π
Month 1: Foundations
Goal: Build strong basics in networking, operating systems, and security concepts.
Week 1-2: Networking
β’ Learn OSI model, TCP/IP, DNS, DHCP, HTTP/HTTPS.
β’ Tools: ping, traceroute, netstat, nmap.
β’ Resource: CompTIA Network+ Notes
Week 3: Linux Basics
β’ File system navigation, permissions, processes.
β’ Tools: ls, chmod, grep, ssh, scp.
Week 4: Windows Basics
β’ Active Directory, user management, PowerShell scripting.
π οΈ Practice:
β’ Set up VirtualBox/VMware with 1 Linux VM + 1 Windows VM.
β’ Try HackTheBox Starting Point or TryHackMe Pre Security.
________________________________________
π
Month 2: Core Cybersecurity Concepts
Goal: Understand threats, cryptography, and security fundamentals.
Week 5: Security Basics
β’ CIA triad, malware types, social engineering, phishing.
Week 6: Cryptography
β’ Symmetric vs asymmetric encryption, hashing, SSL/TLS.
Week 7: Authentication & Access Control
β’ MFA, RBAC, least privilege, identity management.
Week 8: Security Tools Intro
β’ Firewalls, IDS/IPS, SIEM (Splunk or Wazuh).
π οΈ Practice:
β’ Wireshark: Capture and analyze packets.
β’ TryHackMe Cybersecurity 101.
________________________________________
π
Month 3: Practical Skills
Goal: Learn to use security tools and perform basic attacks/defenses.
Week 9: Recon & Scanning
β’ Tools: Nmap, Whois, Dig.
Week 10: Vulnerability Scanning
β’ Tools: OpenVAS, Nessus (free trial).
Week 11: Exploitation Basics
β’ Metasploit, reverse shells, privilege escalation basics.
Week 12: Web Security (OWASP Top 10)
β’ SQL injection, XSS, CSRF.
π οΈ Practice:
β’ DVWA (Damn Vulnerable Web App) in VM.
β’ TryHackMe Jr Penetration Tester.
________________________________________
π
Month 4: Incident Response & SOC Skills
Goal: Learn defense and monitoring.
Week 13: Security Monitoring
β’ SIEM tools (Splunk/Wazuh).
β’ Log analysis (Windows Event Viewer, Syslog).
Week 14: Incident Response Lifecycle
β’ Identification, containment, eradication, recovery.
Week 15: Digital Forensics Basics
β’ Disk imaging, file recovery, memory analysis.
Week 16: Threat Hunting
β’ Using logs, indicators of compromise (IOC), MITRE ATT&CK framework.
π οΈ Practice:
β’ TryHackMe Blue Team Fundamentals.
β’ Practice log analysis on Splunkβs free version.
________________________________________
π
Month 5: Specialization
Goal: Explore different paths & choose your focus.
Week 17-18: Penetration Testing Track
β’ Advanced exploitation, privilege escalation (Linux/Windows).
β’ Tools: Burp Suite, Hydra, JohnTheRipper.
Week 19: SOC Analyst Track
β’ SIEM queries, building dashboards, threat intelligence feeds.
Week 20: Cloud Security Track
β’ AWS IAM, S3 security, Azure basics.
π οΈ Practice:
β’ HackTheBox (beginner machines).
β’ Cloud: AWS Free Tier labs.
________________________________________
π
Month 6: Capstone & Career Prep
Goal: Apply everything and prepare for real-world jobs/certifications.
Week 21: Capture The Flag (CTF) Challenges
β’ Platforms: PicoCTF, OverTheWire (Bandit).
Week 22: Simulate Attacks & Defenses
β’ Red Team vs Blue Team lab (Kali Linux attacking Windows).
Week 23: Resume & Portfolio Building
β’ Document your labs, write blog posts on Medium/GitHub.
Week 24: Certification Prep
β’ If PenTest β OSCP path.
β’ If SOC β CompTIA CySA+ or Splunk Cert.
β’ If General Security β CompTIA Security+.
________________________________________
β
Key Resources
β’ Free Practice: TryHackMe, HackTheBox, OverTheWire
β’ Books: “The Web Application Hackerβs Handbook”, “Blue Team Field Manual”
β’ Communities: Reddit r/cybersecurity, Discord security servers
________________________________________
π By the end of 6 months, youβll have:
β’ Hands-on experience with tools
β’ Basic attack & defense skills
β’ A portfolio of labs/projects
β’ Readiness for an entry-level role or certification
