Skip to content

Cyber Security Roadmap

  • Roadmap: https://roadmap.sh/cyber-security

Deep-Dive Sections

Companion topics: - Backend / Authentication & Authorization — OAuth2, OIDC, JWT, RBAC/ABAC


1. Fundamental IT Skills

  • 1.1 Computer Hardware Components
  • 1.2 Connection Types and their function
  • 1.2.1 NFC
  • 1.2.2 WiFi
  • 1.2.3 Bluetooth
  • 1.2.4 Infrared
  • 1.3 OS-Independent Troubleshooting
  • 1.4 Understand Basics of Popular Suites
  • 1.4.1 iCloud
  • 1.4.2 Google Suite
  • 1.4.3 MS Office Suite
  • 1.5 Basics of Computer Networking

2. Certifications

2.1 Beginner Certifications

  • 2.1.1 CompTIA A+
  • 2.1.2 CompTIA Linux+
  • 2.1.3 CompTIA Network+
  • 2.1.4 CCNA
  • 2.1.5 CompTIA Security+

2.2 Advanced Certifications

  • 2.2.1 CEH
  • 2.2.2 CISA
  • 2.2.3 CISM
  • 2.2.4 GSEC
  • 2.2.5 GPEN
  • 2.2.6 GWAPT
  • 2.2.7 GIAC
  • 2.2.8 OSCP
  • 2.2.9 CREST
  • 2.2.10 CISSP

3. CTFs (Capture the Flag)

  • 3.1 HackTheBox
  • 3.2 TryHackMe
  • 3.3 VulnHub
  • 3.4 picoCTF
  • 3.5 SANS Holiday Hack Challenge

4. Operating Systems

  • 4.1 Windows
  • 4.2 Linux
  • 4.3 MacOS

4.4 Learn the Following for Each

  • 4.4.1 Installation and Configuration
  • 4.4.2 Different Versions and Differences
  • 4.4.3 Navigating using GUI and CLI
  • 4.4.4 Understand Permissions
  • 4.4.5 Installing Software and Applications
  • 4.4.6 Performing CRUD on Files
  • 4.4.7 Troubleshooting
  • 4.4.8 Common Commands

5. Networking Knowledge

  • 5.1 Understand the OSI Model
  • 5.2 Common Protocols and their Uses
  • 5.3 Common Ports and their Uses
  • 5.4 SSL and TLS Basics
  • 5.5 Basics of NAS and SAN
  • 5.6 Basics of Subnetting
  • 5.7 Public vs Private IP Addresses

5.8 IP Terminology

  • 5.8.1 localhost
  • 5.8.2 loopback
  • 5.8.3 CIDR
  • 5.8.4 subnet mask
  • 5.8.5 default gateway

5.9 Understand the Terminology

  • 5.9.1 VLAN
  • 5.9.2 DMZ
  • 5.9.3 ARP
  • 5.9.4 VM
  • 5.9.5 DHCP
  • 5.9.6 DNS
  • 5.9.7 NAT
  • 5.9.8 IP
  • 5.9.9 Router
  • 5.9.10 Switch
  • 5.9.11 VPN
  • 5.9.12 MAN
  • 5.9.13 LAN
  • 5.9.14 WAN
  • 5.9.15 WLAN

5.10 Understand These (Functions of Each)

  • 5.10.1 DHCP
  • 5.10.2 DNS
  • 5.10.3 NTP
  • 5.10.4 IPAM

5.11 Network Topologies

  • 5.11.1 Star
  • 5.11.2 Ring
  • 5.11.3 Mesh
  • 5.11.4 Bus

5.12 Network Protocols

  • 5.12.1 SSH
  • 5.12.2 RDP
  • 5.12.3 FTP
  • 5.12.4 SFTP
  • 5.12.5 HTTP / HTTPS
  • 5.12.6 SSL / TLS

6. Basics of Virtualization

  • 6.1 Hypervisor
  • 6.2 VM
  • 6.3 GuestOS
  • 6.4 HostOS

6.5 Common Virtualization Technologies

  • 6.5.1 VMWare
  • 6.5.2 VirtualBox
  • 6.5.3 esxi
  • 6.5.4 proxmox

7. Troubleshooting Tools

  • 7.1 nslookup
  • 7.2 iptables
  • 7.3 Packet Sniffers
  • 7.4 ipconfig
  • 7.5 netstat
  • 7.6 Port Scanners
  • 7.7 ping
  • 7.8 dig
  • 7.9 arp
  • 7.10 Protocol Analyzers
  • 7.11 route
  • 7.12 nmap
  • 7.13 tcpdump
  • 7.14 tracert

