A comprehensive, step-by-step guide to mastering cybersecurity from beginner to expert level with curated resources, tools, and career guidance
- Introduction
- How to Use This Roadmap
- Roadmap Overview
- Foundation Phase
- Technical Skills Phase
- Specialization Phase
- Advanced Phase
- Professional Development
- Learning Resources
- Cybersecurity Tools
- Certifications Guide
- Career Paths
- Cybersecurity Communities
- Capture The Flag (CTF) Competitions
- Cybersecurity Labs and Practice Environments
- Security Research Resources
- Contributing
Welcome to the Ultimate Cybersecurity Mastery Roadmap! This comprehensive guide is designed to help you navigate the complex world of cybersecurity, providing a clear path from beginner to expert level. Whether you're just starting your journey or looking to advance your existing skills, this roadmap will guide you through the essential knowledge, skills, and certifications needed to succeed in the cybersecurity field.
Cybersecurity is a vast and rapidly evolving field that requires continuous learning and adaptation. This roadmap is designed to provide structure to your learning journey, helping you build a solid foundation before moving on to more specialized areas.
This roadmap is divided into phases, each building upon the previous one. For each topic, you'll find:
- Description: Brief explanation of the topic
- Learning Resources: Recommended courses, books, tutorials, and videos
- Practical Exercises: Hands-on activities to reinforce your learning
- Milestones: Key indicators that you've mastered the topic
- Tools: Relevant tools to practice with
Progress through each phase sequentially, but feel free to dive deeper into topics that interest you or are relevant to your career goals. Remember that practical experience is crucial in cybersecurity, so make sure to supplement your theoretical knowledge with hands-on practice.
- Foundation Phase - Build core knowledge in computing, networking, and basic security principles
- Technical Skills Phase - Develop practical security skills across various domains
- Specialization Phase - Focus on offensive or defensive security specializations
- Advanced Phase - Master advanced topics and specialized security domains
- Professional Development - Continuous learning and career advancement
-
Operating Systems
-
Books:
- "Modern Operating Systems" by Andrew S. Tanenbaum
- "Computer Systems: A Programmer's Perspective" by Randal E. Bryant
- "Operating System Concepts" – Abraham Silberschatz, et al.
-
Practical Exercises:
- Install and explore Windows, Ubuntu, Arch, macOS
- Learn memory management, scheduling, file systems
- Play OverTheWire: Bandit
- Use QEMU or VirtualBox
-
Networking Basics
-
Books:
- "TCP/IP Illustrated, Volume 1" by W. Richard Stevens
- "Network Warrior" by Gary A. Donahue
- Computer Networking: Principles, Protocols and Practice – Olivier Bonaventure
-
Tools:
- Wireshark - Network protocol analyzer
- tcpdump - Command-line packet analyzer
- Cisco Packet Tracer - Network simulation tool
- GNS3
-
Practical Exercises:
- Simulate networks with GNS3 or Packet Tracer
- Analyze packets with Wireshark
- Practice subnetting, DNS, firewall rules
-
Programming Fundamentals
- Python for Everybody
- Automate the Boring Stuff with Python
- Codecademy Python Course
- freeCodeCamp JavaScript Algorithms and Data Structures
- Harvard CS50's Web Programming with Python and JavaScript
- Books:
- "Python Crash Course" by Eric Matthes
- "Eloquent JavaScript" by Marijn Haverbeke
- "Head First Python" by Paul Barry
- Tools:
- Visual Studio Code - Code editor
- PyCharm - Python IDE
- Jupyter Notebooks - Interactive computing
- Replit
- Practical Exercises:
- Build simple security tools (port scanner, password generator)
- Automate repetitive security tasks
- Solve coding challenges on HackerRank or LeetCode
-
Linux Fundamentals
- Linux Journey
- Linux Command Line Basics
- OverTheWire: Bandit
- Linux Survival
- Linux From Scratch
- Books:
- "The Linux Command Line" by William Shotts
- "How Linux Works" by Brian Ward
- "Linux Bible" by Christopher Negus
- Tools:
- VirtualBox - Virtualization software
- Vagrant - Development environment management
- Kali Linux - Security-focused Linux distribution
- Practical Exercises:
- Install and configure a Linux distribution
- Master bash scripting for automation
- Set up a LAMP/LEMP stack
- Configure user permissions and security settings
-
CIA Triad & Security Fundamentals
- Cybrary Introduction to IT & Cybersecurity
- NIST Cybersecurity Framework
- edX Introduction to Cybersecurity
- Coursera Information Security
- Books:
- "Computer Security: Principles and Practice" by William Stallings
