Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Empty file added ai-ml/ai-agents/index.mdx
Empty file.
Empty file added ai-ml/ai-engineer/index.mdx
Empty file.
Empty file.
Empty file added ai-ml/data-engineer/index.mdx
Empty file.
Empty file added ai-ml/index.mdx
Empty file.
Empty file added ai-ml/mlops/index.mdx
Empty file.
Empty file.
Empty file.
Empty file added best-practices/aws/index.mdx
Empty file.
Empty file.
Empty file.
Empty file.
Empty file added best-practices/index.mdx
Empty file.
Empty file added blockchain/index.mdx
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file added computer-science/index.mdx
Empty file.
Empty file.
Empty file.
Empty file.
File renamed without changes.
17 changes: 9 additions & 8 deletions docs/cybersecurity/index.mdx → cyber-security/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
title: "Cyber Security Tutorials"
description: "Learn Cyber Security from the ground up — from basic concepts and threats to advanced tools, ethical hacking, and best practices."
tags: [cybersecurity, ethical-hacking, network-security, beginner]
sidebar_position: 1
---

Welcome to the **Cyber Security learning series**, your practical guide to understanding how the digital world stays safe (and how to make it safer). Whether you’re a beginner trying to understand what cyber security really means, or an aspiring ethical hacker looking to sharpen your skills, this section will walk you through everything step by step.
Expand Down Expand Up @@ -86,14 +87,14 @@ This tutorial series is perfect for:
## How to Navigate

Start from the basics and move upward:
1. [Introduction to Cyber Security](./introduction-to-cybersecurity.mdx)
2. [Types of Cyberattacks](./types-of-cyberattacks.mdx)
3. [Network Security Basics](./network-security-basics.mdx)
4. [Cryptography and Encryption](./cryptography-and-encryption.mdx)
5. [Ethical Hacking Basics](./ethical-hacking-basics.mdx)
6. [Cybersecurity Tools](./cybersecurity/cybersecurity-tools)
7. [Incident Response](./incident-response.mdx)
8. [Best Practices](./best-practices.mdx)
1. [Introduction to Cyber Security](/tutorial/cyber-security/introduction-to-cyber-security)
2. [Types of Cyberattacks](/tutorial/cyber-security/types-of-cyberattacks)
3. [Network Security Basics](/tutorial/cyber-security/network-security-basics)
4. [Cryptography and Encryption](/tutorial/cyber-security/cryptography-and-encryption)
5. [Ethical Hacking Basics](/tutorial/cyber-security/ethical-hacking-basics)
6. [Cybersecurity Tools](/tutorial/cyber-security/cybersecurity-tools)
7. [Incident Response](/tutorial/cyber-security/incident-response)
8. [Best Practices](/tutorial/cyber-security/best-practices)

## Final Thoughts

Expand Down
Empty file.
Empty file.
150 changes: 150 additions & 0 deletions cybersecuritySidebars.ts
Original file line number Diff line number Diff line change
@@ -0,0 +1,150 @@
/**
* Copyright (c) Ajay Dhangar
*
* This file defines the sidebar configuration for the CodeHarborHub Tutorials Docs.
* Each category represents a tutorial topic like HTML, CSS, JavaScript, React, Git, GitHub, and cyber-security.
*
* Licensed under the MIT License.
*/

import type { SidebarsConfig } from "@docusaurus/plugin-content-docs";

const sidebars: SidebarsConfig = {
tutorial: [
"index",
"introduction-to-cyber-security",

{
type: "category",
label: "Core Concepts",
link: {
type: "generated-index",
title: "cyber-security Core Concepts",
description:
"Explore the essential foundations of cyber-security, including threat types, security principles, network defense, encryption, and ethical hacking. This section helps you understand how to protect systems, networks, and data from digital attacks through practical knowledge, best practices, and real-world projects.",
},
items: [
"network-security-basics",
"types-of-cyberattacks",
"cryptography-and-encryption",
"web-application-security",
"ethical-hacking-basics",
"ethical-hacking-and-cyber-defense",
"dark-web",
"incident-response",
],
},

