mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-24 20:03:02 +00:00
Adding resources
This commit is contained in:
parent
26db30d444
commit
e8cc36580a
1 changed files with 72 additions and 0 deletions
72
foundational_cybersecurity_concepts/README.md
Normal file
72
foundational_cybersecurity_concepts/README.md
Normal file
|
@ -0,0 +1,72 @@
|
||||||
|
## Foundational Cybersecurity Resources
|
||||||
|
|
||||||
|
This section provides a curated list of resources that delve into foundational cybersecurity concepts, frequently explored in my O'Reilly training sessions and other educational offerings.
|
||||||
|
|
||||||
|
## Reading List
|
||||||
|
|
||||||
|
Despite the rapidly evolving landscape of AI and technology, these books offer a comprehensive roadmap for understanding the intersection of these technologies with cybersecurity:
|
||||||
|
|
||||||
|
- **Developing Cybersecurity Programs and Policies in an AI-Driven World**
|
||||||
|
Explore strategies for creating robust cybersecurity frameworks in an AI-centric environment.
|
||||||
|
- [Available on O'Reilly](https://learning.oreilly.com/library/view/developing-cybersecurity-programs/9780138073992)*
|
||||||
|
|
||||||
|
- **Beyond the Algorithm: AI, Security, Privacy, and Ethics**
|
||||||
|
Gain insights into the ethical and security challenges posed by AI technologies.
|
||||||
|
- [Available on O'Reilly](https://learning.oreilly.com/library/view/beyond-the-algorithm/9780138268442)*
|
||||||
|
|
||||||
|
- **The AI Revolution in Networking, Cybersecurity, and Emerging Technologies**
|
||||||
|
Understand how AI is transforming networking and cybersecurity landscapes.
|
||||||
|
- [Available on O'Reilly](https://learning.oreilly.com/library/view/the-ai-revolution/9780138293703)*
|
||||||
|
|
||||||
|
## Video Courses
|
||||||
|
|
||||||
|
Enhance your practical skills with these video courses designed to deepen your understanding of cybersecurity:
|
||||||
|
|
||||||
|
- **Building the Ultimate Cybersecurity Lab and Cyber Range (video)**
|
||||||
|
- [Available on O'Reilly](https://learning.oreilly.com/course/building-the-ultimate/9780138319090/)
|
||||||
|
|
||||||
|
- **Practical Cybersecurity Fundamentals**
|
||||||
|
A comprehensive video course covering essential cybersecurity principles.
|
||||||
|
- [Available on O'Reilly](https://learning.oreilly.com/course/practical-cybersecurity-fundamentals/9780138037550/)
|
||||||
|
|
||||||
|
- **The Art of Hacking**
|
||||||
|
A series of video courses offering over 26 hours of training in ethical hacking and penetration testing techniques. Ideal for those preparing for certifications like OSCP or CEH.
|
||||||
|
- [Visit The Art of Hacking](https://theartofhacking.org)
|
||||||
|
|
||||||
|
|
||||||
|
## **Certification Related**
|
||||||
|
- **CompTIA PenTest+ PT0-002 Cert Guide, 2nd Edition**
|
||||||
|
- [Available on O'Reilly](https://learning.oreilly.com/library/view/comptia-pentest-pt0-002/9780137566204/)
|
||||||
|
|
||||||
|
- **Certified in Cybersecurity - CC (ISC)²**
|
||||||
|
- [Available on O'Reilly](https://learning.oreilly.com/course/certified-in-cybersecurity/9780138230364/)
|
||||||
|
|
||||||
|
- **CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, 2nd Edition**
|
||||||
|
- [Available on O'Reilly](https://learning.oreilly.com/library/view/ccnp-and-ccie/9780138221287/)
|
||||||
|
|
||||||
|
- **CEH Certified Ethical Hacker Cert Guide**
|
||||||
|
- [Available on O'Reilly](https://learning.oreilly.com/library/view/ceh-certified-ethical/9780137489930/)
|
||||||
|
|
||||||
|
|
||||||
|
## Additional Resources
|
||||||
|
|
||||||
|
- **Hacking Scenarios (Labs) in O'Reilly**: No need to install any software in your system. Cloud based labs.
|
||||||
|
- https://hackingscenarios.com
|
||||||
|
|
||||||
|
- **My Personal Blog**: Stay updated with my latest thoughts and insights on cybersecurity trends and techniques.
|
||||||
|
- [Visit Blog](https://becomingahacker.org)
|
||||||
|
|
||||||
|
- **My Cisco Blog**:
|
||||||
|
- [Access Blog](https://blogs.cisco.com/author/omarsantos)
|
||||||
|
|
||||||
|
- **GitHub Repository**: Access a wealth of resources and tools for hackers and cybersecurity enthusiasts.
|
||||||
|
- [Visit GitHub Repo](https://hackerrepo.org)
|
||||||
|
|
||||||
|
- **WebSploit Labs**: Engage with interactive labs to practice and refine your hacking skills.
|
||||||
|
- [Visit WebSploit Labs](https://hackerrepo.org)
|
||||||
|
|
||||||
|
- **NetAcad Ethical Hacker Free Course**
|
||||||
|
- [Available (free) on NetAcad Skills for All](https://www.netacad.com/courses/ethical-hacker?courseLang=en-US)
|
||||||
|
|
||||||
|
These resources are designed to provide a solid foundation in cybersecurity concepts while also exploring the implications of emerging technologies like AI.
|
||||||
|
|
Loading…
Reference in a new issue