mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-10 05:34:12 +00:00
Update README.md
This commit is contained in:
parent
3bf2b4a981
commit
2378ec7e22
1 changed files with 24 additions and 13 deletions
37
README.md
37
README.md
|
@ -1,20 +1,31 @@
|
|||
# Cyber Security Resources
|
||||
[![Typing SVG](https://readme-typing-svg.herokuapp.com?font=Fira+Code&weight=600&size=31&duration=4500&pause=1000&color=164B63&multiline=true&width=453&height=100&lines=HackerRepo.org+;Cybersecurity+Resources)](https://git.io/typing-svg)
|
||||
|
||||
<center><img src="https://h4cker.org/img/h4cker2.PNG" width="200" height="300" /> </center>
|
||||
This repository is a comprehensive collection of cybersecurity-related references, scripts, tools, code, and other resources. It is carefully curated and maintained by [Omar Santos](https://omarsantos.io/).
|
||||
|
||||
This repository includes thousands of cybersecurity-related references and resources and it is maintained by [Omar Santos](https://omarsantos.io/). This GitHub repository has been created to provide supplemental material to several books, video courses, and live training created by Omar Santos and other co-authors. It provides over 10,000 references, scripts, tools, code, and other resources that help offensive and defensive security professionals learn and develop new skills. This GitHub repository provides guidance on how build your own hacking environment, learn about offensive security (ethical hacking) techniques, vulnerability research, exploit development, reverse engineering, malware analysis, threat intelligence, threat hunting, digital forensics and incident response (DFIR), includes examples of real-life penetration testing reports, and more.
|
||||
## Overview
|
||||
The repository serves as a supplemental material provider to several books, video courses, and live training created by Omar Santos. It encompasses over 10,000 references that are instrumental for both offensive and defensive security professionals in honing their skills.
|
||||
|
||||
## The Art of Hacking Series
|
||||
The [Art of Hacking Series](http://theartofhacking.org) is a series of video courses and live training that help you get up and running with your cybersecurity career. The following are the different video courses that are part of the Art of Hacking series:
|
||||
## Key Areas of Focus
|
||||
|
||||
* [Security Penetration Testing (The Art of Hacking Series)](https://www.safaribooksonline.com/library/view/security-penetration-testing/9780134833989)
|
||||
* [Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)](https://www.safaribooksonline.com/library/view/wireless-networks-iot/9780134854632/)
|
||||
* [Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series)](https://www.safaribooksonline.com/videos/enterprise-penetration-testing/9780134854779)
|
||||
* [Hacking Web Applications: Security Penetration Testing for Today's DevOps and Cloud Environments (The Art of Hacking Series)](https://www.safaribooksonline.com/videos/hacking-web-applications/9780135261422)
|
||||
- **Ethical Hacking Techniques**: Guidance on building your hacking environment, learning offensive security techniques, bug bounties, vulnerability research, and exploit development.
|
||||
|
||||
These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the [Offensive Security Certified Professional (OSCP)](https://www.offensive-security.com/information-security-certifications/), the [Certified Ethical Hacker (CEH)](https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/), [CompTIA PenTest+](https://certification.comptia.org/certifications/pentest) and any other ethical hacking certification. This course helps any cyber security professional that want to learn the skills required to becoming a professional ethical hacker or that want to learn more about general hacking methodologies and concepts.
|
||||
- **Reverse Engineering & Malware Analysis**: In-depth insights into reverse engineering and analyzing malicious software.
|
||||
|
||||
These video courses are published by Pearson, but this GitHub repository is maintained and supported by the lead author of the series [Omar Santos](https://omarsantos.io/).
|
||||
- **Threat Intelligence & Threat Hunting**: Resources for understanding, tracking, and proactively searching for potential threats.
|
||||
|
||||
- **Digital Forensics & Incident Response (DFIR)**: Real-life penetration testing reports, techniques, and tools related to digital forensics and incident response.
|
||||
|
||||
- **AI Security Research**: Exploration of artificial intelligence and machine learning in the context of cybersecurity. This includes researching potential security vulnerabilities in AI algorithms, developing robust AI models resistant to adversarial attacks, understanding AI-driven threat detection, and creating tools that leverage AI to enhance security measures, and more.
|
||||
|
||||
## How to Use
|
||||
You can clone this repository or download specific resources to deepen your understanding in the aforementioned areas. For detailed explanations and practical applications, refer to the books, video courses, and training by Omar Santos.
|
||||
|
||||
## Contributing
|
||||
If you wish to contribute, please read the [CONTRIBUTING.md](CONTRIBUTING.md) file.
|
||||
|
||||
## License
|
||||
This project is licensed under the MIT License - see the [LICENSE.md](LICENSE.md) file for details.
|
||||
|
||||
## Contact
|
||||
For any inquiries or feedback, please feel free to contact [Omar Santos](https://www.linkedin.com/in/santosomar/).
|
||||
|
||||
## Live Training
|
||||
Other Live Training and Video Courses: https://h4cker.org/training
|
||||
|
|
Loading…
Reference in a new issue