├── .gitignore ├── CYSA-Exam-Guide-Second-Edition ├── README.md ├── The-Importance-of-Threat-Data-and-Intelligence.md ├── Threat-Intelligence-in-Support-of-Organizational-Security.md ├── Threats-and-Vulnerabilities-Associated-with-Operating-in-the-Cloud.md ├── Threats-and-Vulnerabilities-Associated-with-Specialized-Technology.md ├── Vulnerability-Assessment-Tools.md └── Vulnerability-Management-Activities.md ├── Effective-Cybersecurity ├── Chapter1.md └── README.md ├── LICENSE ├── Objectives-Explained ├── README.md ├── Security-Operations │ ├── Infrastructure-Concepts │ │ ├── Containerization.md │ │ ├── Serverless.md │ │ └── Virtualization.md │ ├── Log-Ingestion │ │ ├── Logging-Levels.md │ │ └── Time-Synchronization.md │ ├── Network-Architecture │ │ ├── Cloud.md │ │ ├── Hybrid.md │ │ ├── Network-Segmentation.md │ │ ├── On-Premises.md │ │ ├── Secure-Access-Secure-Edge.md │ │ ├── Software-Defined-Network.md │ │ └── Zero-Trust.md │ ├── OS-Concepts │ │ ├── File-Structure.md │ │ ├── Hardware-Architecture.md │ │ ├── System-Hardening.md │ │ ├── System-Processes.md │ │ └── Windows-Registry.md │ └── README.md └── exam-objectives.pdf ├── README.md ├── TryHackMe ├── Active-Directory-Basics.md ├── Cyber-Kill-Chain.md ├── Diamond-Model.md ├── MITRE.md ├── Nessus.md ├── Pyramid-of-Pain.md └── README.md └── _assets ├── BiancosPyramidOfPain.png ├── ICS-example.jpg ├── IaaS-Model.jpg ├── PaaS.jpg ├── Process_Memory.jpg ├── Process_States.jpg ├── SaaS-Model.jpg └── THMPyramidOfPain.png /.gitignore: -------------------------------------------------------------------------------- 1 | # Open files 2 | *.swp 3 | 4 | -------------------------------------------------------------------------------- /CYSA-Exam-Guide-Second-Edition/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/CYSA-Exam-Guide-Second-Edition/README.md -------------------------------------------------------------------------------- /CYSA-Exam-Guide-Second-Edition/The-Importance-of-Threat-Data-and-Intelligence.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/CYSA-Exam-Guide-Second-Edition/The-Importance-of-Threat-Data-and-Intelligence.md -------------------------------------------------------------------------------- /CYSA-Exam-Guide-Second-Edition/Threat-Intelligence-in-Support-of-Organizational-Security.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/CYSA-Exam-Guide-Second-Edition/Threat-Intelligence-in-Support-of-Organizational-Security.md -------------------------------------------------------------------------------- /CYSA-Exam-Guide-Second-Edition/Threats-and-Vulnerabilities-Associated-with-Operating-in-the-Cloud.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/CYSA-Exam-Guide-Second-Edition/Threats-and-Vulnerabilities-Associated-with-Operating-in-the-Cloud.md -------------------------------------------------------------------------------- /CYSA-Exam-Guide-Second-Edition/Threats-and-Vulnerabilities-Associated-with-Specialized-Technology.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/CYSA-Exam-Guide-Second-Edition/Threats-and-Vulnerabilities-Associated-with-Specialized-Technology.md -------------------------------------------------------------------------------- /CYSA-Exam-Guide-Second-Edition/Vulnerability-Assessment-Tools.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/CYSA-Exam-Guide-Second-Edition/Vulnerability-Assessment-Tools.md -------------------------------------------------------------------------------- /CYSA-Exam-Guide-Second-Edition/Vulnerability-Management-Activities.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/CYSA-Exam-Guide-Second-Edition/Vulnerability-Management-Activities.md -------------------------------------------------------------------------------- /Effective-Cybersecurity/Chapter1.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Effective-Cybersecurity/Chapter1.md -------------------------------------------------------------------------------- /Effective-Cybersecurity/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Effective-Cybersecurity/README.md -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/LICENSE -------------------------------------------------------------------------------- /Objectives-Explained/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/README.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Infrastructure-Concepts/Containerization.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Infrastructure-Concepts/Containerization.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Infrastructure-Concepts/Serverless.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Infrastructure-Concepts/Serverless.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Infrastructure-Concepts/Virtualization.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Infrastructure-Concepts/Virtualization.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Log-Ingestion/Logging-Levels.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Log-Ingestion/Logging-Levels.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Log-Ingestion/Time-Synchronization.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Log-Ingestion/Time-Synchronization.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Network-Architecture/Cloud.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Network-Architecture/Cloud.