SlideShare a Scribd company logo
1 of 31
Download to read offline
Sanjeev Jaiswal (jassi)
Cybersecurity
Roadmap for
Beginners
This way please
1
• 12+ years of Experience 

• Application Security and 

• Cloud Security

• Programming: Perl, Python

• Areas of Interest: Learning and
teaching concepts on DevSecOps,
Cloud Security Automation
Sanjeev Jaiswal (jassi)
2
flexmind.co
What we will cover
• For whom this session is (awareness session)


• What is Cybersecurity


• Common Skill Sets


• What covers under cybersecurity umbrella


• Job pro
fi
le categories


• Certi
fi
cations


• Books


• Online Courses


• What’s Next
3
flexmind.co
Key Audience
• College Students


• Freshers (0-2 years)


• Want to switch into Cybersecurity


• Interested in Cybersecurity


• Curious what’s there in Cybersecurity
4
What is Cybersecurity
Computer security, cybersecurity, or information technology security is the
protection of computer systems and networks from information disclosure, theft
of or damage to their hardware, software, or electronic data, as well as from the
disruption or misdirection of the services they provide.

- Wikipedia

In short, Cybersecurity is the practice of protecting(defensive) critical systems
and sensitive information from digital attacks (o
ff
ensive).

5
6
Common
Skill Sets
7
• Attitude to deep dive

• Never give up

• Understanding of various security
concepts

• Attention to detail

• Adaptive in nature
Hacker Mindset
8
• Email

• Communication Skills

• Negotiation skills

• Public speaking

• Fill with the knowledge not ego
Soft Skills
9
• Linux OS Basics

• File structure and common places
like /usr/bin /tmp /opt

• Linux Commands

• Basic admin commands
Linux Basics
10
• TCP/IP stack

• IPv4 and IPv6

• IP ranges

• Common ports 

• SSL/TLS

• LAN/WAN

• Wireless networks

• How browser serves when you type
fl
exmind.co
Computer Network Basics
11
• Any scripting language understandings

• Comfortable with command line 

• Understand, debug and run

• Python or Go will give you wings to
fl
y

• Understanding JavaScript is important for
Pentest
Programming Basics
12
• Save all your work at one place

• Easy to collaborate with others

• Keep track of your code, docs…

• Backup and lot more

• github, gitlab, bitbucket
Version Control (git)
13
Cybersecurity
Umbrella
14
Web Security/ Penetration Testing
15
• Understand how di
ff
erent web services work


• Understand request and response (security) headers


• Understand authentication and authorization


• Cookies, tokens, HSTS, httpOnly


• SOP
, CORS, CSP


• OWASP Top 10 (Testing Guide, Code review guide)


• Understand various available encoding i.e. base64


• Comfortable with Burpsuite/OWASP Zap
Application Security
16
• Threat Modeling


• Secure Code design and principles


• Secure Code Review


• Secure-SDL


• Help developers through secure code training


• SAST/DAST


• API security


• git is your friend
Network Security
17
• Secure network architecture


• Firewalls


• Encryption solutions


• Networking commands


• Good with nmap and wireshark tools


• Know IDS/IPS


• DDos prevention


• Aware of CDN implementations
Cloud Security
18
• Cloud Computing fundamentals


• Security con
fi
guration


• Cloud Networking


• Serverless Architecture


• Secure API management


• Data Security


• Encryption at rest, in transit


• Logging and Monitoring
DevSecOps
19
• Think everything as a Code (Ansible, Terraform)


• You understand DevOps culture


• People, Process and Technology


• Embrace Security Automation


• Comfortable with VCS i.e. git


• Understand CI/CD well


• Well-versed with CI tools i.e. cirlceCI, Travis, Gitlab CI


• Know programming (Python, Ruby, Go)
• AI/ML Security

• Hardware Security

• System Security

• IoT Security

• Compliance, Risk and Audit

• Data Privacy
Many more
20
flexmind.co
Job Profile Categories
• Penetration Testers


• Bug Bounty Hunters


• Information Security Analyst


• Application Security Engineer


• Cloud Security Engineer


• DevSecOps


• Data Privacy O
ffi
cer (DPO)


• Risk Analyst


• Malware Analyst


• Security Program Manager


• What not?
21
22
flexmind.co
Books
✴ The Cyber E
ff
ect


✴ Schneier on Security


✴ Cybersecurity for Dummies


✴ Secure By Design


✴ Security Engineering


✴ Thinking Security


✴ The art of invisibility by Kevin Mitnick


✴ Ghost in the wires by Kevin Mitnick
23
flexmind.co 24
flexmind.co
Certifications
25
• CompTIA


• EC-council


• ISC2


• CSA


• ISACA


• SANS


• O
ff
ensive Security


• Cisco/Checkpoint/Juniper


• Practical-DevSecOps


• Elearn Security
26
flexmind.co
Online Courses
• Coursera


• Udacity


• EdX


• Acloud.guru


• Cybrary


• OpensecurityTraining


• Securitytube


• YouTube


• Flexmind
27
flexmind.co
Networking is the key
• Null chapter


• OWASP Chapter


• Bsides Chapter


• join mailing list i.e. null google group


• Attend International events i.e. Defcon,
Blackhat, Nullcon, OWASP Seasides


• jobs.null.co.in for job search


• Meet like minded people i.e. local meetup


• Linkedin contacts, groups


• Follow people in twitter


• Bookmark few security websites
28
flexmind.co 29
Never Give Up
My Social Channels
30
linkedin.com/in/jassics
twitter.com/jassics
github.com/jassics
sanjeevjaiswal.com
flexmind.co 31
For further queries, please feel free to contact us at learning@flexmind.co

More Related Content

What's hot

Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?Cigital
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Edureka!
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2Scott Sutherland
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing RomSoft SRL
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2MLG College of Learning, Inc
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsRahul Neel Mani
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 

What's hot (20)

Wi-FI Hacking
Wi-FI Hacking Wi-FI Hacking
Wi-FI Hacking
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
Security policy
Security policySecurity policy
Security policy
 
information security management
information security managementinformation security management
information security management
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 

Similar to Cybersecurity Roadmap for Beginners

Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 
Application Security within Agile
Application Security within AgileApplication Security within Agile
Application Security within AgileNetlight Consulting
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
ShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdfShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdfSteven Carlson
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security fieldAhmed Musaad
 
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOpsTechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOpsDicodingEvent
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification coursechandrashekar965278
 
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Ruby Meditation
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009Security Ninja
 
IT security for all. Bootcamp slides
IT security for all. Bootcamp slidesIT security for all. Bootcamp slides
IT security for all. Bootcamp slidesWallarm
 
Why defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillWhy defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillOllie Whitehouse
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5FRSecure
 
[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...
[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...
[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...PROIDEA
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017FRSecure
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud ComputingKeet Sugathadasa
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?Precisely
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingRavi Sankar
 

Similar to Cybersecurity Roadmap for Beginners (20)

Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
Application Security within Agile
Application Security within AgileApplication Security within Agile
Application Security within Agile
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Jcv course contents
Jcv course contentsJcv course contents
Jcv course contents
 
ShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdfShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdf
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security field
 
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOpsTechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009
 
IT security for all. Bootcamp slides
IT security for all. Bootcamp slidesIT security for all. Bootcamp slides
IT security for all. Bootcamp slides
 
Why defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillWhy defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skill
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...
[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...
[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
How to build career in infosec
How to build career in infosecHow to build career in infosec
How to build career in infosec
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 

Recently uploaded

<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...gynedubai
 
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一ozave
 
Kannada Call Girls Mira Bhayandar WhatsApp +91-9930687706, Best Service
Kannada Call Girls Mira Bhayandar WhatsApp +91-9930687706, Best ServiceKannada Call Girls Mira Bhayandar WhatsApp +91-9930687706, Best Service
Kannada Call Girls Mira Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Juli Boned
 
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime MysoreMysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysoremeghakumariji156
 
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证eqaqen
 
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证eqaqen
 
Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........deejay178
 
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Complete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul WarshauerComplete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul WarshauerPaul Warshauer
 
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfMiletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfGabrielaMiletti
 
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
K Venkat Naveen Kumar | GCP Data Engineer | CV
K Venkat Naveen Kumar | GCP Data Engineer | CVK Venkat Naveen Kumar | GCP Data Engineer | CV
K Venkat Naveen Kumar | GCP Data Engineer | CVK VENKAT NAVEEN KUMAR
 
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...gajnagarg
 
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfUXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfDan Berlin
 

Recently uploaded (20)

<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
 
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一
 
Kannada Call Girls Mira Bhayandar WhatsApp +91-9930687706, Best Service
Kannada Call Girls Mira Bhayandar WhatsApp +91-9930687706, Best ServiceKannada Call Girls Mira Bhayandar WhatsApp +91-9930687706, Best Service
Kannada Call Girls Mira Bhayandar WhatsApp +91-9930687706, Best Service
 
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
 
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
 
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime MysoreMysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
 
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
 
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
 
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
 
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
 
Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........
 
