# Cybersecurity from Zero to Real-World Defense
*A Hands-On Guide to Systems, Networks, Attacks, and Defense*
---
## Table of Contents
### 【0】 Unit 0: Introduction and Setup
- [【0-1】 What Is Cybersecurity?](https://blank/)
- [【0-2】 Course Structure and How to Use This Book](https://blank/)
- [【0-3】 Lab Environment Overview](https://blank/)
- [【0-4】 Cybersecurity Roles and Career Paths](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/r1lTgkK7We)
- [【0-5】 Ethics, Safety, and Legal Boundaries](https://blank/)
---
### [【1】 Unit 1: Your First Step into Cybersecurity](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/H1W9GfO2gl)
- [【1-1】 Why a Lab Environment?](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/rk-7IMu2ge)
- [【1-2】 Setting Up Your Cyber Lab](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/Bybeuf_nlx)
- [【1-3】 Essential Tools You’ll Use](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/ry7I5fOhel)
- [【1-4】 Your First Lab Project](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/ByGsnfu2xg)
- [【1-5】 Optional Challenge — OverTheWire Bandit (Linux practice)](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/rkmeyQu3le)
- [【1-6】 What You Learned and Conclusion](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/Hk4YJ7dhel)
---
### [【2】 Unit 2: Linux Fundamentals](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/Hkjqr95Tge)
- [【2-1】 Why Linux Matters in Cybersecurity](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/H1qNwc5pel)
- [【2-2】 Navigating the Filesystem](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/Byq3Kc56eg)
- [【2-3】 File Operations](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/ByYuqqqagx)
- [【2-4】 Users, Groups, and Permissions](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/HJf-jq5Txx)
- [【2-5】 Processes and System Monitoring](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/S1eas59pee)
- [【2-6】 Package Management](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/rkNy6956ge)
- [【2-7】 Searching and Filtering](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/B1x5ac5Txl)
- [【2-8】 Shell Scripting Basics](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/SyetR9c6ex)
- [【2-9】 Mini Project: Linux Survival Challenge](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/BkTBJiqpex)
- [【2-10】 What You Learned and Conclusion](https://blank/)
---
### [【3】 Unit 3: Networking Fundamentals](https://blank/)
- [【3-1】 Why Networking Matters](https://blank/)
- [【3-2】 The OSI and TCP/IP Models](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/rkuPtiXk-g)
- [【3-3】 IP Addressing and Subnetting](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/rJlsqiQ1-l)
- [【3-4】 Configuring and Testing Network Interfaces](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/SylEii7Jbx)
- [【3-5】 Core Networking Tools](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/rkDssj71-g)
- [【3-6】 Analyzing Traffic with Wireshark and tcpdump](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/SJfW3smk-l)
- [【3-7】 Common Protocols and Ports](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/SkiQno7yWx)
- [【3-8】 Network Troubleshooting and Security Scanning](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/HJj3nsX1Zl)
- [【3-9】 Mini Project: Network Exploration Lab](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/HkpNpsQ1-l)
- [【3-10】 What You Learned and Conclusion](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/ByeD6oX1be)
---
### [【4】 Unit 4: Cybersecurity Foundations](https://blank/)
- [【4-1】 What Is Cybersecurity?](https://blank/)
- [【4-2】 The CIA Triad and Security Principles](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/HyPT7yYXWe)
- [【4-3】 Threats, Vulnerabilities, and Risk Management](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/Hkk3SyF7Zg)
- [【4-4】 Common Attack Types and Techniques](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/ByRlIkYmWg)
- [【4-5】 The Cyber Kill Chain and MITRE ATT&CK Framework](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/ByjS_sX1Zl)
- [【4-6】 Security Controls and Defensive Strategies](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/SyE_81FXWl)
- [【4-7】 Introduction to Cryptography](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/H1IhJ3X1Wx)
