2024 04 26 path cybersecurity
Path to Cybersecurity
Cryptography - calculus and algebra for security verification
Red-teams in AI models - statistics / clustering queries. IP/geometric based access
Security Audit and Hardening- identify, analyse and improve security of Networks.
Open Source Tools usage and development- Shodan , wireshark, ghidra
Competition/ Conference: Defcon USA Capture the flag - Team based attacker and defender for software security.
Reference - krebsonsecurity blog - Digital fortress - Dan brown - Children of time series - Google Zero Day blog - Stuxnet - Air gapped computers