Cybersecurity Learning Roadmap
Master cybersecurity from fundamentals through ethical hacking, incident response, and cloud security
Duration: 36 weeks | 5 steps | 54 topics
Career Opportunities
- Security Analyst
- Penetration Tester
- Security Engineer
- Security Architect
- CISO (Chief Information Security Officer)
- Security Consultant
- Incident Responder
Step 1: Security Fundamentals
Build a strong foundation in information security principles, frameworks, risk management, and governance
Time: 8 weeks | Level: beginner
- CIA Triad (required) — Understand Confidentiality, Integrity, and Availability as the three pillars that guide all information security decisions.
- Confidentiality ensures that information is accessible only to authorized individuals
- Integrity guarantees that data is accurate, consistent, and unaltered by unauthorized parties
- Availability ensures that systems and data are accessible when needed by authorized users
- Every security control maps back to protecting one or more of these three properties
- Security Frameworks (NIST, ISO 27001) (required) — Learn the major security frameworks that organizations use to structure their security programs and demonstrate compliance.
- NIST CSF organizes security into five functions: Identify, Protect, Detect, Respond, Recover
- ISO 27001 is an international standard for Information Security Management Systems (ISMS)
- CIS Controls provide a prioritized set of actions to improve cyber defense
- Framework adoption helps organizations systematically manage risk and demonstrate due diligence
- Threat Modeling (required) — Systematically identify potential threats, attack vectors, and vulnerabilities in systems before they are exploited.
- STRIDE categorizes threats: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
- Create data flow diagrams to visualize trust boundaries and potential attack surfaces
- Prioritize threats by likelihood and impact to focus remediation efforts
- Threat modeling should be integrated into the software development lifecycle
- Risk Assessment (required) — Evaluate the likelihood and impact of threats to determine risk levels and guide security investment decisions.
- Risk = Likelihood x Impact; quantitative and qualitative methods both have their place
- Asset identification and valuation form the foundation of any risk assessment
- Risk treatment options: accept, mitigate, transfer (insure), or avoid
- Document residual risk after controls are applied and review regularly
- Authentication & Authorization (required) — Learn how systems verify user identity (authentication) and control what users can access (authorization).
- Authentication verifies WHO you are; authorization determines WHAT you can do
- Multi-Factor Authentication (MFA) combines something you know, have, and are
- Access control models include RBAC (Role-Based), ABAC (Attribute-Based), and MAC (Mandatory)
- Single Sign-On (SSO) and federated identity simplify user management across services
- Encryption Basics (required) — Understand symmetric and asymmetric encryption, hashing, digital signatures, and their applications in securing data.
- Symmetric encryption (AES) uses one key for both encryption and decryption, ideal for bulk data
- Asymmetric encryption (RSA, ECC) uses a public/private key pair for secure key exchange and signatures
- Hashing (SHA-256) creates a fixed-size fingerprint of data for integrity verification
- TLS/SSL uses both symmetric and asymmetric encryption to secure data in transit
- Security Policies & Governance (recommended) — Develop organizational security policies, standards, and procedures that define acceptable behavior and controls.
- Policies define high-level security objectives; standards specify mandatory requirements
- Procedures provide step-by-step instructions for implementing policies and standards
- Acceptable use policies (AUP) govern how employees interact with organizational IT resources
- Regular policy review and updates are necessary to address evolving threats
- Compliance (GDPR, HIPAA, SOC2) (recommended) — Understand key regulatory and compliance frameworks that mandate specific security and privacy controls.
- GDPR protects EU citizens' personal data and requires consent, breach notification, and data minimization
- HIPAA governs the protection of health information in the United States
- SOC 2 audits evaluate service organizations on security, availability, processing integrity, confidentiality, and privacy
- Security Awareness (recommended) — Build a human-centric security culture through training programs that reduce the risk of social engineering and user error.
- Human error is a factor in the majority of successful cyberattacks
- Regular phishing simulations train employees to recognize and report suspicious emails
- Security awareness programs should be ongoing, not one-time events
- Physical Security (optional) — Protect physical assets, facilities, and hardware from unauthorized access, theft, and environmental threats.
- Physical security includes access controls (badges, biometrics), surveillance, and environmental controls
- Defense in depth applies to physical security: fences, locks, guards, cameras form layered protection
- Environmental controls protect against fire, flooding, temperature, and humidity damage
- Security Certifications Overview (optional) — Survey the major cybersecurity certifications and understand which align with different career paths.
