1. • Introduction to cybersecurity
    1. What is Cybersecurity?
    2. CIA Triad
    3. Identification and Authentication, Authorization, and Accounting (AAA)
    4. Threat Actors
    5. Malwares
    6. Common Types of Cybersecurity Attacks
    7. Social engineering
  2. • Network
    1. Network Devices
    2. OSI Model
    3. TCP/IP
    4. Protocols
    5. IP Subnetting
    6. Network Segmentation
    7. Zero Trust Security Model
    8. Firewalls
    9. Proxies
    10. VPN
    11. Wireless Cryptographic Protocols
  3. • Operating Systems
    1. How Operating Systems Works ?
    2. Windows 7 / 10 / 11
    3. Windows Server
      1. Active Directory
    4. Linux
  4. • Web
    1. How the Web Works ?
      1. Client Server Architecture
    2. HTTP Methods
    3. HTTP Headers
    4. Cookies
    5. HTTP response status codes
  5. • Cryptographic
    1. Cryptosystem
    2. Key Exchange
    3. Encryption
      1. Symmetric Algorithms
      2. Asymmetric Algorithms
    4. Hashing
    5. Steganography
  6. • Virtualization and Cloud Computing
    1. Virtualization
    2. Cloud Workloads
    3. Service Models
    4. Deployment Models
    5. Regions and Availability Zones
    6. Virtual Private Cloud (VPC)
    7. Security Groups & Policies
  7. • Programming Language
    1. PHP
    2. Python
    3. Javascript
    4. SQL
  8. • Shell Scripting
    1. Bash
    2. Powershell
  9. • Vulnerabilities
    1. Web Vulnerabilities
      1. OWASP TOP 10
    2. Network Vulnerabilities & Attacks
    3. Zero-Day
    4. Third-Party Risks
  10. • Penetration Testing
    1. What is Penetration Testing ?
    2. Types of Penetration Testing
    3. Testing Methodology
    4. SAST & DAST
    5. Vulnerability Scans
    6. Threat Assessment
  11. • Advanced
    1. Active Directory Attacks
    2. Reverse Engineering
    3. Buffer overflow
    4. Malware analysis
  12. • Must know
    1. Cyber Kill Chain
    2. MITRE ATT&ck
  13. • Blue Team & Red Team
    1. Red Team
      1. Red Teaming Methodology
      2. Red Teaming Tools
    2. Blue Team
      1. SOC
      2. Digital Forensics
      3. SIEM / CASB
      4. Incident Response
      5. Log Management & Analysis
      6. Blue Team Tools
  14. • Regulations, Standards, and Frameworks
    1. What is a Cybersecurity Framework ?
    2. The NIST Framework
    3. CIS Benchmarks
    4. ISO 27001 and ISO 27002
    5. PCI DSS
    6. HIPAA
    7. GDPR
  15. Courses, Books and Cert Path
    1. Learning platforms
      1. LetsDefend
      2. Portswigger
      3. TryHackMe
      4. HackTheBox
    2. Youtube
      1. 13Cubed
      2. Computerphile
      3. PwnFunction
      4. LiveOverflow
      5. The Cyber Mentor
      6. HackerSploit
      7. John Hammond
      8. Free4arab
    3. Books
      1. Cybersecurity For Dummies
      2. Social Engineering: The Science of Human Hacking
      3. The Art of Invisibility
      4. Ghost In The Wires
      5. Kali Linux Hacking: A Complete Step by Step Guide by Ethem Mining
      6. The Hacker Playbook 3: Practical Guide to Penetration Testing
      7. Penetration Testing: A Hands-On Introduction to Hacking
      8. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
    4. Some of Certifications Learning Path
      1. CCNA
      2. CompTIA Network +
      3. CompTIA Security +
      4. GIAC (GISF)
      5. CISSP
      6. eJPT
      7. OSCP
  16. CompTIA Security+ SY0-601 Certification Study Guide
  17. CompTIA Network+ Study Guide: Exam N10-007