- "Security Engineering" by Ross Anderson
- "The Art of Deception" by Kevin Mitnick
- Practical Exercises:
- Analyze case studies of security breaches
- Create a security policy for a fictional organization
- Conduct a basic risk assessment
-
Cryptography Basics
- Cryptography I by Stanford University
- Practical Cryptography for Developers
- Khan Academy Cryptography
- Crypto101
- Books:
- "Serious Cryptography" by Jean-Philippe Aumasson
- "Applied Cryptography" by Bruce Schneier
- "Cryptography Engineering" by Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno
- Tools:
- Practical Exercises:
- Implement basic encryption/decryption algorithms
- Analyze cryptographic protocols
- Solve cryptography challenges on Cryptopals
-
Security Policies & Compliance
- SANS Security Policy Templates
- ISO 27001 Overview
- NIST Special Publications
- GDPR Compliance
- Books:
- "Information Security Policies, Procedures, and Standards" by Thomas R. Peltier
- "The Compliance Guide to the NIST Cybersecurity Framework" by Lars Benson
- "CISSP Study Guide" by Eric Conrad
- Practical Exercises:
- Create a security policy for a fictional organization
- Conduct a gap analysis against a security framework
- Develop an incident response plan
-
Security Tool Fundamentals
- SANS SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
- Black Hills Information Security Webcast
- Cybrary Open Source Intelligence
- Books:
- "Hacking: The Art of Exploitation" by Jon Erickson
- "The Hacker Playbook 3" by Peter Kim
- Tools:
- Kali Linux - Security-focused Linux distribution
- Metasploit - Penetration testing framework
- Nmap - Network discovery and security auditing
- Practical Exercises:
- Set up a security lab environment
- Perform basic reconnaissance on a target (with permission)
- Use OSINT tools to gather information
-
Vulnerability Scanning
- OpenVAS Tutorial
- Nessus Essentials Tutorial
- OWASP ZAP Getting Started
- Books:
- "Mastering Kali Linux for Advanced Penetration Testing" by Vijay Kumar Velu
- "The Basics of Hacking and Penetration Testing" by Patrick Engebretson
- Tools:
- Practical Exercises:
- Set up a vulnerable machine (e.g., Metasploitable)
- Perform vulnerability scans and analyze results
- Create vulnerability reports
-
Network Protocols & Security
- Professor Messer Network+ Course
- SANS SEC560: Network Penetration Testing and Ethical Hacking
- Cybrary Network Security
- Books:
- "Network Security Essentials" by William Stallings
- "Practical Packet Analysis" by Chris Sanders
- "Black Hat Python" by Justin Seitz
- Tools:
- Practical Exercises:
- Perform network reconnaissance with Nmap
- Analyze network traffic for security issues
- Detect and prevent ARP spoofing attacks
- Configure network security monitoring
-
Firewalls & IDS/IPS
- pfSense Fundamentals
- Snort IDS Fundamentals
- Suricata IDS/IPS
- Cisco Firewall Configuration
- Books:
- "Practical Intrusion Analysis" by Ryan Trost
- "The Practice of Network Security Monitoring" by Richard Bejtlich
- "Firewalls and Internet Security" by William R. Cheswick
- Tools:
- pfSense - Open-source firewall
- Snort - Network intrusion detection system
- Suricata - Network IDS/IPS
- Security Onion - Security monitoring platform
- Practical Exercises:
- Set up a firewall with pfSense
- Configure and tune IDS/IPS rules
- Analyze and respond to security alerts
- Create custom detection rules
-
VPN & Secure Communications
- OpenVPN Setup Guide
- WireGuard VPN Tutorial
- IPsec VPN Configuration
- SSL/TLS Deep Dive
- Books:
- "VPNs Illustrated: Tunnels, VPNs, and IPsec" by Jon C. Snader
- "Implementing SSL/TLS Using Cryptography and PKI" by Joshua Davies
- Tools:
- OpenVPN - Open-source VPN solution
- WireGuard - Modern VPN protocol
- Strongswan - IPsec implementation
- OpenSSL - SSL/TLS toolkit
- Practical Exercises:
- Set up a site-to-site VPN
- Configure a remote access VPN
- Implement certificate-based authentication
- Analyze VPN traffic for security issues
-
Operating System Security
- Windows Security Fundamentals
- Linux Security Fundamentals
- macOS Security and Privacy Guide
- SANS SEC505: Securing Windows
- Books:
- "Windows Internals" by Mark Russinovich
- "Linux Security Cookbook" by Daniel J. Barrett
- "macOS and iOS Internals" by Jonathan Levin
- Tools:
- Microsoft Baseline Security Analyzer
- Lynis - Security auditing tool for Linux
- OpenSCAP - Security compliance solution
- Sysinternals Suite
- Practical Exercises:
- Harden a Windows/Linux server
- Implement security baselines
- Perform security audits
- Configure secure authentication mechanisms
-
Endpoint Protection
- SANS SEC505: Securing Windows
- CIS Benchmarks
- Microsoft Defender for Endpoint