- CompTIA Security+ is the most common entry-level security certification
- CISSP (ISC2) is the gold standard for security management and architecture roles
- OSCP (Offensive Security) validates hands-on penetration testing skills
Step 2: Network Security
Protect network infrastructure through firewalls, intrusion detection, packet analysis, and secure architecture design
Time: 6 weeks | Level: intermediate
- TCP/IP Security (required) — Understand the security implications of TCP/IP protocols and common attacks targeting each layer of the network stack.
- ARP spoofing allows attackers to intercept traffic on local networks by poisoning ARP caches
- TCP SYN floods exhaust server resources by sending incomplete connection requests
- IP spoofing disguises the origin of packets to bypass access controls or amplify attacks
- Understanding the OSI/TCP model helps identify which layer an attack targets
- Firewalls & ACLs (required) — Configure firewalls and Access Control Lists to filter traffic based on IP addresses, ports, and protocols.
- Stateful firewalls track connection state and only allow responses to established sessions
- Next-generation firewalls (NGFW) inspect application-layer traffic for deeper threat detection
- ACL rules are processed top-down; order matters for both security and performance
- Default deny (implicit deny) blocks all traffic not explicitly permitted
- IDS/IPS Systems (required) — Deploy Intrusion Detection and Prevention Systems to monitor network traffic for malicious activity and block threats.
- IDS passively monitors and alerts on suspicious traffic; IPS actively blocks threats inline
- Signature-based detection matches known attack patterns; anomaly-based detects deviations from baselines
- Place IDS/IPS at network perimeters, between segments, and in front of critical assets
- Tune rules regularly to reduce false positives without missing real threats
- VPN & Tunneling (required) — Secure communications across untrusted networks using Virtual Private Networks and encrypted tunneling protocols.
- IPSec VPNs (site-to-site and remote access) encrypt traffic at the network layer
- SSL/TLS VPNs operate at the application layer and are accessible via web browsers
- WireGuard is a modern, lightweight VPN protocol with strong cryptographic foundations
- Split tunneling routes only corporate traffic through the VPN, reducing bandwidth overhead
- Wireless Security (required) — Secure Wi-Fi networks against eavesdropping, rogue access points, and authentication bypass attacks.
- WPA3 provides the strongest current wireless encryption with SAE (Simultaneous Authentication of Equals)
- WPA2-Enterprise with 802.1X uses RADIUS for individual user authentication
- Rogue access points and evil twin attacks can capture credentials on unsecured networks
- Disable WPS and use strong, unique passphrases for all wireless networks
- Packet Analysis (Wireshark) (required) — Capture and analyze network packets to troubleshoot issues, detect intrusions, and understand protocol behavior.
- Use display filters (e.g., tcp.port==443, http.request) to isolate relevant traffic
- Follow TCP streams to reconstruct full conversations between hosts
- Identify anomalies like unusual ports, excessive retransmissions, or cleartext credentials
- Export objects (files, images) transferred over HTTP for forensic examination
- Network Segmentation (recommended) — Divide networks into isolated segments to limit lateral movement and contain breaches to smaller zones.
- VLANs logically separate broadcast domains without requiring separate physical infrastructure
- Microsegmentation provides granular, workload-level isolation in data centers and cloud environments
- Segment critical assets (databases, payment systems) from general user networks
- DNS Security (recommended) — Protect the Domain Name System from spoofing, cache poisoning, and hijacking attacks that redirect traffic.
- DNSSEC adds cryptographic signatures to DNS records to prevent spoofing and cache poisoning
- DNS over HTTPS (DoH) and DNS over TLS (DoT) encrypt DNS queries for privacy
- DNS filtering can block access to known malicious domains at the network level
- DDoS Mitigation (recommended) — Understand Distributed Denial of Service attack vectors and implement strategies to absorb or deflect volumetric attacks.
- DDoS attacks overwhelm targets with traffic from many distributed sources (botnets)
- Volumetric (bandwidth), protocol (SYN flood), and application-layer (HTTP flood) are the three main categories
- CDNs and DDoS scrubbing services (Cloudflare, AWS Shield) absorb attack traffic at the edge
- Network Forensics (optional) — Collect and analyze network evidence after a security incident to reconstruct attacker actions and timeline.
- Full packet capture provides the richest evidence but requires significant storage
- NetFlow/IPFIX metadata provides connection summaries for long-term traffic analysis
- Correlate network evidence with host logs and SIEM alerts for a complete incident picture
- SDN Security (optional) — Explore security considerations for Software-Defined Networking where the control plane is centralized and programmable.
