Resources used/References | Essential Books: Hacking: The Art of Exploitation; by Jon Erickson (for more technical and low-level concepts), CompTIA Security+ Study Guide; (for a comprehensive certification overview, great for beginners/intermediates), Cybersecurity For Dummies; (for a broader audience, introductory approach), Frameworks and Standards: NIST Cybersecurity Framework: A voluntary guide to organizing and improving cybersecurity programs, ISO/IEC 27001 (Information Security Management System): International standard for managing information security, OWASP Top 10: List of the 10 Most Critical Web Application Security Vulnerabilities, Organizations and Agencies: CERT/CSIRT (Computer Emergency Response Team/Cyber Security Incident Response Team): Teams that deal with security incidents, ENISA (European Union Agency for Cybersecurity): Provides relevant publications and reports, ISACA / ISC²: Organizations that offer certifications and educational resources in the field, Websites and News Portals: The Hacker News / BleepingComputer: Up-to-date news and analysis on cybersecurity, KrebsOnSecurity: Blog by Brian Krebs, an investigative journalist focused on cybersecurity, Exploit-DB / CVE Details: Vulnerability and exploit databases, This course was developed with the support of the ChatGPT tool (OpenAI GPT-4, version dated August 28, 2025), and later reviewed by the pedagogical team of Render Cursos |
---|
There are no reviews yet.