A comprehensive learning path covering the fundamentals of cyber security through to advanced specializations. This roadmap guides learners from networking basics and operating systems through to ethical hacking, cloud security, and incident response. Designed for aspiring security analysts, penetration testers, and security engineers, this path balances theory with hands-on practice. By the end, learners will be equipped to pursue industry certifications and real-world security roles.
Difficulty breakdown
Learn TCP/IP, DNS, HTTP, OSI model, subnetting, and core protocols. Understanding how networks operate is the foundation of all cyber security knowledge.
Learn moreMaster Linux command line, file systems, permissions, and process management. Most security tools and servers run on Linux, making this an essential skill.
Learn moreStudy the CIA triad, authentication, encryption basics, common threat actors, and security terminology. This establishes the conceptual framework for all security work.
Learn moreUnderstand symmetric and asymmetric encryption, hashing algorithms, PKI, TLS/SSL, and digital signatures. Cryptography underpins nearly every security mechanism in use today.
Learn moreGet hands-on with Wireshark, Nmap, Metasploit basics, and SIEM platforms like Splunk. Learn to monitor, capture, and analyze network traffic and security events.
Learn moreLearn the penetration testing lifecycle: reconnaissance, scanning, exploitation, and reporting using tools like Burp Suite, Metasploit, and Kali Linux.
Learn moreStudy threat detection, alert triage, log analysis, and incident workflows as practiced in a Security Operations Center environment.
Learn moreMaster the OWASP Top 10, SQL injection, XSS, CSRF, broken authentication, and secure coding practices using real-world web app labs.
Learn moreLearn disk and memory forensics, evidence acquisition, malware triage, and building an effective incident response plan using tools like Autopsy and Volatility.
Learn moreConfigure and manage firewalls, IDS/IPS, VPNs, and network segmentation strategies. Understand attack techniques at the network layer and how to counter them.
Learn moreUnderstand shared responsibility models, IAM policies, cloud misconfigurations, and security best practices across AWS, Azure, and GCP environments.
Learn moreAnalyze malicious software using static and dynamic techniques with tools like IDA Pro, Ghidra, and Cuckoo Sandbox to understand attacker tactics.
Learn moreStudy frameworks like NIST, ISO 27001, GDPR, and SOC 2. Learn to perform risk assessments, gap analyses, and build security governance programs.
Learn morePrepare for certifications such as CompTIA Security+, CEH, OSCP, or CISSP. Build a portfolio with CTF writeups, lab projects, and a professional LinkedIn profile.
Learn moreNo credit card required
Powered by GigForge
Report content