Cybersecurity and Information Security

  1. Offensive Security and Threat Intelligence
    1. Penetration Testing
      1. Penetration Testing Methodology
        1. Pre-engagement Activities
          1. Scoping
            1. Rules of Engagement
            2. Information Gathering
              1. Passive Reconnaissance
                1. Active Reconnaissance
                  1. Open Source Intelligence
                  2. Vulnerability Assessment
                    1. Network Scanning
                      1. Service Enumeration
                        1. Vulnerability Analysis
                        2. Exploitation
                          1. Exploit Selection
                            1. Exploit Execution
                              1. Post-Exploitation
                              2. Reporting
                                1. Executive Summary
                                  1. Technical Findings
                                    1. Remediation Recommendations
                                  2. Penetration Testing Types
                                    1. Network Penetration Testing
                                      1. Web Application Penetration Testing
                                        1. Wireless Penetration Testing
                                          1. Social Engineering Testing
                                            1. Physical Penetration Testing
                                            2. Penetration Testing Tools
                                              1. Reconnaissance Tools
                                                1. Scanning Tools
                                                  1. Exploitation Frameworks
                                                    1. Post-Exploitation Tools
                                                  2. Red Team Operations
                                                    1. Red Team Methodology
                                                      1. Threat Emulation
                                                        1. Adversary Simulation
                                                          1. Campaign Planning
                                                          2. Red Team Techniques
                                                            1. Initial Access
                                                              1. Persistence
                                                                1. Privilege Escalation
                                                                  1. Defense Evasion
                                                                    1. Lateral Movement
                                                                    2. Red Team Tools and Tactics
                                                                      1. Command and Control
                                                                        1. Exfiltration Techniques
                                                                          1. Impact Operations
                                                                        2. Threat Intelligence
                                                                          1. Threat Intelligence Fundamentals
                                                                            1. Intelligence Cycle
                                                                              1. Intelligence Requirements
                                                                                1. Intelligence Sources
                                                                                2. Threat Intelligence Types
                                                                                  1. Strategic Intelligence
                                                                                    1. Tactical Intelligence
                                                                                      1. Operational Intelligence
                                                                                        1. Technical Intelligence
                                                                                        2. Indicators of Compromise
                                                                                          1. File Hashes
                                                                                            1. IP Addresses
                                                                                              1. Domain Names
                                                                                                1. Network Signatures
                                                                                                2. Threat Intelligence Platforms
                                                                                                  1. Intelligence Feeds
                                                                                                    1. Intelligence Sharing
                                                                                                      1. Intelligence Analysis
                                                                                                      2. MITRE ATT&CK Framework
                                                                                                        1. Tactics and Techniques
                                                                                                          1. Adversary Emulation
                                                                                                            1. Detection Engineering