Core Concepts
Start with the key principles that underpin all of cybersecurity.
Foundations
Learn the CIA Triad, defense principles, and risk management.
Attacks & Threats
Explore web vulnerabilities, binary exploitation, and social engineering.
Defense & Response
Understand defensive strategies and incident response procedures.
Networking
Review network protocols, routing, and the OSI model.
AI Security
Discover prompt injection, model attacks, and LLM threat surfaces.
How to Use This Knowledge Base
Start with Foundations
If you are new to cybersecurity, begin with the CIA Triad and Defense Principles to build your conceptual foundation.
Explore by Topic
Navigate through the sidebar sections — Networking, Operating Systems, Attacks, and Defense — to find the area most relevant to what you are studying or working on.
Find Tools
Check the Tools Reference for commands and utilities organized by purpose: detection, monitoring, scanning, and hardening.