- https://www.sanfoundry.com/database-questions-and-answers-encryption-and-its-applications/
- https://vssut.ac.in/lecture_notes/lecture1428550736.pdf
- https://www.encryptionconsulting.com/education-center/what-is-key-management/
- https://www.sciencedirect.com/topics/computer-science/symmetric-key-algorithm
- https://www.netscout.com/what-is-ddos/http-flood-attacks
- https://cloudsecurityalliance.org/blog/2021/06/04/7-simple-but-effective-tactics-to-protect-your-website-against-ddos-attacks-in-2021/
- https://www.extrahop.com/company/blog/2018/ddos-protection/
- https://www.imperva.com/learn/application-security/phishing-attack-scam/#:~:text=What%20is%20a%20phishing%20attack,instant%20message%2C%20or%20text%20message.
- https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/
- https://www.fortinet.com/resources/cyberglossary/types-of-cyber-attacks
- https://aws.amazon.com/shield/ddos-attack-protection/
- https://www.extrahop.com/company/blog/2018/ddos-protection/
- https://www.techtarget.com/searchsecurity/feature/Best-practices-to-secure-data-at-rest-in-use-and-in-motion
- What is the CIA Triad? Definition, Explanation, Examples - TechTarget
- https://www.sciencedirect.com/topics/computer-science/tor-browser
- https://portswigger.net/web-security/cross-site-scripting
- https://www.cryptomathic.com/news-events/blog/symmetric-key-encryption-why-where-and-how-its-used-in-banking
- IBM cybersecurity Practitioner course: https://keyskill-clms.comprehend.ibm.com/
- https://www.avg.com/en/signal/wep-wpa-or-wpa2#:~:text=WEP%20vs%20WPA%20vs%20WPA2&text=WPA2%20uses%20a%20dynamic%20network,take%20the%20longest%20to%20crack.
- https://www.splunk.com/en_us/blog/learn/vulnerability-vs-threat-vs-risk.html#:~:text=Vulnerability%20vs%20threat%20vs%20risk&text=First%2C%20a%20vulnerability%20exposes%20your,when%20the%20threat%20does%20occur.
- https://www.sealpath.com/blog/protecting-the-three-states-of-data/#:~:text=This%20protection%20allows%20to%20keep,have%20complete%20control%20of%20it.
- https://www.cloudflare.com/learning/ssl/what-is-https/
- https://www.cloudflare.com/learning/ssl/why-use-https/
- https://www.cryptomathic.com/news-events/blog/symmetric-key-encryption-why-where-and-how-its-used-in-banking
- https://www.youtube.com/watch?v=stMj5jlu1-4
- https://www.expressvpn.com/blog/what-is-a-replay-attack-and-how-to-prevent-them/
- https://cheapsslsecurity.com/blog/types-of-man-in-the-middle-attacks/
- https://www.cloudflare.com/learning/dns/dns-cache-poisoning/
- https://cybersecurity.att.com/blogs/security-essentials/what-is-ddos-mitigation
- https://cloudsecurityalliance.org/blog/2021/06/04/7-simple-but-effective-tactics-to-protect-your-website-against-ddos-attacks-in-2021/
- https://www.techtarget.com/searchsecurity/definition/distributed-denial-of-service-attack
- https://www.techtarget.com/iotagenda/definition/man-in-the-middle-attack-MitM
- https://www.youtube.com/watch?v=U5sCY-B1hXk
- https://www.encryptionconsulting.com/education-center/what-is-key-management/
- https://www.youtube.com/watch?v=AQ94pF0tLEw
- https://us.norton.com/internetsecurity-id-theft-session-hijacking.html
- https://www.techtarget.com/searchsecurity/definition/distributed-denial-of-service-attack
- https://www.youtube.com/watch?v=oZfDp3SvrOY&t=27911s
- https://www.professormesser.com/security-plus/sy0-501/hashing-and-digital-signatures/
- https://www.cryptomathic.com/news-events/blog/an-overview-of-symmetric-encryption-and-the-key-lifecycle#:~:text=The%20main%20advantage%20of%20symmetric,the%20key%20to%20be%20moved
- https://www.slideshare.net/FaizKhan116/ppt123-66669462
- https://www.youtube.com/watch?v=y8a3QoTg4VQ
- https://www.cloudflare.com/learning/ddos/ping-icmp-flood-ddos-attack/
- https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/
- https://www.kaspersky.com/resource-center/threats/spyware
- https://www.fortinet.com/resources/cyberglossary/smurf-attack#:~:text=A%20smurf%20attack%20is%20a,enables%20hackers%20to%20execute%20them.
- https://www.imperva.com/learn/ddos/smurf-attack-ddos/
- https://www.fortinet.com/resources/cyberglossary/trojan-horse-virus#:~:text=A%20Trojan%20Horse%20Virus%20is,system%20access%20with%20their%20software.