- Endpoint Detection and Response (EDR)
- Books:
- "Endpoint Security and Compliance Management" by Daniel Blander
- "Malware Analyst's Cookbook" by Michael Hale Ligh
- Tools:
- Windows Defender
- ClamAV - Open-source antivirus
- OSSEC - Host-based intrusion detection
- Wazuh - Security monitoring solution
- Practical Exercises:
- Configure endpoint protection solutions
- Implement application whitelisting
- Detect and respond to malware infections
- Create security policies for endpoints
-
Vulnerability Management
- Nessus Essentials Tutorial
- OpenVAS Tutorial
- Qualys Vulnerability Management
- NIST Vulnerability Management
- Books:
- "The Vulnerability Management Lifecycle" by Sagar Rahalkar
- "Vulnerability Management" by Park Foreman
- Tools:
- Practical Exercises:
- Perform vulnerability assessments
- Prioritize vulnerabilities based on risk
- Develop remediation plans
- Implement vulnerability management processes
-
OWASP Top 10
- OWASP Top Ten
- Web Security Academy
- SANS SEC542: Web App Penetration Testing and Ethical Hacking
- Kontra OWASP Top 10
- Books:
- "The Web Application Hacker's Handbook" by Dafydd Stuttard and Marcus Pinto
- "Web Security for Developers" by Malcolm McDonald
- "Real-World Bug Hunting" by Peter Yaworski
- Tools:
- OWASP ZAP - Web application security scanner
- Burp Suite - Web vulnerability scanner
- Nikto - Web server scanner
- SQLmap - SQL injection tool
- Practical Exercises:
- Set up a vulnerable web application (e.g., DVWA)
- Identify and exploit common web vulnerabilities
- Implement security controls to prevent attacks
- Perform a web application security assessment
-
Web Application Penetration Testing
- Burp Suite Academy
- OWASP Juice Shop
- HackTheBox Web Challenges
- PentesterLab
- Books:
- "Mastering Modern Web Penetration Testing" by Prakhar Prasad
- "Bug Bounty Hunting Essentials" by Shahmeer Amir
- "Web Hacking 101" by Peter Yaworski
- Tools:
- Burp Suite - Web vulnerability scanner
- OWASP ZAP - Web application security scanner
- Dirsearch - Web path scanner
- Wfuzz - Web application fuzzer
- Practical Exercises:
- Perform a full web application penetration test
- Write a detailed security report
- Exploit and chain multiple vulnerabilities
- Participate in bug bounty programs
-
Secure Coding Practices
- Secure Coding in Python
- OWASP Secure Coding Practices
- Secure Coding in Java
- Microsoft Secure Coding Guidelines
- Books:
- "Secure Coding in C and C++" by Robert C. Seacord
- "Iron-Clad Java: Building Secure Web Applications" by Jim Manico
- "Secure Programming Cookbook for C and C++" by John Viega
- Tools:
- SonarQube - Code quality and security
- OWASP Dependency-Check - Software composition analysis
- Snyk - Open source security platform
- Checkmarx - Static application security testing
- Practical Exercises:
- Review code for security vulnerabilities
- Implement secure authentication and authorization
- Secure data storage and transmission
- Integrate security into the development lifecycle
-
Penetration Testing Methodology
- TryHackMe: Complete Beginner Path
- HackTheBox Academy
- SANS Penetration Testing Roadmap
- Offensive Security Certified Professional (OSCP)
- Penetration Testing Execution Standard (PTES)
- Books:
- "The Hacker Playbook 3" by Peter Kim
- "Advanced Penetration Testing" by Wil Allsopp
- "Penetration Testing: A Hands-On Introduction to Hacking" by Georgia Weidman
- Tools:
- Metasploit Framework - Penetration testing framework
- Cobalt Strike - Adversary simulation software
- Empire - Post-exploitation framework
- Covenant - .NET command and control framework
- Practical Exercises:
- Complete CTF challenges on platforms like HackTheBox and TryHackMe
- Perform a full penetration test in a lab environment
- Document findings in a professional penetration testing report
- Practice OSCP-like challenges
-
Exploitation Techniques
- Metasploit Unleashed
- OSCP Preparation Guide
- Exploit Development
- Buffer Overflow Tutorial
- Books:
- "The Shellcoder's Handbook" by Chris Anley
- "A Guide to Kernel Exploitation" by Enrico Perla
- "Gray Hat Python" by Justin Seitz
- Tools:
- Metasploit Framework - Penetration testing framework
- GDB - GNU debugger
- IDA Pro - Disassembler and debugger
- Ghidra - Software reverse engineering framework
- Practical Exercises:
- Develop custom exploits for known vulnerabilities
- Analyze and modify public exploits
- Practice buffer overflow exploitation
- Perform post-exploitation activities
-
Social Engineering
- Social Engineering: The Science of Human Hacking
- The Social-Engineer Toolkit (SET)
- SANS SEC567: Social Engineering for Penetration Testers
- Books:
- "Social Engineering: The Art of Human Hacking" by Christopher Hadnagy
