Cyber Security Roadmap¶
- Roadmap: https://roadmap.sh/cyber-security
Deep-Dive Sections¶
- 01. OWASP Top 10 — injection, broken auth, sensitive data exposure, XXE, broken access control, security misconfiguration, XSS, insecure deserialization, known vulns, insufficient logging
- 02. Cryptography — symmetric, asymmetric, hashing, key management
- 03. Authentication — passwords, MFA, SSO
- 04. Threat Modeling — STRIDE, PASTA, attack trees
- 05. Secure SDLC
- 06. Supply Chain Security — SBOM, dependency scanning, signing
Companion topics: - Backend / Authentication & Authorization — OAuth2, OIDC, JWT, RBAC/ABAC
1. Fundamental IT Skills¶
- 1.1 Computer Hardware Components
- 1.2 Connection Types and their function
- 1.2.1 NFC
- 1.2.2 WiFi
- 1.2.3 Bluetooth
- 1.2.4 Infrared
- 1.3 OS-Independent Troubleshooting
- 1.4 Understand Basics of Popular Suites
- 1.4.1 iCloud
- 1.4.2 Google Suite
- 1.4.3 MS Office Suite
- 1.5 Basics of Computer Networking
2. Certifications¶
2.1 Beginner Certifications¶
- 2.1.1 CompTIA A+
- 2.1.2 CompTIA Linux+
- 2.1.3 CompTIA Network+
- 2.1.4 CCNA
- 2.1.5 CompTIA Security+
2.2 Advanced Certifications¶
- 2.2.1 CEH
- 2.2.2 CISA
- 2.2.3 CISM
- 2.2.4 GSEC
- 2.2.5 GPEN
- 2.2.6 GWAPT
- 2.2.7 GIAC
- 2.2.8 OSCP
- 2.2.9 CREST
- 2.2.10 CISSP
3. CTFs (Capture the Flag)¶
- 3.1 HackTheBox
- 3.2 TryHackMe
- 3.3 VulnHub
- 3.4 picoCTF
- 3.5 SANS Holiday Hack Challenge
4. Operating Systems¶
- 4.1 Windows
- 4.2 Linux
- 4.3 MacOS
4.4 Learn the Following for Each¶
- 4.4.1 Installation and Configuration
- 4.4.2 Different Versions and Differences
- 4.4.3 Navigating using GUI and CLI
- 4.4.4 Understand Permissions
- 4.4.5 Installing Software and Applications
- 4.4.6 Performing CRUD on Files
- 4.4.7 Troubleshooting
- 4.4.8 Common Commands
5. Networking Knowledge¶
- 5.1 Understand the OSI Model
- 5.2 Common Protocols and their Uses
- 5.3 Common Ports and their Uses
- 5.4 SSL and TLS Basics
- 5.5 Basics of NAS and SAN
- 5.6 Basics of Subnetting
- 5.7 Public vs Private IP Addresses
5.8 IP Terminology¶
- 5.8.1 localhost
- 5.8.2 loopback
- 5.8.3 CIDR
- 5.8.4 subnet mask
- 5.8.5 default gateway
5.9 Understand the Terminology¶
- 5.9.1 VLAN
- 5.9.2 DMZ
- 5.9.3 ARP
- 5.9.4 VM
- 5.9.5 DHCP
- 5.9.6 DNS
- 5.9.7 NAT
- 5.9.8 IP
- 5.9.9 Router
- 5.9.10 Switch
- 5.9.11 VPN
- 5.9.12 MAN
- 5.9.13 LAN
- 5.9.14 WAN
- 5.9.15 WLAN
5.10 Understand These (Functions of Each)¶
- 5.10.1 DHCP
- 5.10.2 DNS
- 5.10.3 NTP
- 5.10.4 IPAM
5.11 Network Topologies¶
- 5.11.1 Star
- 5.11.2 Ring
- 5.11.3 Mesh
- 5.11.4 Bus
5.12 Network Protocols¶
- 5.12.1 SSH
- 5.12.2 RDP
- 5.12.3 FTP
- 5.12.4 SFTP
- 5.12.5 HTTP / HTTPS
- 5.12.6 SSL / TLS
6. Basics of Virtualization¶
- 6.1 Hypervisor
- 6.2 VM
- 6.3 GuestOS