{
type: "category",
label: "Best Practices & Career",
link: {
type: "generated-index",
title: "Best Practices and Certifications",
description:
"Learn the industry-recommended best practices to secure systems and networks effectively, and explore professional cyber-security certifications that validate your skills and knowledge. This section provides guidance on implementing security standards, risk management, and preparing for certification exams.",
},
items: [
"best-practices",
"certification-guide",
],
},

{
type: "category",
label: "cyber-security Tools",
link: { type: "doc", id: "cybersecurity-tools/index" },
items: [
{
type: "category",
label: "Network Analysis",
items: [
"cybersecurity-tools/network-analysis/wireshark-basics",
"cybersecurity-tools/network-analysis/nmap-scanning",
"cybersecurity-tools/network-analysis/tcpdump-guide",
],
},
{
type: "category",
label: "Penetration Testing",
items: [
"cybersecurity-tools/penetration-testing/metasploit-framework",
"cybersecurity-tools/penetration-testing/burpsuite-overview",
"cybersecurity-tools/penetration-testing/nikto-scanning",
],
},
{
type: "category",
label: "Password & Authentication",
items: [
"cybersecurity-tools/password-and-authentication/john-the-ripper",
"cybersecurity-tools/password-and-authentication/hydra-password-cracking",
"cybersecurity-tools/password-and-authentication/hashcat-usage",
],
},
{
type: "category",
label: "Digital Forensics",
items: [
"cybersecurity-tools/digital-forensics/autopsy-introduction",
"cybersecurity-tools/digital-forensics/volatility-memory-analysis",
],
},
{
type: "category",
label: "Vulnerability Assessment",
items: [
"cybersecurity-tools/vulnerability-assessment/openvas-setup",
"cybersecurity-tools/vulnerability-assessment/nessus-basics",
"cybersecurity-tools/vulnerability-assessment/vulnerability-scanning-tips",
],
},
{
type: "category",
label: "Monitoring & Defense",
items: [
"cybersecurity-tools/monitoring-and-defense/splunk-overview",
"cybersecurity-tools/monitoring-and-defense/snort-ids",
"cybersecurity-tools/monitoring-and-defense/security-onion",
],
},
],
},

{
type: "category",
label: "Hands-on Projects",
link: {
type: "generated-index",
title: "cyber-security Projects & Labs",
description: `Hands-on projects and lab exercises to build practical cyber-security skills. Start with guided, safe labs (network analysis, web app testing, password cracking, forensics), progress to intermediate attack/defense scenarios, and finish with real-world capstone projects. Each lab includes objectives, required tools, step-by-step instructions, and remediation guidance, perfect for learners, instructors, and bootcamps.`,
},

items: [
"projects/setup-lab-environment",
"projects/sql-injection-demo",
"projects/password-cracking-lab",
"projects/network-sniffing-lab",
"projects/penetration-testing-lab",
],
},

{
type: "category",
label: "Resources",
link: {
type: "generated-index",
title: "cyber-security Learning Resources",
description: `A practical, hands-on collection of learning resources for everyone building real-world cyber-security skills. This index groups tutorials, tool guides, labs, and checklists organized from fundamentals (networking, cryptography, web security) to offensive and defensive workflows (pentesting, DFIR, incident response). Each entry includes clear objectives, step‑by‑step exercises, and ethics-first guidance so you can practice safely in labs and apply what you learn to production-ready security work. Use the "Getting Started" path to move from beginner-friendly topics to specialized tool tutorials and certification-ready material.`,
},
items: [
"resources/glossary",
"resources/books-and-courses",
"resources/tools-list",
"resources/links",
],
},
],
};

export default sidebars;
Empty file.
Empty file added databases/index.mdx
Empty file.
Empty file added databases/mongodb/index.mdx
Empty file.
Empty file.
Empty file added databases/redis/index.mdx
Empty file.
Empty file.
Empty file added design/index.mdx
Empty file.
Empty file added design/ux-design/index.mdx
Empty file.
Empty file added devops/aws/index.mdx
Empty file.
Empty file added devops/cloudflare/index.mdx
Empty file.
Empty file added devops/devsecops/index.mdx
Empty file.
Empty file added devops/docker/index.mdx
Empty file.
Empty file added devops/index.mdx
Empty file.
Empty file added devops/kubernetes/index.mdx
Empty file.
Empty file added devops/linux/index.mdx
Empty file.
Empty file added devops/terraform/index.mdx
Empty file.
Loading