Security, Cryptography & Exploitation
Focus: attacker mindset + defensive systemsโunderstanding both sides of security.
Cryptography Foundations
Mathematical foundations of security.
| Topic | Description |
|---|---|
| Cryptography Fundamentals | Symmetric, asymmetric, hashing |
General Cybersecurity
Broad security concepts and practices.
| Topic | Description |
|---|---|
| Cybersecurity Projects | Security fundamentals |
| Ethical Hacking & Pentesting | Authorized security testing |
Secure Programming
Writing code that resists attack.
| Topic | Description |
|---|---|
| Secure C & Exploit Awareness | Writing secure C code |
| C Secure Coding | Defensive programming |
Binary Analysis & Reverse Engineering
Understanding compiled code.
| Topic | Description |
|---|---|
| Binary Analysis | Analyzing executables |
| Disassembly from Scratch | Reading assembly code |
| Reverse Engineering Linux | Linux RE techniques |
Malware & Exploitation
Understanding attacker techniques.
| Topic | Description |
|---|---|
| Malware Internals | How malware works |
| CVE & Exploit Databases | Studying real vulnerabilities |
Learning Tips
- Think like an attacker: Understand offense to build defense
- Practice legally: Use CTFs, labs, authorized testing
- Study real CVEs: Learn from actual vulnerabilities
- Understand the stack: Memory, assembly, OS internals
- Stay ethical: Security knowledge carries responsibility