- 6.4 HostOS
6.5 Common Virtualization Technologies¶
- 6.5.1 VMWare
- 6.5.2 VirtualBox
- 6.5.3 esxi
- 6.5.4 proxmox
7. Troubleshooting Tools¶
- 7.1 nslookup
- 7.2 iptables
- 7.3 Packet Sniffers
- 7.4 ipconfig
- 7.5 netstat
- 7.6 Port Scanners
- 7.7 ping
- 7.8 dig
- 7.9 arp
- 7.10 Protocol Analyzers
- 7.11 route
- 7.12 nmap
- 7.13 tcpdump
- 7.14 tracert
8. Authentication Methodologies¶
- 8.1 Kerberos
- 8.2 RADIUS
- 8.3 LDAP
- 8.4 SSO
- 8.5 Certificates
- 8.6 Local Auth
9. Security Skills and Knowledge¶
- 9.1 Understand Common Hacking Tools
- 9.2 Understand Common Exploit Frameworks
- 9.3 Understand Concept of Defense in Depth
- 9.4 Understand Concept of Runbooks
- 9.5 Understand Basics of Forensics
- 9.6 Basics and Concepts of Threat Hunting
- 9.7 Basics of Vulnerability Management
- 9.8 Basics of Reverse Engineering
- 9.9 Penetration Testing Rules of Engagement
- 9.10 Perimeter vs DMZ vs Segmentation
- 9.11 Core Concepts of Zero Trust
- 9.12 Roles of Compliance and Auditors
- 9.13 Understand the Definition of Risk
- 9.14 Understand Backups and Resiliency
- 9.15 Cyber Kill Chain
- 9.16 MFA & 2FA
- 9.17 Operating System Hardening
- 9.18 Understand Concept of Isolation
- 9.19 Basics of IDS and IPS
- 9.20 Honeypots
- 9.21 Authentication vs Authorization
- 9.22 Blue / Red / Purple Teams
- 9.23 False Negative / False Positive
- 9.24 True Negative / True Positive
- 9.25 Basics of Threat Intel, OSINT
- 9.26 Understand Handshakes
- 9.27 Understand CIA Triad
- 9.28 Privilege Escalation
- 9.29 Web Based Attacks and OWASP10
- 9.30 Learn how Malware works and Types
9.31 Tools for Incident Response and Discovery¶
- 9.31.1 dig
- 9.31.2 nmap
- 9.31.3 ping
- 9.31.4 arp
- 9.31.5 cat
- 9.31.6 dd
- 9.31.7 head
- 9.31.8 grep
- 9.31.9 tail
- 9.31.10 ipconfig
- 9.31.11 hping
- 9.31.12 netstat
- 9.31.13 curl
- 9.31.14 lsof
- 9.31.15 tracert
- 9.31.16 winhex
- 9.31.17 autopsy
- 9.31.18 memdump
- 9.31.19 wireshark
- 9.31.20 FTK Imager
9.32 Basics of Cryptography¶
- 9.32.1 Salting
- 9.32.2 Hashing
- 9.32.3 Key Exchange
- 9.32.4 PKI
- 9.32.5 Private vs Public Keys
- 9.32.6 Obfuscation
9.33 Understand Frameworks¶
- 9.33.1 ATT&CK
- 9.33.2 Diamond Model
- 9.33.3 Kill Chain
9.34 Understand Common Standards¶
- 9.34.1 ISO
- 9.34.2 NIST
- 9.34.3 RMF
- 9.34.4 CIS
- 9.34.5 CSF
9.35 Common Distros for Hacking¶
- 9.35.1 ParrotOS
- 9.35.2 Kali Linux
9.36 Using Tools for Unintended Purposes¶
- 9.36.1 LOLBAS
- 9.36.2 GTFOBINS
- 9.36.3 WADCOMS
9.37 Understand the Following¶
- 9.37.1 SIEM
- 9.37.2 SOAR
9.38 Learn How to Find and Use These Logs¶
- 9.38.1 Event Logs
- 9.38.2 syslogs
- 9.38.3 netflow
- 9.38.4 Packet Captures
- 9.38.5 Firewall Logs
9.39 Understand Hardening Concepts¶
- 9.39.1 MAC-based
- 9.39.2 NAC-based
- 9.39.3 Port Blocking
- 9.39.4 Group Policy
- 9.39.5 Sinkholes
- 9.39.6 ACLs
- 9.39.7 Patching
- 9.39.8 Jump Server
- 9.39.9 Endpoint Security
9.40 Secure vs Unsecure Protocols¶
- 9.40.1 FTP vs SFTP
- 9.40.2 SSL vs TLS
- 9.40.3 IPSEC
- 9.40.4 DNSSEC
- 9.40.5 LDAPS
- 9.40.6 SRTP
- 9.40.7 S/MIME
9.41 Understand the Following Terms¶
- 9.41.1 Antivirus
- 9.41.2 Antimalware
- 9.41.3 EDR
- 9.41.4 DLP
- 9.41.5 ACL
- 9.41.6 Firewall & Nextgen Firewall
- 9.41.7 HIPS
- 9.41.8 NIDS
- 9.41.9 NIPS
- 9.41.10 Host Based Firewall
- 9.41.11 Sandboxing
- 9.41.12 EAP vs PEAP
- 9.41.13 WPS
- 9.41.14 WPA vs WPA2 vs WPA3 vs WEP
9.42 Understand the Incident Response Process¶
- 9.42.1 Preparation
- 9.42.2 Identification
- 9.42.3 Containment
- 9.42.4 Eradication
- 9.42.5 Recovery
- 9.42.6 Lessons Learned
9.43 Understand Threat Classification¶
- 9.43.1 Zero Day
- 9.43.2 Known vs Unknown
- 9.43.3 APT
9.44 Understand Common Tools¶
- 9.44.1 VirusTotal
- 9.44.2 Joe Sandbox
- 9.44.3 any.run
- 9.44.4 urlvoid
- 9.44.5 urlscan
- 9.44.6 WHOIS
10. Attack Types and Differences¶
10.1 Phishing¶
- 10.1.1 Whishing
- 10.1.2 Whaling
- 10.1.3 Smishing
- 10.1.4 Spam vs Spim
10.2 Social Engineering¶
- 10.2.1 Shoulder Surfing
- 10.2.2 Dumpster Diving
- 10.2.3 Tailgating
- 10.2.4 Zero day
- 10.2.5 Reconnaissance
- 10.2.6 Impersonation
- 10.2.7 Watering Hole Attack
- 10.2.8 Drive by Attack
- 10.2.9 Typo Squatting
10.3 Common Attacks¶
- 10.3.1 Brute Force vs Password Spray
- 10.3.2 DoS vs DDoS
- 10.3.3 MITM
- 10.3.4 Spoofing
- 10.3.5 Evil Twin
- 10.3.6 DNS Poisoning
- 10.3.7 Deauth Attack
- 10.3.8 VLAN Hopping
- 10.3.9 Rogue Access Point
- 10.3.10 Buffer Overflow
- 10.3.11 Memory Leak
- 10.3.12 SQL Injection
- 10.3.13 XSS
- 10.3.14 CSRF
- 10.3.15 Replay Attack
- 10.3.16 Pass the Hash
- 10.3.17 Directory Traversal
10.4 Understand Audience¶
- 10.4.1 Stakeholders
- 10.4.2 HR
- 10.4.3 Legal
- 10.4.4 Compliance
- 10.4.5 Management
11. Cloud Skills and Knowledge¶
- 11.1 Understand the Concept of Security in the Cloud
- 11.2 Understand the basics and general flow of deploying in the cloud
- 11.3 Understand the differences between cloud and on-premises
- 11.4 Understand the concept of Infrastructure as Code
- 11.5 Understand the Concept of Serverless
11.6 Understand Cloud Services¶
- 11.6.1 SaaS
- 11.6.2 PaaS
- 11.6.3 IaaS
11.7 Cloud Models¶
- 11.7.1 Private
- 11.7.2 Public
- 11.7.3 Hybrid
11.8 Common Cloud Environments¶
- 11.8.1 AWS
- 11.8.2 GCP
- 11.8.3 Azure
11.9 Common Cloud Storage¶
- 11.9.1 S3
- 11.9.2 Dropbox
- 11.9.3 Box
- 11.9.4 OneDrive
- 11.9.5 Google Drive
- 11.9.6 iCloud
12. Programming Skills¶
- 12.1 Python
- 12.2 Go
- 12.3 JavaScript
- 12.4 C++
- 12.5 Bash
- 12.6 PowerShell