Skip to content

Mpurushotham/my-cybersecurity-journey

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

41 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

My Cybersecurity Journey β€” Documentation Hub πŸ›‘οΈ

Cybersecurity Updated License

🀝 Let’s connect and make the change.

πŸ“– Overview

Welcome to my comprehensive cybersecurity documentation repository! This living knowledge base contains hands-on learning notes, practical tutorials, and reproducible lab playbooks covering modern cybersecurity domains.

🎯 Purpose

  • Study Reference: Structured learning materials for cybersecurity concepts
  • Lab Playbooks: Reproducible exercises and experiments
  • Portfolio Projects: Demonstrable skills across security domains
  • Career Preparation: Role-specific guidance for 2026+ cybersecurity landscape

πŸš€ Quick Access

Resource Link
πŸ“š Live Documentation ./index.html
🧭 Navigation Sidebar ./_sidebar.md
πŸ™ GitHub Repository Repository Link

πŸ“š Documentation Structure

πŸ”° Foundation

  • 0-Linux/
    • Linux-Lab.md - 🐧 Canonical Linux lab guide
    • Computers-Networking.md - 🌐 Networking fundamentals

☁️ Cloud Security

  • 1-Cloud-Security/
    • AWS: IAM-Security.md - πŸ”‘ AWS Identity & Access Management
    • Azure: Entra-ID-Security.md - 🏒 Azure Entra ID security
    • GCP: IAM-Security.md - ☁️ Google Cloud IAM
    • Kubernetes: K8s-Architecture.md - β›΅ Container security fundamentals

πŸ” Identity & Zero Trust

  • 2-Identity-Access-ZeroTrust/
    • IAM-Fundamentals.md - πŸ—οΈ Core identity concepts
    • SSO-Federation.md - πŸ”— Single Sign-On & federation

πŸ€– AI Security & ML Safety

  • 3-AI-Security-ML-Safety/
    • Adversarial-ML.md - βš”οΈ Machine learning attacks & defenses
    • LLM-Threats.md - 🧠 Large Language Model security

βš™οΈ Security Automation & Engineering

  • 4-Security-Automation-And-Engineering/
    • Automated-IR-Playbooks.md - πŸ€– Automated incident response

πŸ”΄ Offensive Security

  • 5-Offensive-Security/
    • Web-Pentesting.md - 🌐 Web application penetration testing

πŸ” Detection Engineering

  • 6-Detection-Engineering/
    • Microsoft-Sentinel.md - πŸ“Š SIEM detection rules
    • Threat-Hunting.md - 🎯 Proactive threat hunting

🎯 Vulnerability Management

  • 7-Vulnerability-Management/
    • CVE-Analysis.md - πŸ“‹ CVE analysis and vulnerability assessment

πŸ› οΈ DevSecOps

  • 8-DevSecOps/
    • Secure-Coding.md - πŸ’» Secure development practices

πŸ“Š Data Science & Security Analytics

  • 9-Data-Science-Security-Analytics/
    • Intro-Data-Science.md - πŸ“ˆ Data science for security analytics

πŸ“‹ GRC, Risk & Compliance

  • 10-GRC-Risk-Compliance/
    • NIST-CSF.md - πŸ›οΈ NIST Cybersecurity Framework
    • ISO-27001-27002.md - πŸ“œ ISO 27001/27002 standards
    • CIS-Controls.md - πŸ›‘οΈ CIS Critical Security Controls
    • GDPR-NIS2-DORA.md - 🌍 Privacy & regulatory frameworks
    • Risk-Assessments.md - πŸ“Š Risk assessment methodologies
    • Business-Continuity.md - πŸ”„ Business continuity planning

🚨 Incident Response & Forensics

  • 11-Incident-Response-Forensics/
    • IR-Playbooks.md - πŸ“‹ Incident response procedures
    • DFIR-Tools.md - πŸ› οΈ Digital forensics tools

πŸ’¬ Professional Skills

  • 12-Soft-Skills-Professional/
    • Communication-for-Security.md - πŸ—£οΈ Security communication skills

πŸ’Ό Career Development

  • 13-Job-Roles-2026+-Career/
    • AI-Security-Engineer.md - πŸ€– Emerging AI security roles
    • IR-Forensics-Specialist.md - πŸ” Incident response career path

πŸ–₯️ Local Development Preview

Option 1: Docsify (Recommended) πŸ“–

# Install Docsify globally
npm install -g docsify-cli

# Serve documentation locally
cd docs
docsify serve .

# Access at: http://localhost:3000

Option 2: Python Simple Server 🐍

# From docs directory
python3 -m http.server 8000

# Access at: http://localhost:8000/index.html

🀝 Contribution Guidelines

πŸ“ Adding Content

  • Place .md files in appropriate top-level folders
  • Update ./_sidebar.md to maintain navigation accuracy
  • Use relative links between pages (e.g., ../11-Incident-Response-Forensics/IR-Playbooks.md)

✍️ Writing Standards

  • Clear headings and structured content
  • Short theory sections followed by practical applications
  • Include "Practice" or "Lab" sections with executable commands
  • Use fenced code blocks for commands and configurations

πŸ”’ Security Best Practices

  • ❌ Never embed secrets or credentials
  • βœ… Keep examples reproducible on disposable environments
  • βœ… Include references and suggested next steps

πŸ› οΈ Maintenance

πŸ”„ Synchronization

  • Keep _sidebar.md updated with new pages
  • Backup major changes (e.g., filename.md.bak) before rewrites
  • Regular review and update of external references

πŸ“‹ Commit Convention

git commit -m "docs: add K8s RBAC lab"
git commit -m "fix: correct AWS IAM policy examples"
git commit -m "feat: new threat hunting techniques"

πŸ“„ License & Support

  • License: See LICENSE file in repository root
  • Issues & PRs: GitHub Issues
  • Contributions: Welcome! Please follow contribution guidelines

πŸ“ž Contact

  • GitHub: @mpurushotham
  • Issues: For corrections or content requests, please open an issue
  • Pull Requests: Direct contributions are welcome

πŸš€ Continuous Learning | πŸ”’ Practical Security | 🌐 Community Knowledge

Building cybersecurity expertise, one document at a time

About

Welcome to my comprehensive cybersecurity documentation repository! This living knowledge base contains hands-on learning notes, practical tutorials, and reproducible lab playbooks covering modern cybersecurity domains.

Topics

Resources

License

Code of conduct

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages