Cybersec Roadmap
Cybersec Roadmap
Roadmap
(Beginners)
LinkedIn :
CompTIA A+
https://www.linkedin.com/in/abhinavk
akku/ Join Telegram Channel
Operating Systems
Windows OS
What are Linux Distro/ or Distributions Different Linux distributions idea, what's basic
difference in Linux Distributions
Search anything on Search engines, So Start by searching few of the things like
Never stop reading at one page ( unless in
Facing any problem ? How to become a hacker
GOOGLE : Learning How to do Google Search hurry)
Searching / Research is what can really make How to <problem> Penetration Tester Roadmap
like Hackers ( this is THE MOST IMPROTANT Read few pages for every search you do
someone Hacker, it is the most important skill search this and you can get the solutions 99% How to get Cyber Security Job
SKILL to learn) Researching about things can only give more
of the times, at least something close related to How to learn JavaScript
knowledge
the problem & solution How does websites work
Vulnerability | Exploit | Threat | Malware | Virus ciphertext | CVE (Common Vulnerabilities and
Some terms in Cyber Security & Hacking keep
| Botnet | Cloud | Firewall | Virus | Ransomware Social-Engineering | Clickjacking | White-Hat | Exposures)| cryptography | decrypt | DMZ packet sniffing | patch | PKI (Public Key
coming , repeating every time, a common
Cyber Security & Hacking terms | Trojan | Worm | Spyware | Adware | Rootkit | Black-Hat | SAST | DAST | APT ( Advanced (Demilitarized Zone) | drive-by download | Infrastructure) | SaaS | sandboxing | SIEM |
Jargon , so it's better to search and learn few of
Search & Learn Phishing | Spear Phishing | DoS | DDoS | Persistent Threat) | Authentication | encode | encryption key | honeypot | IaaS | IDS sniffing | SPAM | spoofing| supply chain | two-
these terms, so when you see, don't get
Encryption | Encoding | Penetration Testing | Authorization | Bug | IPS | | insider threat | ISP | keylogger | LAN | factor authentication |
confused.
Vulnerability Scanning | ....... OWASP | PaaS
Windows OS
Read some blogs about Windows Internals, Know few things like auto-start locations,
Basic understanding on Windows will help registry editors, services managers, task
when protecting or attacking a Windows manager.....just normal admin tasks.
Machine Again we don't need to become Windows
Administrator ( yes this is also a thing), but we
need to know enough to protect it or attack it,
as both are job of a Security Engineer
Linux OS
Linux is Everywhere, from Web- Servers to Linux+ course is good enough to start with ( Make use of Linux in everyday use to get more
Mobile, TV, and almost in everything you know where you can get it, just ask ) comfortable
So understanding of Linux is required to some almost any error can be solved searching on
extent Google
Computer Network
Learn Networking only as much required, Proxy and It's uses ( forward & reverse proxy),
I am listing few topics which you can search VPN, VLAN , MAC Address
and Learn & also some resources attached at Firewall, Load-Balancers
end
We want to become Security Engineers &
Hackers, not Network Engineers only
So spend time maybe 1-2 week on this
Research the difference in available Bridged Try Installing Linux OS on any VM Windows Started featuring WSL
Virtualization Software, common ones are NAT Windows Subsystem for Linux
VirtualBox, VMWare Player/Workstation, Host-Only Network Do read and try that too
VMWare Fusion, HyperV, Parallels These are common network types, search and This is not actually a VM, but a good thing to try
read when and why are these used( very
important for LAB Setup)
Network Hacking
Host Discovery Network Scanning port scan and discovery nmap scripts WhoIs and other similar search
Different nmap scan types Scanning by Nessus or Qualys or other similar Active and Passing Search email harvesting
software
based on Reconnaissance choosing the exploits exploit-db find any 0day if you can get to exploit
Metasploit exploits and meterpreter searchsploit mapping knowledge of open ports or services
to exploits/attacks
Windows Privilege Escalation Reverse shells one-liners that trigger and give back shells Data Exfiltration techniques
gtfobins
Resources :
network sniffing
PHP
another most commonly found language
Node.Js
or other backend frameworks
very basic HTML CSS, Basic idea help understand the communication
just intro only to find high severity bugs sometimes
Unpopular Opinion : But learn basic of Web
languages ( will help in long term)
can give like 7 hours on each language to know
some of it)
JavaScript Database Technologies: MySQL, NoSQL,
you can find this in places where you don't find MongoDB....list never ends, some idea of few of
sunlight, if you know JavaScript, hacking these
becomes slightly easier as you can understand
the application more
Cross Site Scripting Cross Site Request Forgery SQL Injection Directory Traversal Business Logic
Vulnerabilities :
Just Examples, list is never ending
HTML Injection XXE File upload Vulnerabilities Authentication & Authorization Rate Limiting
hackerone reports
Resources/references
Read the Writeups on personal blogs as well as
twitter #hashtags like #infosec #bugbounty
#bugbountytips
-Antivirus / EDR Solutions Configure Firewall policies for Security SIEM or similar things act as central Security
-Malwares needs to kept out of the machines -Maintain ACLs Log system
-Learn about common malware injection ways, -DNS Resolvers & Monitoring - All Security Incidents at any function like
-How Antivirus works - Block Lists & and More Important Allow Lists firewall , AV , email....can be looked up and
-Asset/Inventory management to ensure -Enterprise VPN & Proxy Configuration related at single point
Security software and security policies are - Helps determine the spread of infection ,
applied to add machines Web Application Firewall source/origin and help mitigate by fact finding
-How malware can spread, this knowledge Ng Firewalls Configurations with concerned teams
helps to make policies that can stop the spread -Incident Handling & Response Teams (IHR)
or infection are the key between different teams and guide
-DLP ( Data Leak/Loss Prevention) systems to the mitigation or lead the investigation
prevent the leak of sensitive data either by
email, copying, file sharing , online uploads,
printing
Practical Ethical Hacking - TCM eCPPTv2 - Penetration Testing Professional eWPT - Web Application Penetration Testing
Professional
eJPT LiveOverFlow Youtube Channel
SANS : SEC542
SANS : SEC460 SANS : SEC504
When I say courses, I mean the learning Ethical Hacking Penetration Testing & Bug
SANS SEC301 SANS SEC560
materials , PDFs, Videos , Blogs, references for Bounty Hunting
topics covered in a course.
NOT doing the course actually if not required.
Linux
Courses / Certification / Resources We are referencing free resources and you
Learn Linux by using daily
Starting into Security Defence Penetration Testing Programming/Scripting Web Application Security Cloud Pentest
know where to get them ( if you read carefully
above )
Also many many courses present, search and eNDP (Network Defense Professional) Utilize Youtube Freecodecamp.org SANS : SEC588
Stackoverflow
learn from any
Official Documentations of Linux Distributions Firewall - PaloAlto Firewall SANS : SEC573 SANS : SEC488
Google Search things where stuck eCTHPv2 - Threat Hunting Professional SNS SEC505 SANS SEC534
SANS : SEC699
SANS : FOR500
SANS FOR508
SANS FOR572
SANS SEC555
Hacking
TryHackMe
HackTheBox
PortSwigger Labs
Try2Hack
echoCTF
CertifiedSecure
Root Me
VulnHub
OverTheWire
PentesterLab
LetsDefend
SecurityBlueTeam
SANS SEC660
SANS SEC760
OSCP