#MOC # Cyber Security For learning resources see [[Learning Cyber Security]]. For tools see [[Cyber Security Tools]]. Attacks: [[Local File Inclusion]], [[SQL Injection]], [[Server Side Template Injection]] ^v2o1pe ## Cryptography For a breakdown of common key exchange mechanisms see [[Introduction to Networking - Key Exchange Mechanisms]]. [[Introduction to Networking - Authentication Protocols]] provides a breakdown of commonly used authentication terms. [[Introduction to Networking - Cryptography]] provides a breakdown of cipher block modes which allow us to use block ciphers to encrypt data streams of arbitrary lengths. ## Misc - [[ARP Poisoning What It Is & How to Prevent ARP Spoofing Attacks]] - [[You Should Use a Standard User Account on Windows]] ## Getting a job in Cyber Security You'll need a certificate to get past HR like OSCP and CEH. These certs won't help you learn tough. Getting past HR is not enough, you will also need to impress your future boss. You can do that by documenting any practical challenges you've completed (HackTheBox, TryHackMe, etc.) under achievements on your resume [^1]. [^1]: [Ex-NSA hacker tells us how to get into hacking!](https://youtu.be/SFbV7sTSAlA) ## Protocols and Technologies Used to Prevent E-mail Abuse - [[Sender Policy Framework (SPF)|SPF]] - [[DomainKeys Identified Mail (DKIM)|DKIM]] - [[Domain-Based Message Authentication, Reporting and Conformance (DMARC)|DMARC]] - [[Enforcing Mail Server TLS Connections Using MTA-STS|MTA-STS]]