date with technologies 65 | - Reading Cybersecurity News 66 | - Searching the internet 67 | - Twitter Accounts & Lists 68 | - [Podcasts - متابعة المدونات الصوتية المتخصصة في الأمن السيبراني](https://github.com/nimari/IntroToCyberSecurity/blob/main/my-favourite-podcasts.md) 69 | - [Blogs - متابعة و قراءة المدونات المتخصصة في الأمن السيبراني](https://github.com/nimari/IntroToCyberSecurity/blob/main/my-favourite-blogs.md) 70 | - Slack Channels 71 | - Telegram Groups & Channels 72 | - Discord Channels 73 | - Get hands-on 74 | - [كثر من ٨٠٠ درس مجاني في مختلف تخصصات علوم الحاسب الآلي](https://github.com/Developer-Y/cs-video-courses#security) 75 | - **Searching Skills - طور مهارات البحث** 76 | - [Google Dorks Cheat Sheet](https://gist.github.com/sundowndev/283efaddbcf896ab405488330d1bbc06) 77 | --- 78 | -------------------------------------------------------------------------------- /my-favourite-blogs.md: -------------------------------------------------------------------------------- 1 | ***مدونات متخصصة في الأمن السيبراني*** 2 | --- 3 | 4 | - [SANS Computer Forensics and e-Discovery](https://www.sans.org/blog) 5 | - [SANS Internet Storm Center, InfoCON: green](https://isc.sans.edu) 6 | - [SANS Blog](https://www.sans.org/blog) 7 | - [Naked Security](https://nakedsecurity.sophos.com) 8 | - [/r/netsec - Information Security News & Discussion](https://www.reddit.com/r/netsec/) 9 | - [Threatpost](https://threatpost.com) 10 | - [Krebs on Security](https://krebsonsecurity.com) 11 | - [The Threatpost Podcast](http://threatpost.com) 12 | - [Linux Journal - The Original Magazine of the Linux Community](https://www.linuxjournal.com/node/feed) 13 | - [Security Onion](https://blog.securityonion.net/) 14 | - [CNET News - Security & Privacy](https://www.cnet.com/#ftag=CAD590a51e) 15 | - [Tenable News Feed](https://www.tenable.com/) 16 | - [Schneier on Security](https://www.schneier.com) 17 | - [Social Engineering Blogs](http://www.socialengineeringblogs.com) 18 | - [The Guardian Security](https://www.theguardian.com/technology/data-computer-security) 19 | - [Darknet](https://www.darknet.org.uk) 20 | - [We Live Security](https://www.welivesecurity.com) 21 | - [Google Online Security Blog](http://security.googleblog.com/) 22 | - [Cisco Blog](https://blogs.cisco.com) 23 | - [Cyber Security Advisories - MS-ISAC](https://www.cisecurity.org/feed/advisories) 24 | - [Krebs on Security](https://krebsonsecurity.com) 25 | - [Mcafee](https://www.mcafee.com/blogs) 26 | - [Graham Cluley](https://grahamcluley.com) 27 | - [David Lebovitz](https://www.davidlebovitz.com) 28 | - [Google Online Secuirty](http://security.googleblog.com/) 29 | - [Security Balance](http://blog.securitybalance.com/) 30 | - [Lenny Zeltser on Information Security](https://zeltser.com) 31 | - [Schneier on Security](https://www.schneier.com) 32 | - [Security Affairs](https://securityaffairs.co/wordpress) 33 | - [3 min read](https://blog.medium.com?source=rss----15f753907972---4) 34 | - [Irongeek's Security Site](http://www.irongeek.com/) 35 | - [Troy Hunt](https://www.troyhunt.com/) 36 | - [Roger's Information Security Blog](https://www.infosecblog.org) 37 | - [Palo Alto Networks Blog](https://www.paloaltonetworks.com/blog) 38 | - [Didier Stevens](https://blog.didierstevens.com) 39 | - [Lenny Zeltser](https://zeltser.com) 40 | - [The Hacker News [ THN ] - Best Security Blog](https://thehackernews.com/) 41 | - [Darkoperator Blog](https://www.darkoperator.com/) 42 | - [Javvad Malik](https://javvadmalik.com) 43 | - [/dev/random](https://blog.rootshell.be) 44 | - [PaulDotCom](https://securityweekly.com) 45 | - [Malwarebytes Unpacked](https://blog.malwarebytes.com) 46 | - [Roger's Information Security Blog](https://www.infosecblog.org) 47 | - [Lenny Zeltser on Information Security](https://zeltser.com) 48 | - [Security Boulevard](https://securityboulevard.com) 49 | - [Naked Security](https://nakedsecurity.sophos.com) 50 | - [malware-traffic-analysis](https://www.malware-traffic-analysis.net/index.html) 51 | - [Windows Incident Response](http://windowsir.blogspot.com/) 52 | - [Digging into WordPress](https://digwp.com) 53 | - [Inside VirusTotal's pants](https://blog.virustotal.com/) 54 | - [Social-Engineer.Org](https://www.social-engineer.org) 55 | - [ZDNet | Zero Day Blog RSS](https://www.zdnet.com/) 56 | - [Defensive Security Podcast](https://defensivesecurity.org) 57 | - [Dark Reading - All](https://www.darkreading.com) 58 | - [Forensic Focus](https://www.forensicfocus.com) 59 | - [Graham Hancock Official Website](https://grahamhancock.com) 60 | - [Hacks for Creative Life!](https://hacks.beck1240.com) 61 | - [OpenBSD Journal](http://undeadly.org/) 62 | - [Paul's Security Weekly](http://securityweekly.com/) 63 | - [Security Through Education](https://www.social-engineer.org) 64 | - [TED Talks Daily (SD video)](https://www.ted.com/talks) 65 | - [The Hacker News](https://thehackernews.com/) 66 | - [The Social-Engineer Podcast](http://www.social-engineer.org/category/podcast/) 67 | - [Threatpost | The first stop for security news](https://threatpost.com) 68 | - [Troy Hunt's Blog](https://www.troyhunt.com/) 69 | - [VirusTotal Blog](https://blog.virustotal.com/) 70 | -------------------------------------------------------------------------------- /my-favourite-podcasts.md: -------------------------------------------------------------------------------- 1 | ***المدونات الصوتية المتخصصة في الأمن السيبراني*** 2 | *** 3 | - [Tradecraft Security Weekly (Video)](http://securityweekly.com) 4 | - [Application Security Weekly (Video)](https://securityweekly.com/category-shows/application-security-weekly/) 5 | - [Enterprise Security Weekly (Video)](http://securityweekly.com) 6 | - [Security Weekly TV](http://securityweekly.com) 7 | - [Enterprise Security Weekly (Audio)](http://securityweekly.com) 8 | - [Security Weekly](http://securityweekly.com/) 9 | - [GIAC Certifications: Trust Me I'm Certified](http://www.giac.org/podcasts) 10 | - [BLUEPRINT](https://blueprint.buzzsprout.com) 11 | - [Exploring Information Security - Timothy De Block](http://www.timothydeblock.com/eis/) 12 | - [Naked Security Podcast](http://nakedsecurity.sophos.com) 13 | - [Tribe of Hackers Podcast](https://tohpodcast.buzzsprout.com) 14 | - [The OWASP Podcast Series](https://jupiterone.com/blog/people-process-technology-the-missing-factor/) 15 | - [Darknet Diaries](https://darknetdiaries.com/) 16 | - [The Social-Engineer Podcast](http://www.social-engineer.org/category/podcast/) 17 | - [Liquidmatrix Security Digest Podcast](http://liquidmatrix.libsyn.com) 18 | - [Nakerah Network](https://nakerah.net/) 19 | - [CISO Tradecraft](https://cisotradecraft.podbean.com) 20 | - [Cloud Security Podcast by Google](https://cloud.withgoogle.com/cloudsecurity/podcast/) 21 | - [CyberWire Daily](https://thecyberwire.com/podcasts/daily-podcast) 22 | - [The Privacy, Security, & OSINT Show](https://soundcloud.com/user-98066669) 23 | - [Hacking Humans](https://thecyberwire.com/podcasts/hacking-humans) 24 | - [Smashing Security](http://www.smashingsecurity.com) 25 | - [Unsupervised Learning](https://danielmiessler.com/podcast/) 26 | --------------------------------------------------------------------------------