Siber Güvenlik İle İlgili Herşey
Aşağıdaki bilgiler başlangıç için faydalı olacaktır. İyi çalışmalar.
https://www.cybrary.it/catalog/?level=beginner //Burada beginner seviye için pek çok video serisi var. Penetration Tester videoları izlenebilir.
https://samsclass.info/ //Burada Sam Bowne (üniversite hocası) siber güvenlikle alakalı notları, paylaşımları ve pekçok şey yer alıyor.
https://overthewire.org/wargames/ //Bu sitede çeşitli alanlarda uygulamalı challengelar yer alıyor. Challengelar temelden zorluk seviyesi artarak devam ediyor.
http://overthewire.org/wargames/natas/ Overthewire içerisinde web özelinde Sunucu Tarafındaki Web Application Güvenliğiyle alakalı “natas” serisini öneririm.
https://www.hackthebox.eu/ //Bu lab platform OSCP gibi, VPN ile girilen, kolay,orta,zor makinalara sızmaya çalışılan bir platform. Ayrıca makineler haricinde çeşitli kategorilerde challengelar yer alıyor. Siteye kayıt olabilmek de ayrı bir challenge
https://lab.pentestit.ru/ //OSCP lab gibi bir platform.
https://www.youtube.com/channel/UCVVAjCqbNlcQUGFknjp8UiQ //Eğitim video serileri olan bir YouTube kanalı
https://www.youtube.com/channel/UC3s0BtrBJpwNDaflRSoiieQ //Siber güvenlikle alakalı YouTube kanalı
https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA //Hackthebox makine çözümlerini anlatan bir YouTube kanalı
How to learn Ethical Hacking with Python and Kali linux course
https://www.youtube.com/watch?v=DzDtzbcmb58
Penetration Testing: Gophish Tutorial (Phishing Framework)
https://www.youtube.com/watch?v=S6S5JF6Gou0
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux Tutorial | Edureka
https://www.youtube.com/watch?v=0uvWRwLs5Zo
Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019)
https://www.youtube.com/watch?v=3Kq1MIfTWCE
The Complete Ethical Hacking Course for 2020!
https://www.youtube.com/watch?time_continue=20&v=fDeLtKUxTmM
ZERO TO HERO NETWORK PENTESTING
https://www.thecybermentor.com/zero-to-hero-pentesting
Web Security
https://web.stanford.edu/class/cs253/
Bug Bounty Hunter Methodology
https://www.youtube.com/watch?v=Qw1nNPiH_Go
WebSecurity Academy https://portswigger.net/web-security
Bugcrowd University
https://github.com/bugcrowd/bugcrowd_university
Network Basics for Hackers https://www.hackers-arise.com/networks-basics
Vulnhub https://www.vulnhub.com/
Hackthebox https://www.hackthebox.eu/
Virtual Hacking Labs https://www.virtualhackinglabs.com/
TryHackMe https://tryhackme.com/
Beginner Linux for Ethical Hackers https://www.youtube.com/playlist?list=PLLKT__MCUeiwfK18Io6kvwrrhqQyQnV5W
Damn Vulnerable Web Application (DVWA) https://github.com/ethicalhack3r/DVWA
Learn to Hack https://www.hacksplaining.com/
Welcome to reverse engineering workshops
https://malwareunicorn.org/#/workshops
Reverse Engineering for Beginners
Android App Reverse Engineering 101
https://maddiestone.github.io/AndroidAppRE/
Malware Analysis
Session 1: Network Threat Hunting – Malware Command and Control (C2) – What is it and how does it work?
Session 2: Network Threat Hunting – C2 Detection Techniques – Part 1
Session 3: Network Threat Hunting – C2 Detection Techniques – Part 2
Session 4: Network Threat Hunting – C2 Detection – Tools
Session 5: Network Threat Hunting – Network Threat Hunter’s Runbook
Session 6: Network Threat Hunting – Hands-on Lab Review
RSA University
https://www.youtube.com/channel/UC8zA1d5y_C_wAUcvr83-ndw/videos
Capture the Flag
CyberSoc CTF Platform
Hacker101 CTF