- "Phishing Dark Waters" by Christopher Hadnagy and Michele Fincher
- "The Art of Deception" by Kevin Mitnick
- Tools:
- Social-Engineer Toolkit (SET)
- Gophish - Open-source phishing framework
- King Phisher - Phishing campaign toolkit
- SpiderFoot - OSINT automation tool
- Practical Exercises:
- Create and execute a phishing campaign (in a controlled environment)
- Develop social engineering scenarios
- Practice pretexting and impersonation techniques
- Analyze successful social engineering attacks
-
Security Operations Center (SOC)
- SOC Analyst Learning Path
- Blue Team Labs Online
- SANS SEC450: Blue Team Fundamentals
- Cybrary SOC Analyst
- Books:
- "Blue Team Handbook: SOC, SIEM, and Threat Hunting" by Don Murdoch
- "Security Operations Center: Building, Operating, and Maintaining your SOC" by Joseph Muniz
- "The Practice of Network Security Monitoring" by Richard Bejtlich
- Tools:
- Practical Exercises:
- Set up a SIEM solution
- Create detection rules for common attacks
- Perform log analysis and correlation
- Develop incident response playbooks
-
Incident Response
- SANS Incident Handler's Handbook
- NIST Incident Response Framework
- SANS FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting
- Incident Response Consortium
- Books:
- "Incident Response & Computer Forensics" by Jason T. Luttgens
- "The Art of Memory Forensics" by Michael Hale Ligh
- "Digital Forensics and Incident Response" by Gerard Johansen
- Tools:
- TheHive - Security incident response platform
- Velociraptor - Digital forensics and incident response
- MISP - Threat intelligence platform
- GRR Rapid Response - Remote live forensics
- Practical Exercises:
- Develop an incident response plan
- Simulate and respond to security incidents
- Perform forensic analysis of compromised systems
- Create incident response reports
-
Digital Forensics
- SANS FOR500: Windows Forensic Analysis
- Digital Forensics Framework
- Computer Forensics Tutorial
- NIST Computer Forensics Tools and Techniques Catalog
- Books:
- "File System Forensic Analysis" by Brian Carrier
- "Digital Forensics with Open Source Tools" by Cory Altheide and Harlan Carvey
- "Windows Forensic Analysis Toolkit" by Harlan Carvey
- Tools:
- Autopsy - Digital forensics platform
- FTK Imager - Forensic imaging tool
- Volatility - Memory forensics framework
- Sleuth Kit - Disk analysis tools
- Practical Exercises:
- Perform disk forensics on compromised systems
- Analyze memory dumps for evidence
- Recover deleted files and data
- Create forensic investigation reports
-
Cloud Security Fundamentals
- AWS Security Fundamentals
- Azure Security Technologies
- Google Cloud Security
- Cloud Security Alliance Courses
- IBM Cloud Security
- Books:
- "Cloud Security: A Comprehensive Guide" by Chris Dotson
- "Practical Cloud Security" by Chris Dotson
- "AWS Security" by Dylan Shields
- Tools:
- AWS Security Hub
- Azure Security Center
- Google Cloud Security Command Center
- CloudSploit - Cloud security scanner
- Practical Exercises:
- Set up secure cloud infrastructure
- Implement identity and access management
- Configure cloud security monitoring
- Perform cloud security assessments
-
Cloud Security Architecture
- Cloud Security Alliance Guidance
- Well-Architected Framework (AWS)
- Azure Well-Architected Framework
- Google Cloud Architecture Framework
- Books:
- "Cloud Security Architecture" by Lee Newcombe
- "Architecting for Security in the Cloud" by David Linthicum
- Tools:
- Terraform - Infrastructure as code
- CloudFormation - AWS infrastructure as code
- Azure Resource Manager - Azure infrastructure as code
- Practical Exercises:
- Design a secure cloud architecture
- Implement defense in depth in cloud environments
- Create infrastructure as code templates with security controls
- Perform threat modeling for cloud architectures
-
Container Security
- Docker Security
- Kubernetes Security
- OWASP Docker Security
- Kubernetes Security Best Practices
- Books:
- "Container Security" by Liz Rice
- "Kubernetes Security" by Liz Rice and Michael Hausenblas
- Tools:
- Clair - Container vulnerability scanner
- Trivy - Container vulnerability scanner
- Falco - Container runtime security
- Aqua Security - Container security platform
- Practical Exercises:
- Secure Docker containers and images
- Implement Kubernetes security controls
- Set up container vulnerability scanning
- Monitor container runtime security
-
Malware Analysis
- Practical Malware Analysis
- SANS FOR610: Reverse-Engineering Malware
- Malware Analysis Tutorials
- OALabs YouTube Channel
- Books:
- "Practical Malware Analysis" by Michael Sikorski and Andrew Honig
- "Malware Analyst's Cookbook" by Michael Ligh et al.
