CyberBase
Home Command Library Toolbox Concepts DevSecOps Defend Attack Flows Resource Hub Quiz Log Analyzer
No results
EN SV
Login

Concepts

Explore categories and drill into details.

Frameworks and Standards

Mental models and checklists used in real security programs.

🧩
DORA NIST CSF CIS Controls CIA Triad ISO/IEC 27001 MITRE ATT&CK OWASP Top 10

Principles and Identity

Access control, authentication, and core security principles.

🧠
Zero Trust Least Privilege Identity and Access Management (IAM) AAA Multi-Factor Authentication (MFA) Intrusion Detection System (IDS)

Networking and Protocols

Protocols you will see in scans, traffic captures, and logs.

🌐
OSI Model TCP UDP DNS DHCP ARP ICMP TLS HTTP HTTPS VPN VLAN NAT

Ports

Common ports you will run into in scans, firewall rules, and service configs.

🔌
20 FTP data
21 FTP control
22 SSH
23 Telnet
25 SMTP
53 DNS
67 DHCP server
68 DHCP client
80 HTTP
110 POP3
123 NTP
139 NetBIOS-SSN
143 IMAP
161 SNMP
162 SNMP trap
389 LDAP
443 HTTPS
465 SMTPS
514 Syslog
587 SMTP submission
636 LDAPS
989 FTPS data
990 FTPS control
993 IMAPS
995 POP3S
1433 MS SQL Server
1521 Oracle SQL
1723 PPTP
2049 NFS
3306 MySQL
3389 RDP
5432 PostgreSQL
5900 VNC
6379 Redis
8080 HTTP-alt
8443 HTTPS-alt

CyberBase © 2026 • Learn • Reference • Practice

AI Assistant CyberBase

            
Enter sends. Esc closes.