Foundations
Asset
Vulnerability
Risk
Threat
Cybersecurity Frameworks
CIA Traid
National Institute of Standard and Technology (NIST)
IASME
COBIT
CIS
ISO Cybersecurity Framework
Service Organization Control Type(SOC2)
SIEM
The Open Group Architecture Framework (TOGAF)
MITRE ATT&CK Framework
OWASP Top 10 (WebApp & API)
Career Development
Learning Resources
#1 (Omniscient)
Google.com
#2
Youtube.com
Industry Learning Content Creator
Cristizot
David Bombal
John Hammond
Neal Bridges
Heath Adams
Network Chuck
Dr.Gerald Auger
Grant Collins
Certifications/Training
Vendors
SANS
Offensive Security
INE/eLearnSecurity
TCM Security
(ISC)2
EC-Council
CompTIA
General
CompTIA Security+
(ISC)2 Certified Information Systems Security Professional (CISSP)
Pentest/Red Team
eLearnSecurity Junior Penetration Tester (eJPT)
EC-Council Certified Ethical Hacker (C|EH)
GIAC Penetration Tester (GPEN)
CompTIA Pentest+
PNPT
eLearnSecurity Certified Professional Penetration Tester (eCPPT)
Offensive Security Certified Professional (OSCP)
Blue Team
Security Blue Team Level 1 (BTL1)
eLearnSecurity Certified Incident Responder (eCIR)
eLearnSecurity Certified Threat Hunting Professional (eCTHP)
GIAC Certified Incident Handler (GCIH)
Auditing
The Certified Information Systems Auditor (CISA)
GRC/Management
CompTIA Project+
Project Management Professional (PMP)
Certified Information Security Manager (CISM)
Experience
Projects
Labs
HomeLabs
Internships
Non-profit Support
Capture the flag (CTF)
picoCTF
VulnHub
OverTheWire
Hack The Box
Try Hack Me
Bug Bounty
Bugcrowd
Hackerone
Syanck
Intrigiti
Advocacy/Awareness Trainer
College Degree
Cybersecurity
Computer Science
Information Assurance
Information Technology
Conferences
Black Hat
DEFCON
RSA Conference
THOTCON
Grayhat
Gartner's Identity and Access Management
Cryptocon
Bsides
Cyber Career Domains
Academics
Cybersecurity Instructor
Cybersecurity Trainer
Cybersecurity Speaker
Cybersecurity Awareness Trainer
Risk Assessment
Penetration Testing
Infrastructure (Network and Systems)
Social Engineering
DAST
Application Pen Tests
Risk Monitoring Services (Risk Score)
Governance
Governance, Risk Management and Compliance (GRC)
Threat Intelligence
External Threat Intelligence
Open Source Intelligence
Internal Threat Intelligence
Security Architecture
Cloud Security
Network Security
Application Security
Server Security
Infrastructure Security
Container Security
Platform Security
Workload Security
File Storage Security
Industrial Control Systems (ICSes)
Operational Technology
Security Engineering
Cryptography
Container Security
Network Design
Security Operations
Security Operation Center (SOC)
Security Information and Event Management (SIEM)
SOAR
Incident Response
Investigation
Forensics
Red Team
Blue Team
Digital Forensics
Threat Hunting
Vulnerability Management
Physical Security
IOT Security
Enterprise Management
Crisis Management
Audit
SOC1 / SOC2
ISMS
Cyber Insurance
Application Security
API Security
Security Code Analysis
Cyber Attacks
Distributed Denial of Service (DDoS)
TCP SYN Flood Attack
Smurf Attack
Teardrop Attack
Ping of Death Attack
Man-in-the-Middle
Session Hijacking
IP Spoofing
Replay
Social Engineering
Spearphishing
Business Email Compromise (BEC)
Phishing
Vishing
Drive-by Attack
Password Attack
Brute-force attack
Dictionary Attack
Cross-site Scripting Attack
SQL Injection Attack
Malware Attack
Viruses
Worms
Fileless Malware
Ransomware
Cryptominers
Botnets
Spyware
Trojans
Rootkits
Modular Malware
Eavesdropping Attack
Cyber Laws and Regulations
Health Insurance Portability and Accountability Act (HIPPA)
Consumer Privacy Protection Act
General Data Protect Regulation (GDPR)
California Consumer Privacy Act (CCPA)
Cybersecurity Information Sharing Act (CISA)
Cybersecurity Enhancement Act
Federal Exchange Data Breach Notification Act
National Cybersecurity Protection Advancement Act
Federal Information Security Management Act of 2002 (FISMA)
Cybersecurity Maturity Model Certification (CMMC)
Industry Sectors
Financial Services
Government Facilities
Defense Industrial Base
Healthcare
Energy
Nuclear reactors, materials and waste
Water and wastewater systems
Dams
Chemical
Critical Manufacturing
Manufacturing
Information Technology
Communications
Transportation Systems
Emergency Services
Commercial Facilities
Food and Agriculture
Mindmap Created By ; Abhinav Pathak https://twitter.com/i_amsphinx