- SDN centralizes network control, creating a high-value target if the controller is compromised
- The southbound API (e.g., OpenFlow) between controller and switches must be encrypted and authenticated
- SDN enables dynamic, policy-driven security responses like automatic quarantine of compromised hosts
Step 3: Ethical Hacking and Penetration Testing
Learn offensive security techniques to find and exploit vulnerabilities before malicious attackers do
Time: 8 weeks | Level: intermediate
- Reconnaissance & OSINT (required) — Gather publicly available information about a target organization, its infrastructure, and employees before active testing.
- Passive recon collects data without directly interacting with the target (WHOIS, DNS records, social media)
- Active recon directly probes the target and may be detected (port scanning, banner grabbing)
- Tools like theHarvester, Shodan, and Google dorks reveal exposed assets and email addresses
- OSINT findings shape the attack plan and identify the most promising entry points
- Vulnerability Scanning (Nmap) (required) — Use Nmap and vulnerability scanners to discover open ports, running services, and known vulnerabilities on target systems.
- Nmap performs host discovery, port scanning, service detection, and OS fingerprinting
- Use -sV for service version detection and -sC for default script scanning
- Vulnerability scanners (Nessus, OpenVAS) automatically identify known CVEs on discovered services
- Always have written authorization before scanning any system you do not own
- Web App Testing (OWASP Top 10) (required) — Test web applications for the most critical security risks as defined by the OWASP Top 10 vulnerability categories.
- SQL Injection allows attackers to manipulate database queries through unsanitized input
- Cross-Site Scripting (XSS) injects malicious scripts that execute in other users' browsers
- Broken Access Control lets users access resources or actions beyond their permissions
- Use Burp Suite to intercept, modify, and replay HTTP requests for manual testing
- Exploitation (Metasploit) (required) — Use the Metasploit Framework to exploit discovered vulnerabilities and gain access to target systems.
- Metasploit provides a database of exploits, payloads, and auxiliary modules for penetration testing
- Match discovered vulnerabilities to appropriate exploit modules and configure payloads
- Meterpreter is a powerful post-exploitation payload with file system access, pivoting, and more
- Always document exploitation steps for reproducibility in the final report
- Password Cracking (required) — Recover passwords from hashes using dictionary attacks, brute force, and rule-based techniques with specialized tools.
- Dictionary attacks try common passwords and wordlists (rockyou.txt) against captured hashes
- Rule-based attacks apply transformations (capitalization, numbers, symbols) to dictionary words
- Hashcat leverages GPU acceleration for dramatically faster cracking than CPU-only tools
- Understanding hash types (MD5, SHA-256, bcrypt, NTLM) is essential for choosing the right attack
- Post-Exploitation (required) — Maintain access, escalate privileges, and move laterally through the network after initial compromise.
- Privilege escalation exploits misconfigurations or vulnerabilities to gain root/admin access
- Lateral movement uses compromised credentials or sessions to access other systems on the network
- Persistence mechanisms (backdoors, scheduled tasks, registry keys) maintain access after reboot
- Data exfiltration tests determine what sensitive data an attacker could steal
- Reporting & Remediation (recommended) — Document penetration testing findings in a professional report with severity ratings and actionable remediation guidance.
- Include executive summary, methodology, findings with severity (CVSS), evidence, and remediation steps
- Provide both technical details for engineers and business context for leadership
- Prioritize findings by risk (Critical > High > Medium > Low > Informational)
- Social Engineering (recommended) — Test the human element of security through phishing campaigns, pretexting, and other manipulation techniques.
- Phishing remains the most common initial attack vector for real-world breaches
- Pretexting builds a fabricated scenario to manipulate targets into revealing information
- Spear phishing targets specific individuals with personalized, researched messages
- Mobile App Security Testing (recommended) — Test Android and iOS applications for vulnerabilities in storage, communication, authentication, and code integrity.
- OWASP Mobile Top 10 covers insecure data storage, weak authentication, and insufficient cryptography
- Use tools like Frida, Objection, and MobSF for dynamic and static analysis of mobile apps
- Intercept mobile traffic with Burp Suite by installing a proxy CA certificate on the device
- Wireless Penetration Testing (optional) — Assess Wi-Fi network security by testing for weak encryption, rogue access points, and authentication bypass.
- Aircrack-ng suite captures handshakes and performs offline password attacks against WPA/WPA2
- Monitor mode on a wireless adapter is required to capture packets from all nearby networks
- Evil twin attacks create a fake access point to intercept victim traffic and credentials
- Red Team vs Blue Team (optional) — Understand the roles of offensive (Red Team) and defensive (Blue Team) security professionals and how they collaborate.