- [【4-8】 Applying Defense in Depth](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/rkpBvJtmWl)
- [【4-9】 Mini Project: Build a Secure System Plan](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/H1Wb_yKXbe)
- [【4-10】 What You Learned and Conclusion](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/HypKqJFm-g)
---
### 【5】 Unit 5: Ethical Hacking and Penetration Testing
- [【5-1】 What Is Ethical Hacking?](https://blank/)
- [【5-2】 Legal and Ethical Boundaries](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/BkGb3ktmbe)
- [【5-3】 The Phases of Penetration Testing](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/SJtj61YXbl)
- [【5-4】 Reconnaissance and Information Gathering](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/SkCpJxYQbg)
- [【5-5】 Scanning and Enumeration](https://blank/)
- [【5-6】 Exploitation and Gaining Access](https://blank/)
- [【5-7】 Privilege Escalation and Maintaining Access](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/BkoV-xFXbe)
- [【5-8】 Reporting and Remediation](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/S1FrMgK7We)
- [【5-9】 Mini Project: Penetration Test Simulation](https://blank/)
- [【5-10】 Real-World Breach Case Study](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/CMc8RhIaRyCnN2_Woq8vpQ)
- [【5-11】 What You Learned and Conclusion](https://blank/)
---
### 【6】 Unit 6: Digital Forensics and Incident Response
- [【6-1】 What Is DFIR?](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/S1Y68ltQbx)
- [【6-2】 The Incident Response Lifecycle](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/H1hLvgFQZg)
- [【6-3】 Collecting and Preserving Digital Evidence](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/ryNTveKQZx)
- [【6-4】 Analyzing Logs and System Artifacts](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/B1HL_lKQWe)
- [【6-5】 Memory Forensics](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/SJqaKxFQbg)
- [【6-6】 Disk Forensics and File Recovery](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/BydrqeYmZx)
- [【6-7】 Malware Analysis Basics](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/SysKqxFmZl)
- [【6-8】 Indicators of Compromise](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/rJkEogKmZl)
- [【6-9】 Writing an Incident Report](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/H16qslYmbg)
- [【6-10】 Mini Project: Investigate a Simulated Breach](https://blank/)
- [【6-11】 What You Learned and Conclusion](https://blank/)
- Add a case study
---
### 【7】 Unit 7: Defensive Security and SOC Operations
- [【7-1】 What Is Defensive Security?](https://blank/)
- [【7-2】 Inside a Security Operations Center (SOC): Roles and Workflows](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/SJGTAlFmZe)
- [【7-3】 Security Monitoring and SIEM Tools](https://hackmd.io/@2qQSR8jzQfSW-Xhem_c6HQ/H1NSkZtQZe)
- [【7-4】 Intrusion Detection and Prevention Systems](https://blank/)
- [【7-5】 Firewalls and Network Defense](https://blank/)
- [【7-6】 Threat Intelligence and Event Correlation](https://blank/)
- [【7-7】 Security Playbooks and Response Procedures](https://blank/)
- [【7-8】 Blue Team Tools and Techniques](https://blank/)
- [【7-9】 Mini Project: Simulated SOC Monitoring Challenge](https://blank/)
- [【7-10】 What You Learned and Conclusion](https://blank/)
- Add a case study
---
### 【8】 Unit 8: Real-World Cybersecurity and What Comes Next
- [【8-1】 Major Cyber Incidents and Lessons ](https://blank/)
- [【8-2】 Applying Cybersecurity Skills in Real Life](https://blank/)
- [【8-3】 Capture The Flag (CTF) and Competitions](https://blank/)
- [【8-4】 Building a Personal Cybersecurity Portfolio](https://blank/)
- [【8-5】 Career Paths and Certifications](https://blank/)
- [【8-6】 Final Capstone Project](https://blank/)
- [【8-7】 Final Reflection and Next Steps](https://blank/)
---
# Talk about social engineering, server update, package and libary update...
## About This Book
This book is designed to take you from **zero knowledge** to the ability to **analyze, defend, and think like a cybersecurity professional**.
Each unit builds on the previous one, combining theory, hands-on labs, real-world incidents, and practical skills.
> Start at 【0-1】 if you are new.
> Move forward only when you can explain *why* something works — not just *how*.