SlideShare a Scribd company logo
Produced by
Yasser Elsnbary
Try Hack Your Mind
Yasser_Elsnbary
Yasser Elsnbary
Enthusiastic student of cybersecurity
- Leader of the Cybersecurity Circle
- CTF Player
$~:whoami
1. What is cyber Security ?
1. Importance of cyber Security
2. Hackers Hats
2. Blue Team VS Red Team
1. Security Assets
3. Cyber Security Fields
4. Cyber security Jobs
5. Cyber Security industry in Egypt
6. How To start
7. Cyber Security Circle
1. Our Roadmap
8. Discussion
$~:Agenda
What is cyber Security?
1. Cyber Security “‫السيبراني‬ ‫األمن‬”
2. Cyber: It is a combining form relating to information technology, the
Internet, and virtual reality
3. Cyber Security (ICT) [ Information and Communications Technologies ]
4. Cyber Security Vs Information Security
5. Information Security (CIA) [ Confidentiality – Integrity – Availability ]
6. Cyber Security IS NOT hacking
$~:What is cyber Security ?
$~:What is cyber Security ?
• Is CCNA essential in cybersecurity ? .....
• Is English essential in cybersecurity ? .....
• Does information security hack social media accounts ?
.....
• Is programming necessary in cybersecurity ? .....
• Is my data important ? .....
• Cyber security: is
necessary since it helps
in securing data from
threats such as data
theft or misuse, also
safeguards your system
from viruses
$~:Importance of cyber Security
Black
hat
Gray hat White
hat
$~:Hackers Hats
Red Team VS Blue
Team
$~:Red Team VS Blue Team
Logic & Process
User Behavior
IOT Devices
API
Web Applications Webservices & Backend
Network Connection & Appliances Security AppliancesMobile Applications
Physical Access
$~:Security Assets
Cyber Security Fields
1. Penetration
Testing
2. Source Code
Review
and more ..
1. Threat Hunting and
Modeling
2. Security Operation
Center
3. Incident Response &&
Handling
4. Network Security
5. Malware Analyst & RE
$~:Cyber Security Fields
Cyber Security Jobs
1. Network Security Engineer
“ A network security engineer is
involved in the provisioning,
deployment, configuration, and
administration of many different
pieces of network- and security-
related hardware and software. “
$~:Cyber Security Fields
“ identify, and attempt to
breach existing weaknesses
in digital systems and
computing networks. These
systems and networks
include websites, data
storage systems, and other
IT assets. ”
$~:Cyber Security Fields
2. Penetration Testing
$~:Cyber Security Fields
“ The most obvious approach is to
completely reverse engineer a
piece of malware. This obviously
takes a great amount of time, so
other approaches are more
practical.”
$~:Cyber Security Fields
3. RE & Malware Analysis
$~:Cyber Security Fields
The SOC team’s goal is to detect,
analyze, and respond to cybersecurity
incidents using a combination of
technology solutions and a strong set
of processes.
$~:Cyber Security Fields
4. Security Operation Center (SOC)
focuses on identifying, investigating,
and remediating computer network
exploitation. This can take varied
forms and involves a wide variety of
skills, kinds of attackers, an kinds of
targets.
$~:Cyber Security Fields
5. ( DFIR )
Digital Forensics
Incident Response
$~:Cyber Security Fields
How To Start ?
$~:How To Start?
1. Ask yourself if this field is right for you ?
2. Identify your mindset Blue or Red
3. Define your field
4. Set your goals
5. Start in basics
6. Start studying and keep studying
7. Practice
1. CTFs
2. Bug Bounty
3. Machines Hack The Box & TryHackMe
4. etc ..
8. Improve your social network
9. Branding Your self very well show respect to others
Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
$~:Cyber Security industry in Egypt
Cyber Security Circle
$~:Cyber Security Circle
Re-founder Nidal - 2018
⬡ Penetesting ⬡ Reverse
Engineering
⬡ Network
Security
$~:Cyber Security Circle
• Competitions
• EGCERT
• CyberTalents Egypt CTF
• CyberTalents Arab CTF
• ACSWG
• Mansoura CTF
• University CTF
• CTFTime Ranked
• Conferences
• Nidal Session @Bsides
Cairo
• Aya Adel the first Egyptian
girl to organize “Hack the
box” competition!
$~:Cyber Security Circle
$~:Our Roadmap
⬡ Entry Level
∙ Linux
∙ Basic of Network
∙ Programming “Python”
⬡ Penetesting
∙ Web Penetesting
∙ Network Penetesting
⬡ Reverse & Malware
Analysis
⬡ Network Security
$~:Summary
1. cyber Security VS InfoSec
2. Hackers Hats
3. Blue Team VS Red Team
4. Cyber Security Fields
5. Cyber security Jobs
6. Cyber Security industry in Egypt
7. How To start
8. Cyber Security Circle
$~:Resources
• CAT Reloaded Roadmap
• Nakerah Network
• Technawi
• LiveOverFlow
• The Cyber Mentor
• 13 Cubed
• Black Hat
• Colin Hardy
• OALabs
• Open Security Training
• Black Hills Information
Security
• Simply Cyber
• Josh Stroschein
• MalwaerAnalysisForHedgeh
ogs
“Discussion”
“ THANK
YOU "
Yasser_Elsnbary