- "Learning Malware Analysis" by Monnappa K A
- Tools:
- Ghidra - Software reverse engineering framework
- IDA Pro - Disassembler and debugger
- Cuckoo Sandbox - Malware analysis sandbox
- REMnux - Linux toolkit for malware analysis
- Practical Exercises:
- Analyze malware samples in a safe environment
- Reverse engineer malicious code
- Create malware analysis reports
- Build automated malware analysis pipelines
-
Threat Intelligence
- MITRE ATT&CK Framework
- SANS FOR578: Cyber Threat Intelligence
- Open Source Intelligence Techniques
- Threat Intelligence Platforms
- Books:
- "Intelligence-Driven Incident Response" by Scott J. Roberts and Rebekah Brown
- "The Threat Intelligence Handbook" by Recorded Future
- "Applied Intelligence" by Kris Lovejoy
- Tools:
- MISP - Threat intelligence platform
- OpenCTI - Open cyber threat intelligence platform
- ThreatConnect - Threat intelligence platform
- Recorded Future - Threat intelligence
- Practical Exercises:
- Collect and analyze threat intelligence
- Map threats to the MITRE ATT&CK framework
- Create threat intelligence reports
- Integrate threat intelligence into security operations
-
Advanced Persistent Threats
- APT Groups and Operations
- Mandiant APT Reports
- MITRE ATT&CK Groups
- ThaiCERT APT Encyclopedia
- Books:
- "Advanced Persistent Threat Hacking" by Tyler Wrightson
- "APT41: A Dual Espionage and Cyber Crime Operation" by FireEye
- Tools:
- Practical Exercises:
- Analyze APT campaigns and techniques
- Create detection rules for APT tactics
- Simulate APT attacks in a controlled environment
- Develop APT hunting strategies
-
IoT Security
- OWASP IoT Security
- IoT Security Foundation
- NIST IoT Security
- IoT Security Guidelines
- Books:
- "Practical IoT Hacking" by Fotios Chantzis et al.
- "IoT Penetration Testing Cookbook" by Aaron Guzman and Aditya Gupta
- "Abusing the Internet of Things" by Nitesh Dhanjani
- Tools:
- Shodan - IoT search engine
- Firmware Analysis Toolkit - Firmware security analysis
- IoTSeeker - IoT device scanner
- Practical Exercises:
- Analyze IoT device security
- Perform firmware analysis
- Test IoT communication protocols
- Implement IoT security controls
-
Mobile Security
- OWASP Mobile Security Testing Guide
- Mobile Application Security Verification Standard
- Android Security
- iOS Security
- Books:
- "Android Security Internals" by Nikolay Elenkov
- "iOS Application Security" by David Thiel
- "Mobile Application Penetration Testing" by Vijay Kumar Velu
- Tools:
- Practical Exercises:
- Perform mobile app penetration testing
- Analyze mobile app permissions and security
- Test mobile authentication mechanisms
- Implement secure mobile development practices
-
Industrial Control Systems Security
- ICS-CERT Training
- SANS ICS410: ICS/SCADA Security Essentials
- NIST SP 800-82: Guide to ICS Security
- ISA/IEC 62443 Standards
- Books:
- "Industrial Network Security" by Eric D. Knapp and Joel Thomas Langill
- "Hacking Exposed Industrial Control Systems" by Clint Bodungen et al.
- "Cybersecurity for SCADA Systems" by William Shaw
- Tools:
- Practical Exercises:
- Set up an ICS lab environment
- Analyze ICS protocols and vulnerabilities
- Implement ICS security controls
- Perform ICS security assessments
-
Certifications Planning
- CompTIA Certification Roadmap
- SANS Certification Roadmap
- ISC2 Certifications
- ISACA Certifications
- EC-Council Certifications
- Books:
- "CISSP All-in-One Exam Guide" by Shon Harris and Fernando Maymi
- "CompTIA Security+ Get Certified Get Ahead" by Darril Gibson
- "OSCP Preparation Guide" by TJ_Null
- Resources:
- Practical Exercises:
- Create a personalized certification roadmap
- Build a study plan for your target certification
- Join study groups and practice exams
- Create practical labs to reinforce certification material
-
Building a Professional Network
- Cybersecurity Communities
- Security Conferences
- OWASP Chapters
- Cybersecurity Meetups
- Women in Cybersecurity (WiCyS)
- Resources:
- Practical Exercises:
- Join cybersecurity communities and forums
- Attend local meetups and conferences
- Contribute to open-source security projects
- Participate in online discussions and forums
- Create and share cybersecurity content
-
Continuous Learning
- Cybersecurity Podcasts
- Security Research Blogs
- Academic Journals
- Security Newsletters
- GitHub Security Repositories
- Resources:
- Practical Exercises:
- Subscribe to security newsletters and podcasts
- Follow security researchers on social media
- Set up a personal blog to document your learning
- Participate in bug bounty programs
- Contribute to security tools and research
-
Beginner
- "Cybersecurity for Beginners" by Raef Meeuwisse
- "The Art of Invisibility" by Kevin Mitnick
- "Social Engineering: The Science of Human Hacking" by Christopher Hadnagy
- "Practical Malware Analysis" by Michael Sikorski and Andrew Honig
- "Cryptography for Dummies" by Chey Cobb
- "Computer Security: Principles and Practice" by William Stallings and Lawrie Brown
- "Network Security Essentials" by William Stallings
-
Intermediate
- "The Web Application Hacker's Handbook" by Dafydd Stuttard and Marcus Pinto
- "Blue Team Handbook" by Don Murdoch
- "Penetration Testing: A Hands-On Introduction to Hacking" by Georgia Weidman
- "The Tangled Web: A Guide to Securing Modern Web Applications" by Michal Zalewski
- "Threat Modeling: Designing for Security" by Adam Shostack
- "Reversing: Secrets of Reverse Engineering" by Eldad Eilam
- "The Hacker Playbook 3" by Peter Kim
-
Advanced
- "The Art of Memory Forensics" by Michael Hale Ligh et al.
