Command Line Basics Revisitedhttps://terokarvinen.com/2020/command-line-basics-revisited/http://etutorials.org/Linux+systems/how+linux+works/Appendix+A+Command+Classification/Practisehttps://overthewire.org/wargames/bandit/
File Management
Text Processing and Scripting
Online Documentation
Process and System Utility
Archival and Compression
Miscellaneous Utility
Development
User and group management
Shells
Shell
Network
Network topology
LAN technology
Domain
VLAN
Trunk
OSI model
Physical
Bits
ISDN
POTS
SONET
DSL
EIA/TIA
Data link
Ethernet
WIFI
WAN
HDLC
MAC 802.3,802.5
PPP,PPTP,L2TP
Network
IPv4
IPv6,IPsec
ICMP
ARP
RARP
Transport
TCP
UDP
Session
NFS
SQL
RPC
Named Pipes
NetBIOS
SAP
Presentation
MIME
XDR
SSL
ASCII/EBCDIC
JPEG
MP3
Application
HTTP(80,8080)
HTTPS(443)
TFTP(69)
FTP(20,21)
IMAP(143)
SMTP(25)
POP(110)
SSH(22)
TELNET(23)
DNS(53)
DHCP(67,68)
VPN
Hardware
Hub
Routers
Switches
Front end
W3school
HTML
CSS
JavaScript
Ajax
Bootstrap
Frameworks
jQuery
React
Vue
Angular
Back end
Language
PHP
ThinkPHP
Laravel
Laminas
Python
Django
Web2Py
Flask
Java
Spring
Hibernate
Google web toolkit
Middleware /Container
IIS
Apache
Nginx
Tomcat
CMS
Database
SQL
https://sqlzoo.net/wiki/SQL_Tutorial
RDBMS
Oracle Database
MySQL
Microsoft SQL Server
SQLite
MariaDB
PostgreSQL
SWD4TF003 Data Management and Databases
Website
Enviroment
Xmapp
WAMP
MAMP
Bitnami
PhpMyAdmin
Github
JWT
LocalStorage
Dynamic web pages
CGI/FastCGI
ASP/ASPX/JSP
Session/Cookie
CMS Software
WordPress
Joomla
Discuz
Dedecms
Cyber security Standards and Specifications
Framework
Cyber Kill Chain
PTES
ATT&CK
Laws and regulations
CVE
CVEtrends
Mitre
Nitter
Hacker news
OWASP TOP10
CIA
Cybersecurity Industry Classification
Network security (Hardware)
Web security (Application/backend security)
Wireless security
Mobile security
Desktop security
Industry security
Cloud security
Jobs
Security service engineer
Security operation and maintenance engineer
Safety R&D Engineer
Code Audit Engineer
Blue team
Penetration Test Engineer
Security attack and defense Engineer
Red team
Cloud security Engineer
....
Encryption, Encode
Encryption
Symmetric encryption: DES/AES/RC4
Asymmetric encryption: RSA/DH/ECC
Encode
Base64
Base58
Hash
MD5
SHA1
SHA256
Public Key Infrastructure(PKI)
Lab consturction
OWASP BWA
PentesterLab
Kali Linux
Windows
Metasploitable
Reconnaissance
search engine
ZoomEye
Shodan
Google Hacking
Whois
VirusTotal
Nmap(Zenmap)
Dirbuster
OpenVAS
Whatweb
httprint
Vulnerability Scan
BurpSuite
AWVS
OWASP ZAP
Appscan
WPscan-Joomscan
Virtual machine
Install Debian on Virtualboxhttps://terokarvinen.com/2021/install-debian-on-virtualbox/