2024 04 26 path cybersecurity

Path to Cybersecurity

Cryptography - calculus and algebra for security verification

Red-teams in AI models - statistics / clustering queries. IP/geometric based access

Security Audit and Hardening- identify, analyse and improve security of Networks.

Open Source Tools usage and development- Shodan , wireshark, ghidra

Competition/ Conference: Defcon USA Capture the flag - Team based attacker and defender for software security.

Reference - krebsonsecurity blog - Digital fortress - Dan brown - Children of time series - Google Zero Day blog - Stuxnet - Air gapped computers