The Cybersecurity Archive
A structured, no-nonsense knowledge base covering cybersecurity from the ground up.
Built for learners who want depth, not just surface-level overviews.
New here?
Start with 00 · Introduction and follow the modules in order.
If you already have a foundation, jump to whatever domain you're focusing on.
Table of Contents
Foundations
Module
Topics
00 · Introduction
CIA Triad, Threat Modeling, Zero Trust, Defense in Depth, Attacker Mindset
01 · Security Foundations
OS Security, Linux, Windows, Authentication, Authorization, Identity
02 · Network Security
OSI Model, TCP/IP, DNS, HTTP/S, TLS, Firewalls, VPNs, Network Attacks
03 · Cryptography
Symmetric & Asymmetric Encryption, Hashing, PKI, Key Management
Attack & Defense
Module
Topics
04 · Web Security
XSS, SQLi, CSRF, SSRF, RCE, CORS, Auth Attacks
05 · Application Security
Secure Coding, SAST, DAST, Dependency Security, Secure SDLC
06 · Offensive Security
Recon, Enumeration, Exploitation, Privilege Escalation, Persistence
07 · Pentesting
Web, Network, Wireless, Active Directory, Cloud Pentesting, Reporting
08 · Defensive Security
Monitoring, Threat Detection, Log Analysis, Threat Hunting, Triage
Specialized Domains
Module
Topics
09 · Malware Analysis
Malware Types, Static & Dynamic Analysis, Reverse Engineering
10 · DFIR
Disk & Memory Forensics, Evidence Collection, Incident Response
11 · Cloud Security
IAM, Misconfigurations, Containers, Kubernetes, Serverless
12 · Identity & Access
Passwords, MFA, SSO, OAuth, LDAP, Kerberos
13 · Endpoint Security
AV, EDR, Process Monitoring, Kernel Security
14 · Mobile Security
Android, iOS, APK Analysis, Mobile Pentesting
15 · Wireless Security
WiFi, Bluetooth, NFC, Rogue APs
16 · IoT & Embedded
Firmware Analysis, UART, JTAG, Hardware Debugging
Strategy & Operations
Module
Topics
17 · Threat Intelligence
IOCs, TTPs, Threat Actors, MITRE ATT&CK
18 · GRC
Risk Assessment, Policies, Compliance, Auditing, Controls
19 · Privacy & Data Protection
Data Classification, Privacy Engineering, Consent, Retention
20 · Security Automation
Python, Bash, PowerShell, SOAR, Detection Engineering
21 · Vulnerability Research
Fuzzing, Exploit Dev, Binary Exploitation, Memory Corruption
22 · Human Security
Phishing, Social Engineering, Insider Threats, Awareness
Career
Suggested Learning Paths
This archive is actively maintained. Contributions welcome via GitHub.