ShubhamJagtap2000 / Networking-Essentials
📡 Foundational understanding of Computer Networking for learners
☆17Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Networking-Essentials
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆70Updated last month
- 🐞 Understand how cross-site scripting occurs, how to detect and exploit XSS vulnerabilities, giving you control of other visitor's brows…☆12Updated last month
- 👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.☆19Updated 11 months ago
- PROJECT 1: With this Project/Assignment, I designed a sample network for an Enterprise. This Enterprise has 2 Locations (Location A & Loc…☆43Updated 8 months ago
- Compilation of Cyber Security Cheat Sheets☆21Updated 4 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆58Updated 2 years ago
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆26Updated 2 years ago
- An ongoing collection infosec courses, learning tutorials, libaries, and training resources.☆43Updated 2 years ago
- This Repository contains Encryption Algorithms, Ethical Hacking Scripts, Cybersecurity Learning Resources, and Security-Based Projects. C…☆53Updated 3 years ago
- This repository has E-books on Cybersecs☆86Updated 3 years ago
- Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security re…☆297Updated 3 weeks ago
- Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing revi…☆10Updated 8 months ago
- The purpose of this repository is to concentrate information, concepts and studies for the Certified in Cybersecurity (ISC²) exam.☆45Updated last year
- This is an intensive 24-week long boot camp program. Skills learned consist of Wireshark, Kali Linux, Metasploit, Burp Suite, Elk Stack, …☆14Updated last year
- A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.☆85Updated last month
- Materials and Synopsis of the course Certified Network Security Specialist (CNSS) provided by The International CyberSecurity Institute (…☆28Updated 4 years ago
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆172Updated last month
- Free Access Books/Resources for Computer Engineering (and Computer Science) Students☆62Updated last year
- Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Program…☆47Updated 3 weeks ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆23Updated 3 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆26Updated last year
- Welcome to my GitHub repository housing comprehensive handwritten notes from the IBM Cybersecurity Analyst Professional certification. Di…☆14Updated 8 months ago
- A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science stu…☆14Updated 2 years ago
- All Networking Related Practicals in Cisco Packet Tracer☆76Updated last year
- List of resources for a self-taught education in Android mobile development☆39Updated 2 years ago
- Projects, notes, and write-ups I have done while completing the Google Cybersecurity Certificate☆74Updated last year
- "Computers are great because when you're working with them you get immediate results that let you know if your program works. It's feedba…☆89Updated 5 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers. With repository stars⭐ and forks🍴☆112Updated this week
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆10Updated 2 years ago
- Projects related to Information security/Cyber security/Cryptography☆29Updated 10 months ago