Skip to main content

How Do I Find Resources For Learning Information And Security ?

 As i said in my previous post i will tell how to find resources and material to study and explore the cyber security field.

The tricks i will share are my own tricks but sharing on my blog........... :)
From this tricks you can find stuff related to any topic........
But before you start hunting for your resources I want to share some useful tips and sources for learning.................................

 


My personal tip to the new comers in this field is that, you all have to LEARN and for that internet is full of knowledge and you just have to type it out and search it..............but many people ask me that what we actually have to search on google, so as people go through this problem that they don't even know that which topics they have to learn.................so there is a simple answer to that, just pick up a random article,blog,book etc and read it...........take your own notes and write down the points mentioned in that article,blog,book etc.............and just search those points on google and try to learn them in deep..............i have adopted this methodology and it worked for me !!!


So firstly i will talk about some useful websites that is very important for beginners but note a thing that i am just giving for references don't depend on them only find some yourself

1 https://www.cisco.com is pretty nice to learn basic networking.......

2 https://www.owasp.org
   https://portswigger.net/blog these website would very useful if you want to go with web app testing.......

3 https://www.sans.org follow this organization if you are interested in reverse engineering and malware analysis......

Now we will head towards some books that is highly recommended from my side and it would help beginners to grow their knowledge to a good level

RECOMMENDED BOOKS FOR EVERYONE------------

1. Hacking The art of exploitation

2. The Web application hacker's handbook

3. The hacker's playbook 2

4.The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy  

5.  Computer Hacking Beginners Guide: How to Hack Wireless Network, Basic Security and Penetration Testing, Kali    Linux, Your First Hack

6. Advanced Penetration Testing: Hacking the World′s Most Secure Networks

7.The Hardware Hacker: Adventures in Making and Breaking Hardware

8.Hash Crack: Password Cracking Manual

9. Kali Linux Revealed: Mastering the Penetration Testing Distribution  

10.Metasploit: The Penetration Tester’s Guide

DUE TO SOME REASONS I CAN'T SHARE THESE BOOKS HERE........BUT IF YOU JUST SEARCH GOOGLE THERE PDF ARE EASILY AVAILABLE



As we all know that nowadays YouTube is the great source of learning so i am giving some reference you tube channels which you all can check
~Hackersploit
~Liveroverflow
~Null Byte
~The Cyber Mentor
~Z security
~Hackaday
~Seytonic




SO TILL NOW I HAVE TOLD YOU A SIMPLE TRICK, SOME REFERENCE WEBSITES, SOME REFERENCE BOOKS AND SOME YOUTUBE CHANNELS.

Now i will talk about some blogs and online resources from which you can read about vulnerabilities, case studies, hacker's methodologies and other interesting stuff

So www.medium.com is a good platforms to read other professional experiences, there you can just read through categories or by just searching some keywords.................


Now we came to blogs and trust me  they are  very very important cause they are written by highly skilled and experienced people
so you have to follow
~Offensive Security
~Sans Security
~EC council
~Pentester's Academy
~Cybrary
~Security Tube
and other's you will know with time :)



Now we have came to the end of this post and as i mentioned about i give you a last tip about find resources to study,
So there are some keywords, if you search those on google so the google probably give you a better result.

As i said the resources are on internet and a website named GitHub is having maximum of those resources but github will not give you the direct results.about those resources

So if i want resources related to firewall evasion so i will search """firewall evasion github"""" so this would give me every google indexed result but when i search it directly on github then give results would be different

I hope you have got a reference to start your journey as a cyber security person :)

KNOWLEDGE IS ONLY A THING THAT NO CAN STEAL FROM YOU..........SO JUST KEEP LEARNING, KEEP READING,..............FROM NOW I WILL POSTING DIFFERENT TYPES EDUCATIONAL POST AND ARTICLE SO STAY TUNED.............

 

 

PEACE :)

Comments

Popular posts from this blog

Configuring ModSecurity Web Application Firewall

ModSec is an open-source web application firewall which was designed for the apache server initially but now can be used for other different servers as well.ModSecurity is also known as ModSec and can filter HTTP requests and responses based on defined filtering rules. We will use the OWASP ModSecurity CORE RULE SET (CRS) here. We can also define our custom rules but that is a different topic.  Here is an illustration of how to configure a ModSec firewall using apache2. I have just created a simple PHP page that will be used to verify credentials. Put this page in /var/www/html/login.php Here is the page login.php: <html> <body> <?php if(isset($_POST[‘login’])) { $username = $_POST[‘username’]; $password = $_POST[‘password’]; $connection = mysqli_connect(‘localhost’,’root’,’test’,’testdb’); $result = mysqli_query($connection, “SELECT * FROM `users` WHERE username=’$username’ AND password=’$password’”); if(mysqli_num_rows($result) == 0) echo ‘Wrong Credentia

What Is Cryptography ?

  Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix "crypt-" means "hidden" or "vault" -- and the suffix "-graphy" stands for "writing."   Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication. Modern cryptography concerns itself with the following four objectives:   •  Confidentiality : the information cannot be understood by anyone for whom it was unintended •  Integrity : the information cannot be altered in storage or transit between sender and intended receiver without the alterati

How Internet Works ?

what is a protocol? A protocol is a set of rules specifying how computers should communicate with each other over a network. For example, the Transport Control Protocol has a rule that if one computer sends data to another computer, the destination computer should let the source computer know if any data was missing so the source computer can re-send it. Or the Internet Protocol which specifies how computers should route information to other computers by attaching addresses onto the data it sends.   What’s a packet? Data sent across the Internet is called a message. Before a message is sent, it is first split in many fragments called packets. These packets are sent independently of each other. The typical maximum packet size is between 1000 and 3000 characters. The Internet Protocol specifies how messages should be packetized.   What’s a packet routing network? It is a network that routes packets from a source computer to a destination computer. The Internet is made up of a massive ne