In the beginning; I must mention Nidal Fikri who brought the Circle back to work and we learned a lot from him.
This year, I'm the Leader of the Circle going to put our Mentors vision on this road map
you can chat with me any time, feel free to talk with me Yasser Elsnbary
๐ The team is interested in forming technical circles in order to form communities that help and participate in learning modern software technology such as: Cyber Security, Gaming, Web Development, Mobile Development, Data Science, Embedded system and Graphic Design.
โถ How can you follow us on social media or offline?
๐ CAT Reloaded community in Mansoura, you know more about us and our activities through our social media:
๐ Almost every year we host a recruitment Event in Mansoura University to attract all of the interested students in Computer Science in general, categorizing them in Circles meant for different fields, of course there is a Cyber Security Circle.
before start you should know:
โถ So what isโCyber Securityโ?
๐ It is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide
enriched your mind with these talks from TEDx about cybersecurity and hackers.
โถ What do we need to start?
๐ To start you should build your land hard so we have some basics you should know at first to be ready to start your study in cybersecurity. These basics will be in our entry level.
You do not need any requirements to start, you only need Passion, Power and Persistence
โถ What is a good resource to study ?
๐ You should know that the Cyber Security path is not easy or clear and it takes time, there is no clear path to you or path from 0 to hero.
๐ We make an effort to make our paths in this field or in our life to make it easier from other mentors, good resources, study smart and be in touch with new technologies. This is a way to learn, this field is different from other fields.
๐ you should study everytime if you are beginner or expert you will not reach the top because this track is increasing rapidly you can't imagine that it has a lot of branches like Pentesting, Reverse Engineering, Digital Forensics and a lot of them and a lot of jobs in this career to ensure of that please watch this video.
โถ Entry level will not make you professionals or have a high level in this topic.
Firstly you need to know if your passion is true or false, right or wrong for cyber security to measure your loving and capability in this field
โถ After that you should know what you will study Pentesting or Reverse or Networking
โถNotes:
๐ด 1. At the end of this level, a member can decide if he joined the right circle for him or not.
๐ด 2. Please note that the links and courses below are my recommended but may not be the best for everyone, so if you struggle during one of these, you should seek something else.
๐ด 3. Every 2 weeks thereโs a seminar with the leader of the branch to discuss whatโs next and what has been achieved so far.
๐ 1. Before we begin in this level you should know something called:
- โLearning difficultiesโ:
๐ด How you study books and references, you must know that many difficulties will confront you with everything you learn, so you should not be bored or unable to do what you must do.
๐ด You must know that you will stop a lot and you will not understand too much, but you must return and resist
๐ด You must write and practice for everything you learn so that you do not get lost from you, either in your hand or in a text file on your personal computer. Massive practice .
๐ 2. This stage is for those who will pass the Entry Level.
๐ 3. Before you start, you must Choose your path from the 3 branches.
๐ 4. Please note that the links and courses below are recommended but may not be the best for everyone, so if you struggle during one of these, you should seek something else.
๐ 5. This is the longest and most important level in the circleโs technical road map. It may take more than a year but it is really worth it. A circle member with this knowledge will be fully ready to have internships and begin the professional advanced study phase.
๐ 6. Itโs recommended to study the materials in the order mentioned below.
๐ 1. Our New Roadmap HERE includes many steps from Zero to HeroBTW you will need to practice more.
๐ 2. To Practice:
- Create account on hackerone , bugcrowd, intigriti
- You should practice very well so you should Download OWASP Broken Web Application project Try to install it on VMware or VirtualBox from Here
- preferable to download this first and practice very well i love:
๐ 1. CCNA course by Jeremy Cioara (well first thing is first we need to understand the basic protocols and concepts of network and this course is the main method to achieve this target).
๐ 2. CCNA-security course by CBt nuggets (this course is the real deal when it comes to network security fundamentals as it illustrates so many basic technologies and concepts).
๐ 3. Vmware course We will walk ourselves together in the virtual machines world through the intermediate level period in the VMware workstation but if you have any intention in taking this as a real challenge you could check this course as well Vmware course.
๐ 4. routeHub - FortiGate 6.0 Firewall Training (this course dives in the firewall technology as it walks us through the fortigate firewall which is one of the most used products in the industry
Although itโs a slightly older version but thereโs no huge differences in the new version
Notes:
๐ด All of these courses are in English with English subtitles .. if you struggled with it in the beginning please donโt give up. It's highly recommended that you continue gradually because thereโs no equivalent quality in Vmware course .. And if it's necessary you can check this Arabic channel.
We have downloaded all of these courses for you so if you need any of this data offline kindly inform the circle leader before any of the sessions or meetings.