- Red teams simulate real-world adversaries to test an organization's detection and response capabilities
- Blue teams defend, detect, and respond to attacks using monitoring, analysis, and incident response
- Purple teams combine red and blue activities to maximize learning and improve defenses collaboratively
Step 4: Security Operations and Incident Response
Build and operate a Security Operations Center (SOC), manage incidents, and perform digital forensics
Time: 6 weeks | Level: advanced
- SIEM Implementation (required) — Deploy and configure Security Information and Event Management systems to aggregate, correlate, and alert on security events.
- SIEM aggregates logs from firewalls, endpoints, servers, and applications into a central platform
- Correlation rules detect multi-stage attacks by linking related events across sources
- Dashboards provide real-time visibility into security posture and alert volumes
- Proper log source onboarding and normalization are critical for effective SIEM operation
- Log Analysis & Correlation (required) — Analyze security logs to identify patterns, anomalies, and indicators of compromise across diverse data sources.
- Windows Security Event IDs (4624, 4625, 4688, 4720) reveal logon activity and process creation
- Linux auth logs, syslog, and audit logs track authentication and system changes
- Correlating events across time and sources reveals attack patterns invisible in individual logs
- Use SPL (Splunk), KQL (Elastic), or similar query languages to search and filter log data
- Incident Response Process (required) — Follow structured incident response phases to detect, contain, eradicate, and recover from security incidents.
- NIST IR phases: Preparation, Detection & Analysis, Containment, Eradication, Recovery, Post-Incident
- Containment isolates affected systems to prevent further spread while preserving evidence
- Chain of custody must be maintained for any evidence that may be used in legal proceedings
- Post-incident reviews identify lessons learned and improvements to prevent recurrence
- Digital Forensics Basics (required) — Acquire, preserve, and analyze digital evidence from disks, memory, and network captures for investigations.
- Create forensic images (bit-for-bit copies) of evidence drives before analysis to preserve originals
- Use write blockers to prevent accidental modification of evidence media
- Timeline analysis reconstructs the sequence of events leading to and following an incident
- Tools like Autopsy, FTK, and EnCase are industry standards for disk forensics
- Malware Analysis (required) — Analyze malicious software to understand its behavior, capabilities, and indicators of compromise for detection.
- Static analysis examines malware without executing it (strings, imports, PE headers, disassembly)
- Dynamic analysis runs malware in a sandboxed environment to observe its runtime behavior
- Behavioral indicators (network connections, file drops, registry changes) inform detection signatures
- Always analyze malware in isolated environments (VMs, sandboxes) to prevent accidental infection
- Threat Intelligence (recommended) — Collect, analyze, and apply intelligence about threat actors, campaigns, and indicators of compromise.
- MITRE ATT&CK maps adversary tactics and techniques across the attack lifecycle
- IOCs (Indicators of Compromise) include IP addresses, domains, file hashes, and behavioral patterns
- Threat feeds from ISACs, vendors, and open sources provide actionable intelligence for detection
- SOAR Platforms (recommended) — Automate and orchestrate security operations with Security Orchestration, Automation, and Response platforms.
- SOAR platforms automate repetitive tasks like alert triage, enrichment, and ticket creation
- Playbooks define automated response workflows for common incident types
- Integration with SIEM, ticketing, threat intel, and endpoint tools creates a unified response capability
- Memory Forensics (recommended) — Analyze volatile memory (RAM) dumps to discover running processes, network connections, and malware hiding in memory.
- Memory captures reveal running processes, open network connections, and loaded DLLs at the time of acquisition
- Volatility is the leading open-source framework for memory forensics analysis
- Malware that resides only in memory (fileless malware) leaves no disk artifacts
- Threat Hunting (optional) — Proactively search for hidden threats in your environment that have evaded automated detection mechanisms.
- Threat hunting is hypothesis-driven: start with an assumption about adversary behavior and search for evidence
- Use ATT&CK techniques as hunting hypotheses (e.g., search for PowerShell-based lateral movement)
- Successful hunts produce new detection rules that improve ongoing automated monitoring
- Purple Team Exercises (optional) — Combine offensive and defensive teams in collaborative exercises to test and improve detection and response capabilities.
