.. | ||
cyber_laws.md | ||
README.md | ||
social_eng_countermeasures.md | ||
Undertanding Information Security Controls.md |
Foundational Cybersecurity Resources
This section provides a curated list of resources that delve into foundational cybersecurity concepts, frequently explored in my O'Reilly training sessions and other educational offerings.
Live Training
Upcoming Live Cybersecurity and AI Training in O'Reilly: Register before it is too late (free with O'Reilly Subscription)
Reading List
Despite the rapidly evolving landscape of AI and technology, these books offer a comprehensive roadmap for understanding the intersection of these technologies with cybersecurity:
-
Developing Cybersecurity Programs and Policies in an AI-Driven World
Explore strategies for creating robust cybersecurity frameworks in an AI-centric environment. -
Beyond the Algorithm: AI, Security, Privacy, and Ethics
Gain insights into the ethical and security challenges posed by AI technologies. -
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
Understand how AI is transforming networking and cybersecurity landscapes.
Video Courses
Enhance your practical skills with these video courses designed to deepen your understanding of cybersecurity:
- Building the Ultimate Cybersecurity Lab and Cyber Range (video)
- AI-Enabled Programming, Networking, and Cybersecurity
- Learn to use AI for cybersecurity, networking, and programming tasks.
- Use examples of practical, hands-on activities and demos that emphasize real-world tasks.
- Implement AI tools as a programmer, developer, networking, or security professional.
- Available on O'Reilly
- Securing Generative AI
- Explore security for deploying and developing AI applications, RAG, agents, and other AI implementations
- Learn hands-on with practical skills of real-life AI and machine learning cases
- Incorporate security at every stage of AI development, deployment, and operation
- Available on O'Reilly
- Practical Cybersecurity Fundamentals
A comprehensive video course covering essential cybersecurity principles.
- The Art of Hacking
A series of video courses offering over 26 hours of training in ethical hacking and penetration testing techniques. Ideal for those preparing for certifications like OSCP or CEH.
Certification Related
- Certified Ethical Hacker (CEH), Latest Edition
- Very comprehensive! Over 19 hours! Available on O'Reilly
- CompTIA PenTest+ PT0-002 Cert Guide, 2nd Edition
- Certified in Cybersecurity - CC (ISC)²
- CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, 2nd Edition
- CEH Certified Ethical Hacker Cert Guide
Additional Resources
-
Hacking Scenarios (Labs) in O'Reilly: No need to install any software in your system. Cloud based labs.
-
My Personal Blog: Stay updated with my latest thoughts and insights on cybersecurity trends and techniques.
-
My Cisco Blog:
-
GitHub Repository: Access a wealth of resources and tools for hackers and cybersecurity enthusiasts.
-
WebSploit Labs: Engage with interactive labs to practice and refine your hacking skills.
-
NetAcad Ethical Hacker Free Course
These resources are designed to provide a solid foundation in cybersecurity concepts while also exploring the implications of emerging technologies like AI.