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
 
Complete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul WarshauerComplete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul Warshauer
 
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfMiletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
 
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
 
K Venkat Naveen Kumar | GCP Data Engineer | CV
K Venkat Naveen Kumar | GCP Data Engineer | CVK Venkat Naveen Kumar | GCP Data Engineer | CV
K Venkat Naveen Kumar | GCP Data Engineer | CV
 
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
 
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
 
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
 
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfUXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
 

Cybersecurity Roadmap for Beginners

  • 1. Sanjeev Jaiswal (jassi) Cybersecurity Roadmap for Beginners This way please 1
  • 2. • 12+ years of Experience • Application Security and • Cloud Security • Programming: Perl, Python • Areas of Interest: Learning and teaching concepts on DevSecOps, Cloud Security Automation Sanjeev Jaiswal (jassi) 2
  • 3. flexmind.co What we will cover • For whom this session is (awareness session) • What is Cybersecurity • Common Skill Sets • What covers under cybersecurity umbrella • Job pro fi le categories • Certi fi cations • Books • Online Courses • What’s Next 3
  • 4. flexmind.co Key Audience • College Students • Freshers (0-2 years) • Want to switch into Cybersecurity • Interested in Cybersecurity • Curious what’s there in Cybersecurity 4
  • 5. What is Cybersecurity Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. - Wikipedia In short, Cybersecurity is the practice of protecting(defensive) critical systems and sensitive information from digital attacks (o ff ensive). 5
  • 6. 6
  • 8. • Attitude to deep dive • Never give up • Understanding of various security concepts • Attention to detail • Adaptive in nature Hacker Mindset 8
  • 9. • Email • Communication Skills • Negotiation skills • Public speaking • Fill with the knowledge not ego Soft Skills 9
  • 10. • Linux OS Basics • File structure and common places like /usr/bin /tmp /opt • Linux Commands • Basic admin commands Linux Basics 10
  • 11. • TCP/IP stack • IPv4 and IPv6 • IP ranges • Common ports • SSL/TLS • LAN/WAN • Wireless networks • How browser serves when you type fl exmind.co Computer Network Basics 11
  • 12. • Any scripting language understandings • Comfortable with command line • Understand, debug and run • Python or Go will give you wings to fl y • Understanding JavaScript is important for Pentest Programming Basics 12
  • 13. • Save all your work at one place • Easy to collaborate with others • Keep track of your code, docs… • Backup and lot more • github, gitlab, bitbucket Version Control (git) 13
  • 15. Web Security/ Penetration Testing 15 • Understand how di ff erent web services work • Understand request and response (security) headers • Understand authentication and authorization • Cookies, tokens, HSTS, httpOnly • SOP , CORS, CSP • OWASP Top 10 (Testing Guide, Code review guide) • Understand various available encoding i.e. base64 • Comfortable with Burpsuite/OWASP Zap
  • 16. Application Security 16 • Threat Modeling • Secure Code design and principles • Secure Code Review • Secure-SDL • Help developers through secure code training • SAST/DAST • API security • git is your friend
  • 17. Network Security 17 • Secure network architecture • Firewalls • Encryption solutions • Networking commands • Good with nmap and wireshark tools • Know IDS/IPS • DDos prevention • Aware of CDN implementations
  • 18. Cloud Security 18 • Cloud Computing fundamentals • Security con fi guration • Cloud Networking • Serverless Architecture • Secure API management • Data Security • Encryption at rest, in transit • Logging and Monitoring
  • 19. DevSecOps 19 • Think everything as a Code (Ansible, Terraform) • You understand DevOps culture • People, Process and Technology • Embrace Security Automation • Comfortable with VCS i.e. git • Understand CI/CD well • Well-versed with CI tools i.e. cirlceCI, Travis, Gitlab CI • Know programming (Python, Ruby, Go)
  • 20. • AI/ML Security • Hardware Security • System Security • IoT Security • Compliance, Risk and Audit • Data Privacy Many more 20
  • 21. flexmind.co Job Profile Categories • Penetration Testers • Bug Bounty Hunters • Information Security Analyst • Application Security Engineer • Cloud Security Engineer • DevSecOps • Data Privacy O ffi cer (DPO) • Risk Analyst • Malware Analyst • Security Program Manager • What not? 21
  • 22. 22
  • 23. flexmind.co Books ✴ The Cyber E ff ect ✴ Schneier on Security ✴ Cybersecurity for Dummies ✴ Secure By Design ✴ Security Engineering ✴ Thinking Security ✴ The art of invisibility by Kevin Mitnick ✴ Ghost in the wires by Kevin Mitnick 23
  • 25. flexmind.co Certifications 25 • CompTIA • EC-council • ISC2 • CSA • ISACA • SANS • O ff ensive Security • Cisco/Checkpoint/Juniper • Practical-DevSecOps • Elearn Security
  • 26. 26
  • 27. flexmind.co Online Courses • Coursera • Udacity • EdX • Acloud.guru • Cybrary • OpensecurityTraining • Securitytube • YouTube • Flexmind 27
  • 28. flexmind.co Networking is the key • Null chapter • OWASP Chapter • Bsides Chapter • join mailing list i.e. null google group • Attend International events i.e. Defcon, Blackhat, Nullcon, OWASP Seasides • jobs.null.co.in for job search • Meet like minded people i.e. local meetup • Linkedin contacts, groups • Follow people in twitter • Bookmark few security websites 28
  • 31. flexmind.co 31 For further queries, please feel free to contact us at learning@flexmind.co