2. OS security
System security (user level)
System security (kernel level)
Encryption explicitly
Decryption explicitly
Web Secuirty
Browser Security
Malware analyst (static / dynamic)
Network security
Wireless security
Android security
IoT security
Forensics and incident response
Fields of Cybersecurity
3. Type of Hackers
Script Kiddies
Suicide Hackers
Black-Hat Hackers
White-Hat Hackers
Gray-Hat Hackers
4. The Hacking Process
Footprinting > Scanning > Enumeration
> System Hacking > Escalation of Privilege > Covering
Tracks > Planting Backdoors
Information
Gathering