- "Gray Hat Hacking: The Ethical Hacker's Handbook" by Allen Harper et al.
- "The Shellcoder's Handbook" by Chris Anley et al.
- "Practical Reverse Engineering" by Bruce Dang et al.
- "Advanced Penetration Testing" by Wil Allsopp
- "Black Hat Python" by Justin Seitz
- "Windows Internals" by Mark Russinovich et al.
-
Specialized
- "Cloud Security: A Comprehensive Guide" by Chris Dotson
- "Industrial Network Security" by Eric D. Knapp and Joel Thomas Langill
- "iOS Application Security" by David Thiel
- "Android Security Internals" by Nikolay Elenkov
- "Container Security" by Liz Rice
- "Applied Cryptography" by Bruce Schneier
- "Intelligence-Driven Incident Response" by Scott J. Roberts and Rebekah Brown
-
Learning Platforms
- TryHackMe - Interactive cybersecurity training
- HackTheBox - Penetration testing labs
- VulnHub - Vulnerable virtual machines
- PortSwigger Web Security Academy - Web security training
- Cybrary - Free cybersecurity courses
- edX Cybersecurity Courses - University-level courses
- Coursera Cybersecurity Specializations - University-level courses
- SANS Cyber Aces - Free online courses
- Offensive Security - Professional penetration testing training
- INE Security - Cybersecurity training
- PentesterLab - Web penetration testing exercises
- RangeForce - Hands-on cybersecurity training
- Pluralsight - IT and security courses
- Udemy - Various security courses
-
Practice Environments
- Damn Vulnerable Web Application (DVWA) - Vulnerable web application
- OWASP Juice Shop - Vulnerable web application
- WebGoat - Deliberately insecure web application
- Metasploitable - Vulnerable Linux virtual machine
- Vulnhub - Vulnerable virtual machines
- Hack The Box - Online penetration testing platform
- PentesterLab - Web penetration testing exercises
- Root Me - Hacking challenges
- Hacker101 CTF - CTF challenges by HackerOne
- CryptoHack - Cryptography challenges
- OverTheWire - Security wargames
- John Hammond - CTF walkthroughs and security tutorials
- IppSec - HackTheBox walkthroughs
- The Cyber Mentor - Penetration testing tutorials
- David Bombal - Networking and security tutorials
- NetworkChuck - Networking and security tutorials
- Nahamsec - Bug bounty and web security
- LiveOverflow - Exploit development and CTF
- STÖK - Bug bounty hunting
- HackerSploit - Penetration testing tutorials
- PwnFunction - Web security animations
- InsiderPhD - Bug bounty and web security
- Security Weekly - Security news and interviews
- Black Hat - Conference presentations
- DEFCONConference - Conference presentations
- SANS Offensive Operations - Offensive security techniques
- Nmap - Network discovery and security auditing
- Shodan - Search engine for Internet-connected devices
- Recon-ng - Web reconnaissance framework
- theHarvester - Email, subdomain and name harvester
- Maltego - Open source intelligence and forensics
- SpiderFoot - OSINT automation tool
- Amass - In-depth attack surface mapping and asset discovery
- Sublist3r - Subdomain enumeration tool
- OWASP Maryam - Open-source intelligence framework
- OpenVAS - Open-source vulnerability scanner
- Nessus - Vulnerability scanner
- Nikto - Web server scanner
- Qualys - Cloud-based security and compliance
- Nexpose - Vulnerability management
- Acunetix - Web vulnerability scanner
- Netsparker - Web application security scanner
- Nuclei - Vulnerability scanner based on templates
- Vulners Scanner - NSE script using Vulners.com API
- Burp Suite - Web vulnerability scanner and proxy
- OWASP ZAP - Web application security scanner
- Sqlmap - Automatic SQL injection tool
- Wfuzz - Web application fuzzer
- Dirsearch - Web path scanner
- Nikto - Web server scanner
- Skipfish - Active web application security reconnaissance tool
- w3af - Web Application Attack and Audit Framework
- Arachni - Web application security scanner framework
- Metasploit - Penetration testing framework
- BeEF - Browser Exploitation Framework
- Empire - Post-exploitation framework
- Cobalt Strike - Adversary simulation software
- PowerSploit - PowerShell post-exploitation framework
- Pupy - Cross-platform remote administration and post-exploitation tool
- Covenant - .NET command and control framework
- Sliver - Cross-platform adversary emulation framework
- Hashcat - Advanced password recovery
- John the Ripper - Password cracking tool
- Hydra - Login cracker
- Aircrack-ng - WiFi security auditing tools suite
- Medusa - Parallel network login auditor
- CrackMapExec - Post-exploitation tool
- mimikatz - Windows credential dumping
- RainbowCrack - Rainbow table implementation
- Autopsy - Digital forensics platform
- Volatility - Memory forensics framework
- FTK Imager - Forensic imaging tool
- The Sleuth Kit - Disk analysis tools
- SANS SIFT - Forensic toolkit
- Rekall - Memory analysis framework
- CAINE - Computer Aided INvestigative Environment
