SkillAgentSearch skills...

Cybersecurity

Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.

Install / Use

/learn @paulveillard/Cybersecurity

README

Cybersecurity: Theory, Techniques, and Tools

Welcome to the most extensive collection of encyclopedic knowledge in the world of Cybersecurity:

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.

Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources.

What is Cybersecurity?

  • Cybersecurity is the collective process of protecting computer systems, networks, and programs from cyberattacks.

CISA defines it as "Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information." It seems that everything relies on computers and the internet now—communication (e.g., email, smartphones, tablets), entertainment (e.g., interactive video games, social media, apps ), transportation (e.g., navigation systems), shopping (e.g., online shopping, credit cards), medicine (e.g., medical equipment, medical records), and the list goes on. How much of your daily life relies on technology? How much of your personal information is stored either on your own computer, smartphone, tablet or on someone else's system?

<p align="center"> <img src="https://github.com/paulveillard/cybersecurity/blob/main/img/cybersecurity-market.jpg?raw=true" alt="Sublime's custom image"/> </p>

Cybersecurity, computer security, or information technology security (IT Security) is a very important part of the cyberspace.

Cyberspace is a larger term than the internet. It refers to digital environments in which the exchange of electronic information takes place—that includes private networks and online services beyond the public internet. The role of cybersecurity has only become more important for the modern enterprise and increasingly for the individual. Cybersecurity is unlike any other technology sector. It’s an industry that thrives on human fear, not greed. The sector isn’t a revenue driver for businesses neither can its cost-saving impact always be empirically measured.

  • Security is a $200B industry growing over 11% each year, making it one of the largest and most mission-critical technology sectors.

Today, The field of cybersecurity can be categorized into ten (10) main domains:

-  Access Control
-  Telecommunications and Network Security
-  Information Security Governance and Risk Management
-  Software Development Security
-  Cryptography
-  Security Architecture and Design
-  Operations Security & Threat Intelligence
-  Business Continuity and Disaster Recovery Planning
-  Legal, Regulations, Investigations and Compliance
-  Physical (Environmental) Security

Table of Contents


Cybersecurity

Security Domains

<p align="center"> <img src="https://github.com/paulveillard/cybersecurity/blob/main/img/cybersecurity_domains_3.1.png?raw=true" alt="Sublime's custom image"/> </p>
  • Access Control

  • Telecommunications and Network Security

  • Information Security Governance and Risk Management

  • Software Development Security

  • Cryptography

  • Security Architecture and Design

  • Operations Security & Threat Intelligence

  • Business Continuity and Disaster Recovery Planning

  • Legal, Regulations, Investigations and Compliance

  • Physical (Environmental) Security

Security Sectors

From a market perspective, Current & emerging technologies & services, key facts, sector background and analysis of the following 15 cybersecurity sectors:

  1. Endpoint Security
  2. Identity and Access Management
  3. Mobile Enterprise Management
  4. Mobile Security
  5. Security Information and Event Management (SIEM)
  6. Content Security
  7. Malware Mitigation
  8. Data Loss Prevention (DLP)
  9. Datacenter Security
  10. Firewalls
  11. Next Generation Firewalls
  12. IDS/IPS
  13. Unified Threat Management (UTM)
  14. Cloud-Based Services
  15. Vulnerability/Risk Management & Managed Security Services

Security Vendors

Top 200 Cybersecurity Vendors

From Marketwatch Cybersecurity Market 2021-2030 as of september 2021, there have been 190 cybersecurity companies operating in the market:

<p align="center"> <img src="https://github.com/paulveillard/cybersecurity/blob/main/img/cyberspace-ecosystem.jpg?raw=true" alt="Sublime's custom image"/> </p>

A

Accenture, Agiliance, AhnLab, Airbus, AirWatch, Akamai, Alert Logic, AlertEnterprise, AlienVault, Alt-N Technologies, Application Security, AppSense Limited, Arbor Networks, Attachmate, Authentify, AVAST Software, Aveksa, AVG Technologies, Avira,

B

Barracuda Networks, Beyond Security, BeyondTrust, Bit9, Bitdefender, BlackBerry, BlackStratus, Blue Coat Systems, BoxTone, Bromium, BullGuard,

C

Cassidian Communications Inc., Catbird Networks, Centrify, Cenzic, Check Point, CipherCloud, Cisco Systems Inc, Clearswift, Click Security, CloudFlare, CloudLock, Code Green Networks, Commtouch Software, Comodo, CORE Security, Corero Network Security, Courion, Covisint, CrowdStrike Holdings, CSID, Cyber Operations, Cyber-Ark, CyberArk Software, Cyberoam, Cyren,

D

Damballa, DigiCert, Digital Info Security Company,

E

EdgeWave, EiQ Networks, Elbit Systems, Enterasys Networks, Entrust, ESET, Exobox Technologies Corp, Extreme Networks,

F

Faronics Technologies, Fast facts, Fiberlink, Fidelis Security Systems, FireEye, FireMon, ForeScout Technologies, FoxGuard Solutions, F-Secure, Fulcrum IT Services Company. LLC,

G

G2 Web Services, Gemalto, General Dynamics, GFI Software, Good Technology, Guardian Analytics, Guidance Software,

H

Hewlett-Packard Co, HyTrust, ID Analytics, Igloo Security Inc, Imprivata, Intel Security Group, International Business Machines Corp, Intrusion Inc, IOActive, Iovation, Juniper Network,

K

Kaspersky Lab,

L

L-3 Communications, Lacoon Security Ltd, Lancope, LANDesk Software, LogRhythm, Lookingglass Cyber Solutions, Lookout Mobile, Lumension Security,

M

M5 Network Security, Mandiant, Mantech International Corp, Memento, Merlin International, MessageLabs, MetricStream, Mobile Active Defense, Mobile Vault, MobileIron, Mobilityone Ltd, Mocana, MU Dynamics,

N

N-Dimension Solutions, NetCentrics Corporation, Network Security Systems, Nics Tech Co. Ltd., NIKSUN, NSS Labs Inc.,

O

Odyssey Technologies, Okt

View on GitHub
GitHub Stars227
CategoryDevelopment
Updated10d ago
Forks52

Languages

Python

Security Score

100/100

Audited on Mar 20, 2026

No findings