0% found this document useful (0 votes)
104 views1 page

Comprehensive Cybersecurity Roadmap

Uploaded by

memeslatinos7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views1 page

Comprehensive Cybersecurity Roadmap

Uploaded by

memeslatinos7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CTFs (Capture the Flag) Find the detailed version of this roadmap

Machine Translated by Google


HackTheBox
along with resources and other roadmaps

Cyber Security https://roadmap.sh


TryHackMe

VulnHub

peakCTF Fundamental IT Skills

SANS Holiday Hack Challenge


Computer Hardware Components

NFC Wifi Bluetooth Infrared


Certifications Connection Types and their function

Beginner Certifications OS-Independent Troubleshooting

CompTIA A+ CompTIA Linux+ Understand Basics of Popular Suites iCloud Google Suite Microsoft O!ce Suite

CompTIA Network+ CCNA Basics of Computer Networking

CompTIA Security+ Windows Linux macOS

Advanced Certifications

Operating Systems
CISSP CISA CISM Basics of Subnetting

GSEC GPEN GWAPT


Public vs Private IP Addresses
Learn following for Each

GIAC OSCP CREST


IP Terminology Installation and Configuration

CEH localhost loopback CIDR


Di"erent Versions and Di"erences

subnet mask default gateway


Navigating using GUI and CLI

Understand the Terminology Understand Permissions

VMWare VirtualBox esxi proxmox VLAN DMZ ARP VM


Installing Software and Applications

Common Virtualization Technologies NAT IP DNS DHCP


Performing CRUD on Files

GuestOS VM Hypervisor HostOS Router switch VPN


Troubleshooting

Understand basics of Virtualization


Common Commands
MAN LAN WAN WLAN

Troubleshooting Tools
Understand these

nslookup iptables Packet Sni"ers


DHCP DNS NTP IPAM
Understand the OSI model
ipconfig netstat Port Scanners
Function of Each

ping dig arp Protocol Analyzers


Network Topologies Networking Knowledge

nmap route tcpdump tracert


star Ring mesh Bus
Common Protocols and their Uses

Authentication Methodologies Understand Common Protocols


Common Ports and their Uses

Kerberos LDAP SSO SSH RDP FTP SFTP


SSL and TLS Basics

Certificates LocalAuth RADIUS HTTP/HTTPS SSL/TLS


Basics of NAS and SAN

Understand Common Hacking Tools

Core Concepts of Zero Trust


Understand Common Exploit Frameworks
Blue Team vs Red Team vs Purple Team
Roles of Compliance and Auditors
Understand Concept of Defense in Depth
False Negative / False Positive
Understand the Definition of Risk
Understand Concept of Runbooks True Negative / True Positive

Understand Basics of Forensics Understand Backups and Resiliency Basics of Threat Intel, OSINT

Cyber Kill Chain MFA and 2FA


Basics and Concepts of Threat Hunting Understand Handshakes

Basics of Vulnerability Management Operating System Hardening Understand CIA Triad

Basics of Reverse Engineering Understand the Concept of Isolation Privilege escalation / User based Attacks

Penetration Testing Rules of Engagement Basics of IDS and IPS Honeypots Web Based Attacks and OWASP 10

Perimiter vs DMZ vs Segmentation Authentication vs Authorization Learn how Malware Operates and Types

Security Skills and Knowledge

Tools for Incident Response and Discovery Basics of Cryptography Attack Types and Differences

nmap tracert nslookup dig curl Salting Hashing Key Exchange


Phishing vs Vishing vs Whaling vs Smishing

ipconfig hping ping arp cat dd PKI Pvt Key vs Pub Key Obfuscation
Spam vs Spim Shoulder Surfing

head tail grep wireshark winhex


Understand Secure vs Unsecure Protocols Dumpster Diving Tailgating Zero Day

memdump FTK Imager autopsy FTP vs SFTP SSL vs TLS IPSEC Social Engineering Reconnaissance

Understand Frameworks DNSSEC LDAPS SRTP S/MIME Impersonation Watering Hole Attack

ATT&CK Kill chain Diamond Model


Drive by Attack Typo Squatting
Understand the following Terms

Understand Common Standards Antivirus EDR DLP Antimalware Brute Force vs Password Spray

ISO NIST RMF CIS CSF


Firewall and Nextgen Firewall HIPS Common Network Based Attacks

Understand NIDS NIPS Host Based Firewall DoS vs DDoS MITM ARP Poisoning
Common Distros for Hacking

SIEM SOAR ParrotOS Kali Linux Sandboxing ACL EAP vs PEAP Evil Twin DNS Poisoning Spoofing

WPA vs WPA2 vs WPA3 vs WEP WPS Death Attack VLAN Hopping


Using tools for unintended purposes

LOLBAS Rogue Access Point War-driving/dialing


Understand the Incident Response Process

Preparation Identification
Learn how to find and use these logs Bu"er Overflow Memory Leak XSS

Event Logs syslogs netflow Containment Eradication


SQL Injection CSRF Replay Attack

Packet Captures Firewall Logs Recovery Lessons Learned


Pass the Hash Directory Traversal

Understand Hardening Concepts Understand Threat Classification Understand Audience

MAC-based NAC-based Port Blocking Zero Day Known vs Unknown APT Stakeholders HR Legal Compliance

Group Policy ACLs Sinkholes Patching Management


Understand Common Tools

JumpServer Endpoint Security


VirusTotal Joe Sandbox any.run urlvoid urlscan WHOIS

Cloud skills and Knowledge

Understand Cloud Services Common Cloud Environments


Understand concepts of security in the cloud

SaaS PaaS IaaS AWS GCP Azure


Understand the basics and general flow of deploying in the cloud

Understand the differences between cloud and on-premises


Cloud Models Common Cloud Storage

Understand the concept of infrastructure as code


Private public Hybrid S3 Dropbox box

Understand the concept of Serverless


OneDrive Google Drive

Understand the concept of CDN


iCloud

Programming Skills and Knowledge (Optional But Recommended) Python

Go

JavaScript

C++

Keep Learning Bash

PowerShell

You might also like