- GRR Rapid Response - Remote live forensics
- TheHive - Security incident response platform
- Wireshark - Network protocol analyzer
- Snort - Intrusion detection system
- OSSEC - Host-based intrusion detection
- Wazuh - Security monitoring solution
- Security Onion - Security monitoring platform
- Suricata - Network IDS/IPS
- Zeek - Network security monitor
- Sysmon - Windows system monitoring
- YARA - Pattern matching for malware detection
- ScoutSuite - Multi-cloud security auditing tool
- Prowler - AWS security best practices assessment
- CloudSploit - Cloud security scanner
- Pacu - AWS exploitation framework
- CloudGoat - Vulnerable AWS environment
- AzureHound - Azure security assessment
- GCP Audit - GCP security scanner
- Falco - Container runtime security
- Kube-bench - Kubernetes security benchmarking
- MobSF - Mobile security testing framework
- Frida - Dynamic instrumentation toolkit
- Objection - Mobile runtime exploration
- Drozer - Android security assessment
- QARK - Android app vulnerability scanner
- idb - iOS app security assessment tool
- Needle - iOS security testing framework
- Apktool - Android APK reverse engineering
- Jadx - Dex to Java decompiler
- Maltego - Open source intelligence and forensics
- Shodan - Search engine for Internet-connected devices
- theHarvester - Email, subdomain and name harvester
- Metagoofil - Metadata extraction tool
- Recon-ng - Web reconnaissance framework
- SpiderFoot - OSINT automation tool
- OSINT Framework - Collection of OSINT tools
- Sherlock - Hunt down social media accounts by username
- IntelTechniques - OSINT tools collection
-
CompTIA Security+ - Foundational cybersecurity certification
- Focus Areas: Network security, threats and vulnerabilities, identity management, cryptography
- Prerequisites: None, but Network+ and 2 years of experience recommended
- Exam Format: 90 questions, 90 minutes, performance-based and multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Security specialist, security administrator, security consultant
-
CompTIA Network+ - Networking fundamentals
- Focus Areas: Network concepts, infrastructure, operations, security, troubleshooting
- Prerequisites: None, but A+ and 9-12 months of experience recommended
- Exam Format: 90 questions, 90 minutes, performance-based and multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Network administrator, network technician, help desk technician
-
CompTIA A+ - IT fundamentals
- Focus Areas: Hardware, operating systems, software troubleshooting, networking, security
- Prerequisites: None, but 9-12 months of experience recommended
- Exam Format: Two exams: Core 1 and Core 2, 90 minutes each
- Validity: 3 years, renewable with continuing education
- Career Paths: Help desk technician, desktop support analyst, field service technician
-
Certified Information Systems Security Professional (CISSP) Associate - Entry-level version of CISSP
- Focus Areas: Same as CISSP but for those without the required experience
- Prerequisites: Pass the CISSP exam but have less than 5 years of experience
- Exam Format: Same as CISSP
- Validity: Indefinite until requirements for full CISSP are met
- Career Paths: Stepping stone to security analyst, security consultant roles
-
CompTIA CySA+ - Cybersecurity analyst
- Focus Areas: Threat detection, security monitoring, incident response, vulnerability management
- Prerequisites: Network+ and Security+ recommended, 4+ years of experience
- Exam Format: 85 questions, 165 minutes, performance-based and multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Security analyst, threat intelligence analyst, security operations center (SOC) analyst
-
CompTIA PenTest+ - Penetration testing
- Focus Areas: Planning and scoping, information gathering, vulnerability identification, attacks and exploits, reporting
- Prerequisites: Network+ and Security+ recommended, 3+ years of experience
- Exam Format: 85 questions, 165 minutes, performance-based and multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Penetration tester, vulnerability assessment analyst, security consultant
-
Certified Ethical Hacker (CEH) - Ethical hacking and countermeasures
- Focus Areas: Ethical hacking methodology, tools, techniques, countermeasures
- Prerequisites: 2 years of experience or official training
- Exam Format: 125 questions, 4 hours, multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Ethical hacker, security analyst, penetration tester
-
GIAC Security Essentials (GSEC) - Security essentials
- Focus Areas: Security administration, risk management, cryptography, access controls
- Prerequisites: None
- Exam Format: 180 questions, 5 hours, multiple choice and performance-based
- Validity: 4 years, renewable with continuing education
- Career Paths: Security administrator, security analyst, security engineer