- https://us.norton.com/internetsecurity-emerging-threats-smurf-attack.html
- https://www.youtube.com/watch?v=K4BU-oSOGl8
- https://www.extrahop.com/resources/attacks/dos/
- https://www.techtarget.com/searchsecurity/definition/buffer-overflow#:~:text=A%20buffer%20overflow%20occurs%20when,adjacent%20to%20the%20destination%20buffer.
- https://www.acunetix.com/blog/articles/injection-attacks/
- https://www.cloudflare.com/ddos-hub/
- https://www.techtarget.com/searchsecurity/definition/Web-application-firewall-WAF
- https://portswigger.net/web-security/cross-site-scripting
- https://www.simplilearn.com/tutorials/cryptography-tutorial/digital-signature-algorithm
- https://www.slideshare.net/FaizKhan116/ppt123-66669462
- https://www.youtube.com/watch?v=y8a3QoTg4VQ
- https://www.cloudflare.com/learning/ddos/ping-icmp-flood-ddos-attack/
- https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/
- https://www.kaspersky.com/resource-center/threats/spyware
- https://www.fortinet.com/resources/cyberglossary/smurf-attack#:~:text=A%20smurf%20attack%20is%20a,enables%20hackers%20to%20execute%20them.
- https://www.imperva.com/learn/ddos/smurf-attack-ddos/
- https://www.fortinet.com/resources/cyberglossary/trojan-horse-virus#:~:text=A%20Trojan%20Horse%20Virus%20is,system%20access%20with%20their%20software.
- https://us.norton.com/internetsecurity-emerging-threats-smurf-attack.html
- https://www.youtube.com/watch?v=K4BU-oSOGl8
- https://www.extrahop.com/resources/attacks/dos/
- https://www.techtarget.com/searchsecurity/definition/buffer-overflow#:~:text=A%20buffer%20overflow%20occurs%20when,adjacent%20to%20the%20destination%20buffer.
- https://www.acunetix.com/blog/articles/injection-attacks/
- https://www.cloudflare.com/ddos-hub/
- https://www.techtarget.com/searchsecurity/definition/Web-application-firewall-WAF
- https://portswigger.net/web-security/cross-site-scripting
- https://www.simplilearn.com/tutorials/cryptography-tutorial/digital-signature-algorithm
- https://us.norton.com/internetsecurity-emerging-threats-what-is-social-engineering.html
- https://www.youtube.com/watch?v=4shxYyV4O_k
- https://www.kaspersky.com/resource-center/threats/spyware
- https://www.youtube.com/watch?v=jIyIqjOlqzY
- https://www.kaspersky.com/resource-center/threats/how-to-prevent-ransomware
- https://www.kaspersky.com/resource-center/definitions/what-is-rootkit
- https://home.sophos.com/en-us/security-news/2019/what-is-a-rootkit
- https://phoenixnap.com/blog/types-of-firewalls
- https://www.okta.com/identity-101/ids-vs-ips/
- https://www.top10vpn.com/what-is-a-vpn/vpn-protocols/
- https://www.thesecuritybuddy.com/bluetooth-security/what-is-bluejacking/
- https://nordvpn.com/blog/protocols/
- https://atlasvpn.com/blog/what-bluejacking-is-and-how-to-defend-against-it
- https://nordvpn.com/blog/tor-vs-vpn/
- https://www.techtarget.com/searchsecurity/definition/DMZ
- https://www.techtarget.com/searchsecurity/definition/honey-pot
- https://www.youtube.com/watch?v=8SY4bU7AQwE&t=4s
- https://www.makeuseof.com/tag/what-is-wep-wi-fi-encryption-and-why-is-it-really-insecure-makeuseof-explains/#:~:text=WEP%20stands%20for%20%22Wired%20Equivalent,%2DMiddle%20(MitM)%20attack.
- https://www.itechtics.com/wep-wpa-wpa2-protocols-comparison-technical-differences/
- https://www.tutorialspoint.com/cryptography_with_python/cryptography_with_python_caesar_cipher.htm
- https://www.javatpoint.com/stateless-protocol-vs-stateful-protocol
- https://www.n-able.com/blog/intrusion-detection-system#:~:text=As%20a%20signature%2Dbased%20IDS,suspicious%20behavior%20that%20is%20unknown.
- https://www.netscout.com/what-is-ddos/udp-flood#:~:text=A%20UDP%20flood%20is%20a,applications%20associated%20with%20these%20datagrams.
- https://www.wallarm.com/what/udp-flood-attack
- https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/
- https://www.imperva.com/learn/ddos/udp-flood/
- https://us.norton.com/internetsecurity-id-theft-session-hijacking.html
- https://gigapress.net/limit-login-attempts/
- https://cryptographyacademy.com/introduction/#:~:text=What%20is%20cryptography%3F,anyone%20except%20the%20intended%20recipient.
- http://users.ece.cmu.edu/~adrian/630-f04/PGP-intro.html
- https://www.simplilearn.com/cryptography-rar216-article#:~:text=The%20security%20of%20encrypted%20data,PGP%20is%20a%20cryptosystem.
