Welcome to the Cyber Security 101 section — your next step after completing the Pre-Security fundamentals. This part of the learning path focuses on more hands-on concepts and real-world security practices, preparing you for both offensive and defensive roles in the field.
It builds on the basics and begins to introduce tooling, exploitation techniques, and practical mitigation strategies.
This section covers the following areas:
[Command Line](https://rounded-memory-9fd.notion.site/Command-Line-217fed7f10d680b0a419f6209d730bbc)
– Learn essential shell commands and CLI workflows used in system interaction and scripting.
[Networking Basics](https://rounded-memory-9fd.notion.site/Networking-Basics-217fed7f10d680f685d4c8adb6197a0b)
– Dive deeper into protocols, tools like ping, traceroute, and how data travels across layers.
[Cryptography](https://rounded-memory-9fd.notion.site/Cryptography-217fed7f10d680dab12bd6853abbf721)
– Understand encryption, hashing, symmetric/asymmetric algorithms, and historical ciphers.
[Exploitation Basics](https://rounded-memory-9fd.notion.site/Exploitation-Basics-217fed7f10d680f4b601eb19c0655c71)
– Explore common vulnerabilities (e.g., RCE, XSS) and how attackers abuse systems.
[Web Hacking Basics](https://rounded-memory-9fd.notion.site/Web-Hacking-Basics-217fed7f10d68059bcd0f17f02b94814)
– Get familiar with web-based attack vectors such as HTML injection and sensitive data exposure.
[Offensive Security Tooling](https://rounded-memory-9fd.notion.site/Offensive-Security-Tooling-217fed7f10d68007ab29ca17418e5afb)
– Introduces tools like Nmap, Burp Suite, Metasploit, and Python web servers.
[Defensive Security](https://rounded-memory-9fd.notion.site/Defensive-Security-217fed7f10d680689539ecd93ea0d5c0)
– Covers security monitoring, detection, and response strategies.
[Security Solutions](https://rounded-memory-9fd.notion.site/Security-Solutions-217fed7f10d680b69602ca54d40fcb12)
– Learn about firewalls, VPNs, port forwarding, and traffic control.
[Defensive Security Tooling](https://rounded-memory-9fd.notion.site/Defensive-Security-Tooling-217fed7f10d680498d94d6b9b50e78b7)
– Explore IDS, log management, and practical use of Linux-based defensive tools.
The topics Linux Fundamentals and Windows Fundamentals are also part of the "Cyber Security 101" track. However, since they are already covered in the Pre-Security section, they are not duplicated here to keep content clear and concise.
If you haven't already reviewed them, please do so in the Pre-Security section before continuing.