# Road To Cybersec ## Docs - [Cryptography](https://roadtocybersec.com/advanced/cryptography.md): Encryption, hashing, digital signatures, TLS handshakes, key exchange, certificate chains, and post-quantum cryptography. - [The Cypherpunks](https://roadtocybersec.com/advanced/cypherpunks.md): How a group of digital activists transformed privacy, cryptography, and birthed innovations like BitTorrent and Bitcoin. - [Network Security](https://roadtocybersec.com/advanced/network-security.md): Firewalls, network segmentation, IDS/IPS, VPNs, Zero Trust Architecture, DNS security, and SOC operations. - [Penetration Testing](https://roadtocybersec.com/advanced/penetration-testing.md): Ethical hacking methodology, OSINT, scanning, exploitation, privilege escalation, lateral movement, reporting, and bug bounty programs. - [Secure Coding Practices](https://roadtocybersec.com/advanced/secure-coding-practices.md): Input validation, output encoding, dependency scanning, secrets management, CI/CD security, and threat modeling. - [Web Vulnerabilities](https://roadtocybersec.com/advanced/web-vulnerabilities.md): The OWASP Top 10, injection attacks, XSS, CSRF, SSRF, broken authentication, and security misconfigurations, with real exploit examples. - [Device Hygiene](https://roadtocybersec.com/essentials/device-hygiene.md): Patch management, public Wi-Fi risks, VPNs, backups, USB attack vectors, encryption, and physical security. - [Password Security & MFA](https://roadtocybersec.com/essentials/password-security.md): Password entropy, passphrases, password managers, and the full spectrum of multi-factor authentication, from SMS to passkeys. - [Safe Browsing](https://roadtocybersec.com/essentials/safe-browsing.md): Navigate the internet securely, HTTPS, DNS security, browser extensions, cookie tracking, and malvertising defense. - [Threats and Attacks](https://roadtocybersec.com/essentials/threats-and-attacks.md): How attackers operate, phishing, malware, ransomware, social engineering, and credential theft explained in depth. - [Road To Cybersec Essentials](https://roadtocybersec.com/essentials/welcome.md): Welcome to the essentials path, your practical guide to understanding and applying cybersecurity fundamentals. - [What to Do If Hacked](https://roadtocybersec.com/essentials/what-to-do-if-hacked.md): A complete incident response playbook, isolate, preserve, rotate, notify, and review. ## OpenAPI Specs - [openapi](https://roadtocybersec.com/api-reference/openapi.json) ## Optional - [GitHub](https://github.com/richard-wollyce/road-to-cybersec)