More Related Content

PPTX
Career in cyber security
PDF
Cyber security
PDF
Cyber Security_Presentation_KTH
PPTX
The Importance of Cybersecurity in 2017
PPT
Home cyber security
PPTX
Cyber security
PPT
Cyber Security
PPTX
Cyber security ppt
Career in cyber security
Cyber security
Cyber Security_Presentation_KTH
The Importance of Cybersecurity in 2017
Home cyber security
Cyber security
Cyber Security
Cyber security ppt

What's hot (20)

PPTX
Introduction to Cybersecurity
PDF
Cyber Security Vulnerabilities
PPTX
What is Cyber Security - Avantika University
PPTX
Cyber Security Research Project Topics
PDF
cyber-security course outline
PPTX
cyber security PPT
PPTX
Cyber security
PDF
New threats to cyber-security
PPTX
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
PPTX
Cyber security
PDF
Toward Continuous Cybersecurity with Network Automation
PPTX
What is cyber security
PDF
Cyber security and demonstration of security tools
PDF
Cybersecurity technology adoption survey
PPTX
A military perspective on cyber security
PPTX
Cybersecurity
PDF
Cyber Security Threats and Data Breaches
PPTX
cyber security
PPTX
Cyber Security: Threats and Needed Actions
PDF
Cyber security
Introduction to Cybersecurity
Cyber Security Vulnerabilities
What is Cyber Security - Avantika University
Cyber Security Research Project Topics
cyber-security course outline
cyber security PPT
Cyber security
New threats to cyber-security
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Cyber security
Toward Continuous Cybersecurity with Network Automation
What is cyber security
Cyber security and demonstration of security tools
Cybersecurity technology adoption survey
A military perspective on cyber security
Cybersecurity
Cyber Security Threats and Data Breaches
cyber security
Cyber Security: Threats and Needed Actions
Cyber security
Ad

Similar to cyber security | What Is Cyber Security | Hello World Session (20)

PPT
Roadmap To Cybersecurity master as a guide .ppt
PPTX
2015 KSU So You Want To Be in Cyber Security
PDF
How to get started in cybersecurity
PPTX
I hack you hack we all hack
PDF
Presentation- Introduction to Cybersecurity.pdf
PDF
100+ Cyber Security Interview Questions and Answers in 2022
PPTX
How to get Started in Cyber Security - Rayan Crasta
PPTX
cybersecurity and its importance in digital era
PDF
Beginner to Advanced Cyber Security Course in Delhi.pdf
PPTX
Cyber Security Seminar.pptx
PDF
Cybersecurity-and_EthicalHacking_Roadmap.pdf
PPTX
Overview Marketing and International Business
PDF
Cyber security course in Kerala, Kochi
PDF
Cyber security course in Kerala, Kochi
PPTX
Cybersecurity Awareness Session by Adam
PPTX
Cybersecurity-Navigating-the-DigitaL.pptx
PDF
Career guide on cyber security
PDF
CYBER SECURITY CAREER GUIDE CHEAT SHEET
PPTX
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
PDF
Cyber security for Developers
Roadmap To Cybersecurity master as a guide .ppt
2015 KSU So You Want To Be in Cyber Security
How to get started in cybersecurity
I hack you hack we all hack
Presentation- Introduction to Cybersecurity.pdf
100+ Cyber Security Interview Questions and Answers in 2022
How to get Started in Cyber Security - Rayan Crasta
cybersecurity and its importance in digital era
Beginner to Advanced Cyber Security Course in Delhi.pdf
Cyber Security Seminar.pptx
Cybersecurity-and_EthicalHacking_Roadmap.pdf
Overview Marketing and International Business
Cyber security course in Kerala, Kochi
Cyber security course in Kerala, Kochi
Cybersecurity Awareness Session by Adam
Cybersecurity-Navigating-the-DigitaL.pptx
Career guide on cyber security
CYBER SECURITY CAREER GUIDE CHEAT SHEET
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Cyber security for Developers
Ad

Recently uploaded (20)

PPTX
assetexplorer- product-overview - presentation
PDF
Salesforce Agentforce AI Implementation.pdf
PPTX
history of c programming in notes for students .pptx
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PDF
Complete Guide to Website Development in Malaysia for SMEs
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PDF
Nekopoi APK 2025 free lastest update
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PDF
Odoo Companies in India – Driving Business Transformation.pdf
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PDF
Cost to Outsource Software Development in 2025
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
Autodesk AutoCAD Crack Free Download 2025
assetexplorer- product-overview - presentation
Salesforce Agentforce AI Implementation.pdf
history of c programming in notes for students .pptx
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
Complete Guide to Website Development in Malaysia for SMEs
Navsoft: AI-Powered Business Solutions & Custom Software Development
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Nekopoi APK 2025 free lastest update
Computer Software and OS of computer science of grade 11.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Weekly report ppt - harsh dattuprasad patel.pptx
wealthsignaloriginal-com-DS-text-... (1).pdf
Operating system designcfffgfgggggggvggggggggg
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
Odoo Companies in India – Driving Business Transformation.pdf
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
Cost to Outsource Software Development in 2025
Patient Appointment Booking in Odoo with online payment
Autodesk AutoCAD Crack Free Download 2025

cyber security | What Is Cyber Security | Hello World Session