Welcome to the Cyber Security 101 section — your next step after completing the Pre-Security fundamentals. This part of the learning path focuses on more hands-on concepts and real-world security practices, preparing you for both offensive and defensive roles in the field.

It builds on the basics and begins to introduce tooling, exploitation techniques, and practical mitigation strategies.


📌 Included Sections

This section covers the following areas:

[Command Line](https://rounded-memory-9fd.notion.site/Command-Line-217fed7f10d680b0a419f6209d730bbc)

– Learn essential shell commands and CLI workflows used in system interaction and scripting.

[Networking Basics](https://rounded-memory-9fd.notion.site/Networking-Basics-217fed7f10d680f685d4c8adb6197a0b)

– Dive deeper into protocols, tools like ping, traceroute, and how data travels across layers.

[Cryptography](https://rounded-memory-9fd.notion.site/Cryptography-217fed7f10d680dab12bd6853abbf721)

– Understand encryption, hashing, symmetric/asymmetric algorithms, and historical ciphers.

[Exploitation Basics](https://rounded-memory-9fd.notion.site/Exploitation-Basics-217fed7f10d680f4b601eb19c0655c71)

– Explore common vulnerabilities (e.g., RCE, XSS) and how attackers abuse systems.

[Web Hacking Basics](https://rounded-memory-9fd.notion.site/Web-Hacking-Basics-217fed7f10d68059bcd0f17f02b94814)

– Get familiar with web-based attack vectors such as HTML injection and sensitive data exposure.

[Offensive Security Tooling](https://rounded-memory-9fd.notion.site/Offensive-Security-Tooling-217fed7f10d68007ab29ca17418e5afb)

– Introduces tools like Nmap, Burp Suite, Metasploit, and Python web servers.

[Defensive Security](https://rounded-memory-9fd.notion.site/Defensive-Security-217fed7f10d680689539ecd93ea0d5c0)

– Covers security monitoring, detection, and response strategies.

[Security Solutions](https://rounded-memory-9fd.notion.site/Security-Solutions-217fed7f10d680b69602ca54d40fcb12)

– Learn about firewalls, VPNs, port forwarding, and traffic control.

[Defensive Security Tooling](https://rounded-memory-9fd.notion.site/Defensive-Security-Tooling-217fed7f10d680498d94d6b9b50e78b7)

– Explore IDS, log management, and practical use of Linux-based defensive tools.


🖥️ About Linux & Windows Fundamentals

The topics Linux Fundamentals and Windows Fundamentals are also part of the "Cyber Security 101" track. However, since they are already covered in the Pre-Security section, they are not duplicated here to keep content clear and concise.

If you haven't already reviewed them, please do so in the Pre-Security section before continuing.