- https://sectigostore.com/blog/types-of-encryption-what-to-know-about-symmetric-vs-asymmetric-encryption/
- https://www.techopedia.com/definition/5045/bluejacking#:~:text=Bluejacking%20is%20a%20hacking%20method,message%20to%20the%20detected%20devices.
- https://atlasvpn.com/blog/what-bluejacking-is-and-how-to-defend-against-it
- https://www.techtarget.com/searchsecurity/definition/rootkit
- https://heimdalsecurity.com/blog/ransomware/
- https://www.passwordrevelator.net/blog/en/hackers-computers-chinese-arrive-a-circumvent-the-double-authentication-2/
- https://timesofindia.indiatimes.com/gadgets-news/whatsapp-rolls-out-disappearing-photos-feature-for-these-users/articleshow/83979506.cms
- https://recfaces.com/articles/biometric-authentication-identification
- https://internationaldirector.com/technology/why-biometrics-are-the-need-of-the-hour-for-customer-experience-and-security/
- https://www.clockrite.co.uk/system-accessories/proximity-clocking-keyfobs/
- https://www.vectorstock.com/royalty-free-vector/security-token-vector-11893689
- https://subscription.packtpub.com/book/programming/9781838986698/10/ch10lvl1sec72/symmetric-key-encryption
- https://www.clickssl.net/blog/difference-between-hashing-vs-encryption
- https://www.youtube.com/watch?v=9OjK9NNlXYY
- https://www.sealpath.com/blog/protecting-the-three-states-of-data/
- https://www.youtube.com/watch?v=XtSH9HW7PCM
- https://www.znetlive.com/blog/what-is-an-ssl-certificate-and-why-is-it-a-must-have-for-every-website/
- https://blueanchordigital.com/http-vs-https/
- https://www.thesecuritybuddy.com/malware-prevention/what-is-session-hijacking/
- https://m.facebook.com/easypc.ph/photos/2the-difference-between-dos-and-ddos-attacksa-denial-of-service-dos-attack-is-di/1476808465710711/
- https://www.researchgate.net/figure/Elements-that-constitute-a-distributed-denial-of-service-attack_fig1_319901682
- https://cyberhoot.com/cybrary/flooding/
- https://afteracademy.com/blog/what-is-a-tcp-3-way-handshake-process
- https://cis.msjc.edu/Tutorials/Networking/OSIModel/network/
Sub Topics
- https://www.cloudflare.com/learning/ddos/ping-of-death-ddos-attack/#:~:text=A%20Ping%20of%20death%20(PoD,machine%20to%20freeze%20or%20crash.
- https://www.wallarm.com/what/what-is-a-ping-of-death-assault
- https://www.w3schools.com/sql/sql_injection.asp
- https://medium.com/@charithra/introduction-to-sql-injections-8c806537cf5d
- https://spanning.com/blog/cross-site-scripting-web-based-application-security-part-3/
- https://www.youtube.com/watch?v=7M-R6U2i5iI
- https://www.thesslstore.com/blog/15-brute-force-attack-prevention-techniques-you-should-know/
- https://www.varonis.com/blog/brute-force-attack
- https://heimdalsecurity.com/blog/ransomware/
- https://medium.com/@craig_10243/the-puzzle-of-the-double-hash-968196edb06d
- https://www.chubbydeveloper.com/birthday-attack/
- https://medium.com/hackernoon/the-evolution-of-phishing-attacks-why-are-they-still-effective-44bdb8f458c2
- https://www.techtarget.com/searchsecurity/definition/adware
- https://atlasknowledge.freshdesk.com/support/solutions/articles/4000108526-disable-popup-blocker-google-chrome
- https://blog.emsisoft.com/en/13532/beware-of-babar-the-spyware-created-by-the-french-secret-service/
- https://www.techtarget.com/searchnetworking/definition/CDN-content-delivery-network
- https://www.youtube.com/watch?v=jIyIqjOlqzY
- https://www.gogtss.com/blog/rootkit-hacks-are-nasty-but-preventable
- https://www.vecteezy.com/free-vector/firewall
- https://vpntunnel.com/
- https://www.top10vpn.com/what-is-a-vpn/vpn-protocols/
- https://www.reddit.com/r/coolguides/comments/hio26y/tor_vs_vpn/
- https://www.techtarget.com/searchsecurity/definition/DMZ
- https://www.techtarget.com/searchsecurity/definition/honey-pot
- https://www.youtube.com/watch?v=8SY4bU7AQwE&t=4s
- https://nordvpn.com/blog/protocols/
- https://www.computerhope.com/issues/ch001388.htm
- https://edu.gcfglobal.org/en/basic-computer-skills/starting-a-computer-in-safe-mode/1/
- https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences
- https://www.researchgate.net/figure/2-Comparison-popular-symmetric-cryptographic-algorithms_tbl3_328339660
- https://spanning.com/blog/cross-site-forgery-web-based-application-security-part-2/
Module Linking
Main Topic Image
Is Study Guide?
Off
Is Assessment Consultation?
Off