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Network-Architecture/Hybrid.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Network-Architecture/Hybrid.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Network-Architecture/Network-Segmentation.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Network-Architecture/Network-Segmentation.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Network-Architecture/On-Premises.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Network-Architecture/On-Premises.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Network-Architecture/Secure-Access-Secure-Edge.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Network-Architecture/Secure-Access-Secure-Edge.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Network-Architecture/Software-Defined-Network.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Network-Architecture/Software-Defined-Network.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/Network-Architecture/Zero-Trust.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/Network-Architecture/Zero-Trust.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/OS-Concepts/File-Structure.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/OS-Concepts/File-Structure.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/OS-Concepts/Hardware-Architecture.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/OS-Concepts/Hardware-Architecture.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/OS-Concepts/System-Hardening.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/OS-Concepts/System-Hardening.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/OS-Concepts/System-Processes.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/OS-Concepts/System-Processes.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/OS-Concepts/Windows-Registry.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/OS-Concepts/Windows-Registry.md -------------------------------------------------------------------------------- /Objectives-Explained/Security-Operations/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/Security-Operations/README.md -------------------------------------------------------------------------------- /Objectives-Explained/exam-objectives.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/Objectives-Explained/exam-objectives.pdf -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/README.md -------------------------------------------------------------------------------- /TryHackMe/Active-Directory-Basics.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/TryHackMe/Active-Directory-Basics.md -------------------------------------------------------------------------------- /TryHackMe/Cyber-Kill-Chain.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/TryHackMe/Cyber-Kill-Chain.md -------------------------------------------------------------------------------- /TryHackMe/Diamond-Model.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/TryHackMe/Diamond-Model.md -------------------------------------------------------------------------------- /TryHackMe/MITRE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/TryHackMe/MITRE.md -------------------------------------------------------------------------------- /TryHackMe/Nessus.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/TryHackMe/Nessus.md -------------------------------------------------------------------------------- /TryHackMe/Pyramid-of-Pain.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/TryHackMe/Pyramid-of-Pain.md -------------------------------------------------------------------------------- /TryHackMe/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/TryHackMe/README.md -------------------------------------------------------------------------------- /_assets/BiancosPyramidOfPain.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/_assets/BiancosPyramidOfPain.png -------------------------------------------------------------------------------- /_assets/ICS-example.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/_assets/ICS-example.jpg -------------------------------------------------------------------------------- /_assets/IaaS-Model.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/_assets/IaaS-Model.jpg -------------------------------------------------------------------------------- /_assets/PaaS.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/_assets/PaaS.jpg -------------------------------------------------------------------------------- /_assets/Process_Memory.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/_assets/Process_Memory.jpg -------------------------------------------------------------------------------- /_assets/Process_States.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/_assets/Process_States.jpg -------------------------------------------------------------------------------- /_assets/SaaS-Model.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/_assets/SaaS-Model.jpg -------------------------------------------------------------------------------- /_assets/THMPyramidOfPain.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/willisman31/CYSA-Study-Guide/HEAD/_assets/THMPyramidOfPain.png --------------------------------------------------------------------------------