8. Authentication Methodologies

  • 8.1 Kerberos
  • 8.2 RADIUS
  • 8.3 LDAP
  • 8.4 SSO
  • 8.5 Certificates
  • 8.6 Local Auth

9. Security Skills and Knowledge

  • 9.1 Understand Common Hacking Tools
  • 9.2 Understand Common Exploit Frameworks
  • 9.3 Understand Concept of Defense in Depth
  • 9.4 Understand Concept of Runbooks
  • 9.5 Understand Basics of Forensics
  • 9.6 Basics and Concepts of Threat Hunting
  • 9.7 Basics of Vulnerability Management
  • 9.8 Basics of Reverse Engineering
  • 9.9 Penetration Testing Rules of Engagement
  • 9.10 Perimeter vs DMZ vs Segmentation
  • 9.11 Core Concepts of Zero Trust
  • 9.12 Roles of Compliance and Auditors
  • 9.13 Understand the Definition of Risk
  • 9.14 Understand Backups and Resiliency
  • 9.15 Cyber Kill Chain
  • 9.16 MFA & 2FA
  • 9.17 Operating System Hardening
  • 9.18 Understand Concept of Isolation
  • 9.19 Basics of IDS and IPS
  • 9.20 Honeypots
  • 9.21 Authentication vs Authorization
  • 9.22 Blue / Red / Purple Teams
  • 9.23 False Negative / False Positive
  • 9.24 True Negative / True Positive
  • 9.25 Basics of Threat Intel, OSINT
  • 9.26 Understand Handshakes
  • 9.27 Understand CIA Triad
  • 9.28 Privilege Escalation
  • 9.29 Web Based Attacks and OWASP10
  • 9.30 Learn how Malware works and Types

9.31 Tools for Incident Response and Discovery

  • 9.31.1 dig
  • 9.31.2 nmap
  • 9.31.3 ping
  • 9.31.4 arp
  • 9.31.5 cat
  • 9.31.6 dd
  • 9.31.7 head
  • 9.31.8 grep
  • 9.31.9 tail
  • 9.31.10 ipconfig
  • 9.31.11 hping
  • 9.31.12 netstat
  • 9.31.13 curl
  • 9.31.14 lsof
  • 9.31.15 tracert
  • 9.31.16 winhex
  • 9.31.17 autopsy
  • 9.31.18 memdump
  • 9.31.19 wireshark
  • 9.31.20 FTK Imager

9.32 Basics of Cryptography

  • 9.32.1 Salting
  • 9.32.2 Hashing
  • 9.32.3 Key Exchange
  • 9.32.4 PKI
  • 9.32.5 Private vs Public Keys
  • 9.32.6 Obfuscation

9.33 Understand Frameworks

  • 9.33.1 ATT&CK
  • 9.33.2 Diamond Model
  • 9.33.3 Kill Chain

9.34 Understand Common Standards

  • 9.34.1 ISO
  • 9.34.2 NIST
  • 9.34.3 RMF
  • 9.34.4 CIS
  • 9.34.5 CSF

9.35 Common Distros for Hacking

  • 9.35.1 ParrotOS
  • 9.35.2 Kali Linux

9.36 Using Tools for Unintended Purposes

  • 9.36.1 LOLBAS
  • 9.36.2 GTFOBINS
  • 9.36.3 WADCOMS

9.37 Understand the Following

  • 9.37.1 SIEM
  • 9.37.2 SOAR

9.38 Learn How to Find and Use These Logs

  • 9.38.1 Event Logs
  • 9.38.2 syslogs
  • 9.38.3 netflow
  • 9.38.4 Packet Captures
  • 9.38.5 Firewall Logs

9.39 Understand Hardening Concepts

  • 9.39.1 MAC-based
  • 9.39.2 NAC-based
  • 9.39.3 Port Blocking
  • 9.39.4 Group Policy
  • 9.39.5 Sinkholes
  • 9.39.6 ACLs
  • 9.39.7 Patching
  • 9.39.8 Jump Server
  • 9.39.9 Endpoint Security

