1
0
mirror of https://github.com/kamranahmedse/developer-roadmap.git synced 2025-08-30 20:49:49 +02:00

add bluetooth security resources from norton us and bluetooth officia… (#5490)

* add bluetooth security resources from norton us and bluetooth official website

* add video to basics of computer networking for cybersecurity roadmap

* add Linux Commands Cheat Sheet

Added Linux Commands Cheat Sheet to 101-linux.md

* add virtual machine explanation from abhishek veeramalla's devops zero to hero course
This commit is contained in:
Ata Tekeli
2024-04-30 20:50:02 +03:00
committed by GitHub
parent c72dd0081c
commit 5a910b53e6
4 changed files with 9 additions and 2 deletions

View File

@@ -15,3 +15,6 @@ Below are some key points about Bluetooth:
- **Potential vulnerabilities**: Despite its built-in security measures, Bluetooth is not immune to cyber attacks. Some common risks include "bluejacking" (unauthorized sending of messages or files), "bluesnarfing" (unauthorized access to device data), and "BlueBorne" (an attack vector that exploits Bluetooth connections to infiltrate devices and spread malware). Users should be cautious in their usage of Bluetooth and follow best practices like not accepting unknown connection requests and turning off Bluetooth when not in use.
In conclusion, Bluetooth offers a convenient means of connecting devices wirelessly. While it provides reasonably secure communication, users must stay informed about potential vulnerabilities and follow good security practices to safeguard their devices.
- [Bluetooth security risks to know (and how to avoid them)](https://us.norton.com/blog/mobile/bluetooth-security)
- [Bluetooth security best practices from official website](https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/)

View File

@@ -51,4 +51,5 @@ The Open Systems Interconnection (OSI) model is a conceptual framework used to u
Mastering the basics of computer networking is key to understanding and implementing effective cyber security measures. This chapter has covered essential networking concepts, but it is important to continually expand your knowledge in this ever-evolving field.
- [What is Computer Networking?](https://tryhackme.com/room/whatisnetworking)
- [What is Computer Networking?](https://tryhackme.com/room/whatisnetworking)
- [Learn Networking in 3 hours (basics for cybersecurity and DevOps)](https://www.youtube.com/watch?v=iSOfkw_YyOU&t=1549s)

View File

@@ -33,4 +33,5 @@ While Linux is inherently secure, there are best practices to enhance your syste
By understanding Linux's features and best practices, you can leverage its powerful capabilities and robust security features to enhance your computing environment's performance and safety.
- [Learn Linux](https://linuxjourney.com/)
- [Introduction to Linux](https://youtu.be/sWbUDq4S6Y8)
- [Introduction to Linux](https://youtu.be/sWbUDq4S6Y8)
- [Linux Commands Cheat Sheet](https://cdn.hostinger.com/tutorials/pdf/Linux-Commands-Cheat-Sheet.pdf?_ga=2.100546909.2114439087.1713515209-1230351550.1713515209)

View File

@@ -39,3 +39,5 @@ There is a wide range of virtualization software available, including:
- Oracle VM VirtualBox: A Type 2 hypervisor that runs on Windows, macOS, and Linux hosts, popular for desktop virtualization.
In conclusion, virtual machines play a critical role in modern computing, providing a flexible and efficient method to optimize computing resources, isolate applications, and enhance security. Understanding VMs and virtualization technology is an essential part of any comprehensive cybersecurity guide.
[Virtual Machines Part-1 by Abhishek Veeramalla](https://www.youtube.com/watch?v=lgUwYwBozow)