- Purple team exercises execute known adversary techniques while defenders attempt to detect them in real-time
- Gaps in detection coverage are identified and addressed immediately during the exercise
- Results drive SIEM rule tuning, endpoint detection improvements, and updated response playbooks
Step 5: Cloud Security
Secure cloud environments across AWS, Azure, and GCP with identity management, network controls, and compliance
Time: 8 weeks | Level: advanced
- Shared Responsibility Model (required) — Understand the division of security responsibilities between the cloud provider and the customer.
- Cloud provider secures the infrastructure (physical, network, hypervisor); customer secures what runs on it
- Responsibility boundaries shift depending on the service model (IaaS vs PaaS vs SaaS)
- Misunderstanding the shared model is a leading cause of cloud security breaches
- Always verify what the provider covers vs what you must configure and manage yourself
- IAM in Cloud (required) — Implement Identity and Access Management policies to control who can access cloud resources and what actions they can perform.
- Follow the principle of least privilege: grant only the minimum permissions needed
- Use IAM roles instead of long-lived access keys for services and cross-account access
- Enable MFA for all human users, especially privileged accounts
- Regularly audit IAM policies and remove unused permissions and stale credentials
- Cloud Network Security (required) — Secure cloud networking with VPCs, security groups, network ACLs, and private connectivity options.
- Security groups act as stateful virtual firewalls at the instance level
- Network ACLs provide stateless subnet-level traffic filtering as a secondary layer
- Use private subnets and NAT gateways to keep workloads off the public internet
- VPC peering and PrivateLink provide secure connectivity without traversing the public internet
- Container Security (required) — Secure containerized applications from image build through runtime by scanning, hardening, and monitoring containers.
- Scan container images for known vulnerabilities before deployment (Trivy, Snyk, Clair)
- Use minimal base images and run containers as non-root to reduce the attack surface
- Kubernetes RBAC, Pod Security Standards, and Network Policies enforce runtime security
- Runtime monitoring detects anomalous container behavior like unexpected process execution
- Serverless Security (required) — Address security challenges unique to serverless architectures including function permissions, event injection, and observability.
- Each function should have its own minimal IAM role following least privilege
- Event injection attacks exploit unsanitized input from triggers (API Gateway, S3, SQS)
- Short-lived function execution reduces some attack windows but adds observability challenges
- Dependency scanning is critical since serverless functions often pull many third-party packages
- AWS Security Services (required) — Leverage AWS-native security services like GuardDuty, Security Hub, WAF, and CloudTrail for comprehensive protection.
- CloudTrail logs all API calls for audit and forensic analysis of account activity
- GuardDuty provides intelligent threat detection using machine learning on CloudTrail, VPC Flow, and DNS logs
- Security Hub aggregates findings from multiple AWS services and third-party tools into a single pane
- AWS WAF protects web applications from common exploits like SQL injection and XSS at the edge
- Azure Security Center (recommended) — Use Microsoft Defender for Cloud to assess security posture, detect threats, and enforce compliance across Azure resources.
- Secure Score provides a numeric assessment of your overall Azure security posture
- Defender for Cloud detects threats across compute, storage, networking, and identity layers
- Azure Policy and Blueprints enforce security standards at scale across subscriptions
- Cloud Compliance (recommended) — Ensure cloud deployments meet regulatory and industry compliance requirements through controls and auditing.
- Cloud providers offer compliance certifications (SOC 2, HIPAA, PCI DSS, FedRAMP) for their infrastructure
- Customer responsibility remains for configuring services in a compliant manner
- Automated compliance tools (AWS Config, Azure Policy) continuously evaluate resource configurations
- DevSecOps in Cloud (recommended) — Integrate security into CI/CD pipelines so vulnerabilities are caught early and remediated before deployment.
- Shift left by integrating SAST, DAST, and SCA tools into the CI/CD pipeline
- Infrastructure as Code (IaC) scanning catches security misconfigurations before deployment
- Automated policy gates prevent insecure artifacts from reaching production environments
- Multi-Cloud Security (optional) — Manage security consistently across multiple cloud providers using unified visibility, policy, and identity management.
- Each cloud provider has different security services, APIs, and IAM models requiring specialized knowledge
- Cloud Security Posture Management (CSPM) tools provide unified visibility across providers
- Federated identity (Azure AD, Okta) simplifies user management across multi-cloud environments
- Cloud Forensics (optional) — Conduct forensic investigations in cloud environments by collecting logs, snapshots, and API activity records.
- Cloud forensics relies heavily on API logs (CloudTrail, Activity Log) rather than disk images
- EBS snapshots and memory dumps can be acquired for deeper analysis of compromised instances
- Ephemeral resources (containers, Lambda) may leave limited forensic artifacts requiring proactive logging