9.40 Secure vs Unsecure Protocols

  • 9.40.1 FTP vs SFTP
  • 9.40.2 SSL vs TLS
  • 9.40.3 IPSEC
  • 9.40.4 DNSSEC
  • 9.40.5 LDAPS
  • 9.40.6 SRTP
  • 9.40.7 S/MIME

9.41 Understand the Following Terms

  • 9.41.1 Antivirus
  • 9.41.2 Antimalware
  • 9.41.3 EDR
  • 9.41.4 DLP
  • 9.41.5 ACL
  • 9.41.6 Firewall & Nextgen Firewall
  • 9.41.7 HIPS
  • 9.41.8 NIDS
  • 9.41.9 NIPS
  • 9.41.10 Host Based Firewall
  • 9.41.11 Sandboxing
  • 9.41.12 EAP vs PEAP
  • 9.41.13 WPS
  • 9.41.14 WPA vs WPA2 vs WPA3 vs WEP

9.42 Understand the Incident Response Process

  • 9.42.1 Preparation
  • 9.42.2 Identification
  • 9.42.3 Containment
  • 9.42.4 Eradication
  • 9.42.5 Recovery
  • 9.42.6 Lessons Learned

9.43 Understand Threat Classification

  • 9.43.1 Zero Day
  • 9.43.2 Known vs Unknown
  • 9.43.3 APT

9.44 Understand Common Tools

  • 9.44.1 VirusTotal
  • 9.44.2 Joe Sandbox
  • 9.44.3 any.run
  • 9.44.4 urlvoid
  • 9.44.5 urlscan
  • 9.44.6 WHOIS

10. Attack Types and Differences

10.1 Phishing

  • 10.1.1 Whishing
  • 10.1.2 Whaling
  • 10.1.3 Smishing
  • 10.1.4 Spam vs Spim

10.2 Social Engineering

  • 10.2.1 Shoulder Surfing
  • 10.2.2 Dumpster Diving
  • 10.2.3 Tailgating
  • 10.2.4 Zero day
  • 10.2.5 Reconnaissance
  • 10.2.6 Impersonation
  • 10.2.7 Watering Hole Attack
  • 10.2.8 Drive by Attack
  • 10.2.9 Typo Squatting

10.3 Common Attacks

  • 10.3.1 Brute Force vs Password Spray
  • 10.3.2 DoS vs DDoS
  • 10.3.3 MITM
  • 10.3.4 Spoofing
  • 10.3.5 Evil Twin
  • 10.3.6 DNS Poisoning
  • 10.3.7 Deauth Attack
  • 10.3.8 VLAN Hopping
  • 10.3.9 Rogue Access Point
  • 10.3.10 Buffer Overflow
  • 10.3.11 Memory Leak
  • 10.3.12 SQL Injection
  • 10.3.13 XSS
  • 10.3.14 CSRF
  • 10.3.15 Replay Attack
  • 10.3.16 Pass the Hash
  • 10.3.17 Directory Traversal

10.4 Understand Audience

  • 10.4.1 Stakeholders
  • 10.4.2 HR
  • 10.4.3 Legal
  • 10.4.4 Compliance
  • 10.4.5 Management

11. Cloud Skills and Knowledge

  • 11.1 Understand the Concept of Security in the Cloud
  • 11.2 Understand the basics and general flow of deploying in the cloud
  • 11.3 Understand the differences between cloud and on-premises
  • 11.4 Understand the concept of Infrastructure as Code
  • 11.5 Understand the Concept of Serverless

11.6 Understand Cloud Services

  • 11.6.1 SaaS
  • 11.6.2 PaaS
  • 11.6.3 IaaS

11.7 Cloud Models

  • 11.7.1 Private
  • 11.7.2 Public
  • 11.7.3 Hybrid

11.8 Common Cloud Environments

  • 11.8.1 AWS
  • 11.8.2 GCP
  • 11.8.3 Azure

11.9 Common Cloud Storage

  • 11.9.1 S3
  • 11.9.2 Dropbox
  • 11.9.3 Box
  • 11.9.4 OneDrive
  • 11.9.5 Google Drive
  • 11.9.6 iCloud

12. Programming Skills

  • 12.1 Python
  • 12.2 Go
  • 12.3 JavaScript
  • 12.4 C++
  • 12.5 Bash
  • 12.6 PowerShell