Welcome to my comprehensive cybersecurity documentation repository! This living knowledge base contains hands-on learning notes, practical tutorials, and reproducible lab playbooks covering modern cybersecurity domains.
- Study Reference: Structured learning materials for cybersecurity concepts
- Lab Playbooks: Reproducible exercises and experiments
- Portfolio Projects: Demonstrable skills across security domains
- Career Preparation: Role-specific guidance for 2026+ cybersecurity landscape
| Resource | Link |
|---|---|
| π Live Documentation | ./index.html |
| π§ Navigation Sidebar | ./_sidebar.md |
| π GitHub Repository | Repository Link |
0-Linux/Linux-Lab.md- π§ Canonical Linux lab guideComputers-Networking.md- π Networking fundamentals
1-Cloud-Security/- AWS:
IAM-Security.md- π AWS Identity & Access Management - Azure:
Entra-ID-Security.md- π’ Azure Entra ID security - GCP:
IAM-Security.md- βοΈ Google Cloud IAM - Kubernetes:
K8s-Architecture.md- β΅ Container security fundamentals
- AWS:
2-Identity-Access-ZeroTrust/IAM-Fundamentals.md- ποΈ Core identity conceptsSSO-Federation.md- π Single Sign-On & federation
3-AI-Security-ML-Safety/Adversarial-ML.md- βοΈ Machine learning attacks & defensesLLM-Threats.md- π§ Large Language Model security
4-Security-Automation-And-Engineering/Automated-IR-Playbooks.md- π€ Automated incident response
5-Offensive-Security/Web-Pentesting.md- π Web application penetration testing
6-Detection-Engineering/Microsoft-Sentinel.md- π SIEM detection rulesThreat-Hunting.md- π― Proactive threat hunting
7-Vulnerability-Management/CVE-Analysis.md- π CVE analysis and vulnerability assessment
8-DevSecOps/Secure-Coding.md- π» Secure development practices
9-Data-Science-Security-Analytics/Intro-Data-Science.md- π Data science for security analytics
10-GRC-Risk-Compliance/NIST-CSF.md- ποΈ NIST Cybersecurity FrameworkISO-27001-27002.md- π ISO 27001/27002 standardsCIS-Controls.md- π‘οΈ CIS Critical Security ControlsGDPR-NIS2-DORA.md- π Privacy & regulatory frameworksRisk-Assessments.md- π Risk assessment methodologiesBusiness-Continuity.md- π Business continuity planning
11-Incident-Response-Forensics/IR-Playbooks.md- π Incident response proceduresDFIR-Tools.md- π οΈ Digital forensics tools
12-Soft-Skills-Professional/Communication-for-Security.md- π£οΈ Security communication skills
13-Job-Roles-2026+-Career/AI-Security-Engineer.md- π€ Emerging AI security rolesIR-Forensics-Specialist.md- π Incident response career path
# Install Docsify globally
npm install -g docsify-cli
# Serve documentation locally
cd docs
docsify serve .
# Access at: http://localhost:3000# From docs directory
python3 -m http.server 8000
# Access at: http://localhost:8000/index.html- Place
.mdfiles in appropriate top-level folders - Update
./_sidebar.mdto maintain navigation accuracy - Use relative links between pages (e.g.,
../11-Incident-Response-Forensics/IR-Playbooks.md)
- Clear headings and structured content
- Short theory sections followed by practical applications
- Include "Practice" or "Lab" sections with executable commands
- Use fenced code blocks for commands and configurations
- β Never embed secrets or credentials
- β Keep examples reproducible on disposable environments
- β Include references and suggested next steps
- Keep
_sidebar.mdupdated with new pages - Backup major changes (e.g.,
filename.md.bak) before rewrites - Regular review and update of external references
git commit -m "docs: add K8s RBAC lab"
git commit -m "fix: correct AWS IAM policy examples"
git commit -m "feat: new threat hunting techniques"- License: See
LICENSEfile in repository root - Issues & PRs: GitHub Issues
- Contributions: Welcome! Please follow contribution guidelines
- GitHub: @mpurushotham
- Issues: For corrections or content requests, please open an issue
- Pull Requests: Direct contributions are welcome
π Continuous Learning | π Practical Security | π Community Knowledge
Building cybersecurity expertise, one document at a time