Skip to content

The Cybersecurity Archive

A structured, no-nonsense knowledge base covering cybersecurity from the ground up.
Built for learners who want depth, not just surface-level overviews.


New here?

Start with 00 · Introduction and follow the modules in order.
If you already have a foundation, jump to whatever domain you're focusing on.


Table of Contents

Foundations

Module Topics
00 · Introduction CIA Triad, Threat Modeling, Zero Trust, Defense in Depth, Attacker Mindset
01 · Security Foundations OS Security, Linux, Windows, Authentication, Authorization, Identity
02 · Network Security OSI Model, TCP/IP, DNS, HTTP/S, TLS, Firewalls, VPNs, Network Attacks
03 · Cryptography Symmetric & Asymmetric Encryption, Hashing, PKI, Key Management

Attack & Defense

Module Topics
04 · Web Security XSS, SQLi, CSRF, SSRF, RCE, CORS, Auth Attacks
05 · Application Security Secure Coding, SAST, DAST, Dependency Security, Secure SDLC
06 · Offensive Security Recon, Enumeration, Exploitation, Privilege Escalation, Persistence
07 · Pentesting Web, Network, Wireless, Active Directory, Cloud Pentesting, Reporting
08 · Defensive Security Monitoring, Threat Detection, Log Analysis, Threat Hunting, Triage

Specialized Domains

Module Topics
09 · Malware Analysis Malware Types, Static & Dynamic Analysis, Reverse Engineering
10 · DFIR Disk & Memory Forensics, Evidence Collection, Incident Response
11 · Cloud Security IAM, Misconfigurations, Containers, Kubernetes, Serverless
12 · Identity & Access Passwords, MFA, SSO, OAuth, LDAP, Kerberos
13 · Endpoint Security AV, EDR, Process Monitoring, Kernel Security
14 · Mobile Security Android, iOS, APK Analysis, Mobile Pentesting
15 · Wireless Security WiFi, Bluetooth, NFC, Rogue APs
16 · IoT & Embedded Firmware Analysis, UART, JTAG, Hardware Debugging

Strategy & Operations

Module Topics
17 · Threat Intelligence IOCs, TTPs, Threat Actors, MITRE ATT&CK
18 · GRC Risk Assessment, Policies, Compliance, Auditing, Controls
19 · Privacy & Data Protection Data Classification, Privacy Engineering, Consent, Retention
20 · Security Automation Python, Bash, PowerShell, SOAR, Detection Engineering
21 · Vulnerability Research Fuzzing, Exploit Dev, Binary Exploitation, Memory Corruption
22 · Human Security Phishing, Social Engineering, Insider Threats, Awareness

Career

Module Topics
23 · Career & Industry Certifications, Labs, Bug Bounties, Research, Career Paths
24 · Resources Tools, Labs, Cheat Sheets, Glossaries, References

Suggested Learning Paths

00 Introduction → 01 Security Foundations → 02 Network Security
→ 03 Cryptography → 04 Web Security → 23 Career & Industry
00 Introduction → 02 Network Security → 04 Web Security
→ 06 Offensive Security → 07 Pentesting → 21 Vulnerability Research
00 Introduction → 01 Security Foundations → 08 Defensive Security
→ 09 Malware Analysis → 10 DFIR → 17 Threat Intelligence
00 Introduction → 02 Network Security → 11 Cloud Security
→ 12 Identity & Access → 18 GRC → 20 Security Automation
00 Introduction → 18 GRC → 19 Privacy & Data Protection
→ 17 Threat Intelligence → 23 Career & Industry

This archive is actively maintained. Contributions welcome via GitHub.