Table of Content
Chapter 1: Hardware
- 1.1 Power Delivery
- 1.2 Thermal Dynamics in Computing
- 1.3 Data Redundancy & Storage Arrays
- 1.4 Enterprise Memory & Storage
Chapter 2: Datacenter Architecture & Physical Infrastructure
- 2.1 Server Form Factors & Density
- 2.2 Enterprise Power & Remote Control
- 2.3 Structured Cabling Architecture
- 2.4 Uninterruptible Power
Chapter 3: Core & Advanced Networking
- 3.1 Network Simulation
- 3.2 Network Segmentation (VLANs)
- 3.3 The Domain Name System (DNS)
- 3.4 Perimeter Security
- 3.5 Subnetting & DHCP
- 3.6 Router & Switches
Chapter 4: Operating Systems & Virtualization
- 4.1 Hypervisor (Type-1)
- 4.2 Linux Automation & Scripting
- 4.3 Linux Command Line Fundamentals
Chapter 5: Modern Application Deployment (Containers)
- 5.1 Introduction to Containerization
- 5.2 Infrastructure as Code (Docker Compose)
- 5.3 VMs vs. Containers
Chapter 6: Infrastructure Observability & Diagramming
- 6.1 Topology Mapping
- 6.2 Telemetry & Data Collection
- 6.3 Visualizing the "Cockpit"
- 6.4 Log Aggregation
Chapter 7: Security Concepts & Digital Footprints
- 7.1 Metadata Analysis
- 7.2 Device & Browser Fingerprinting
- 7.3 The OSI Model
Chapter 8: Programming Fundamentals with Python
- 8.1 Syntax & Data Structures
- 8.2 Loops
- 8.3 Functions & Modules
- 8.4 Virtual Environments
Chapter 9: Advanced Security & Cryptography
- 9.1 Network Obfuscation
- 9.2 Decentralized Networks
- 9.3 Cryptography Fundamentals
- 9.4 Next-Gen Security
- 9.5 Public Key Infrastructure (PKI)
Chapter 10: Python for Cybersecurity\
- 10.1 Network Socket Programming
- 10.2 Interacting with APIs
- 10.3 Log Parsing Automation
- 10.4 Web Requests & Scraping
Chapter 11: Basic OSINT (Open-Source Intelligence)
- 11.1 The OSINT Mindset & Ethics
- 11.2 Public Records & Infrastructure
- 11.3 Social Media Foot printing
- 11.4 Operational Security (OPSEC)\
Chapter 12: Search Engine Mastery for OSINT\
- 12.1 Search Mechanics
- 12.2 Advanced Operators (Google Dorking)
- 12.3 Visual Intelligence
- 12.4 Engine Divergence
- 12.5 The Internet Archive
Chapter 13: Advanced OSINT
- 13.1 Credential & Breach Data
- 13.2 Geospatial Intelligence (GEOINT)
- 13.3 Corporate Reconnaissance
- 13.4 Visual Link Analysis
Chapter 14: Advanced Linux Administration
- 14.1 Advanced Access Control
- 14.2 Process & Service Management
- 14.3 Advanced System Networking
- 14.4 Advanced Log Management