-
Offensive Security Certified Professional (OSCP) - Penetration testing with Kali Linux
- Focus Areas: Hands-on penetration testing, exploitation, privilege escalation
- Prerequisites: Strong understanding of networking, Linux, and scripting
- Exam Format: 24-hour practical exam with report submission
- Validity: Lifetime
- Career Paths: Penetration tester, red team operator, security consultant
-
Certified Information Systems Security Professional (CISSP) - Security management
- Focus Areas: Security and risk management, asset security, security architecture, network security, identity management, security assessment, security operations, software development security
- Prerequisites: 5 years of experience in at least 2 domains
- Exam Format: 100-150 questions, 3 hours, adaptive testing
- Validity: 3 years, renewable with continuing education
- Career Paths: Security manager, security architect, CISO, security consultant
-
Certified Information Security Manager (CISM) - Information security management
- Focus Areas: Information security governance, risk management, program development, incident management
- Prerequisites: 5 years of experience in information security management
- Exam Format: 150 questions, 4 hours, multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Security manager, security director, CISO
-
GIAC Certified Incident Handler (GCIH) - Incident handling
- Focus Areas: Incident handling process, computer crime investigation, hacker techniques
- Prerequisites: None
- Exam Format: 115 questions, 3 hours, multiple choice
- Validity: 4 years, renewable with continuing education
- Career Paths: Incident responder, SOC analyst, security analyst
-
Certified Cloud Security Professional (CCSP) - Cloud security
- Focus Areas: Cloud concepts, architecture, design, security, operations, legal compliance
- Prerequisites: 5 years of IT experience, 3 years in security, 1 year in cloud security
- Exam Format: 125 questions, 3 hours, multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Cloud security architect, cloud security engineer, cloud security manager
-
GIAC Certified Forensic Analyst (GCFA) - Digital forensics
- Focus Areas: Digital forensics techniques, incident response, malware analysis
- Prerequisites: None
- Exam Format: 115 questions, 3 hours, multiple choice
- Validity: 4 years, renewable with continuing education
- Career Paths: Digital forensic analyst, incident responder, malware analyst
-
Offensive Security Certified Expert (OSCE) - Advanced penetration testing
- Focus Areas: Advanced exploitation techniques, custom exploit development
- Prerequisites: OSCP recommended
- Exam Format: 48-hour practical exam with report submission
- Validity: Lifetime
- Career Paths: Advanced penetration tester, exploit developer, security researcher
-
Certified Information Systems Auditor (CISA) - Information systems auditing
- Focus Areas: IS audit process, governance, systems acquisition, operations, protection of assets
- Prerequisites: 5 years of experience in IS audit, control, or security
- Exam Format: 150 questions, 4 hours, multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: IS auditor, IT audit manager, compliance officer
-
Security Analyst
- Responsibilities: Monitor and analyze security alerts, implement security measures, conduct vulnerability assessments
- Skills Required: Network security, security tools, vulnerability assessment, incident response
- Certifications: CompTIA Security+, CySA+, GIAC GSEC
- Career Progression: Senior Security Analyst → Security Engineer → Security Architect
-
Security Engineer
- Responsibilities: Design and implement security solutions, manage security infrastructure, conduct security assessments
- Skills Required: Network security, security architecture, security tools, scripting
- Certifications: CISSP, GIAC GSEC, CEH
- Career Progression: Senior Security Engineer → Security Architect → CISO
-
SOC Analyst
- Responsibilities: Monitor security events, analyze alerts, respond to incidents, maintain security tools
- Skills Required: SIEM tools, incident response, network security, log analysis
- Certifications: CompTIA Security+, CySA+, GCIH
- Career Progression: SOC Analyst Level 2 → SOC Analyst Level 3 → SOC Manager
-
Incident Responder
- Responsibilities: Investigate and remediate security incidents, develop incident response plans, conduct forensic analysis
- Skills Required: Digital forensics, malware analysis, incident response, threat hunting
- Certifications: GCIH, GCFA, GREM
- Career Progression: Senior Incident Responder → Incident Response Manager → Security Director
-
Security Architect
- Responsibilities: Design secure systems and networks, develop security standards, evaluate security solutions
- Skills Required: Security architecture, risk assessment, compliance, technical leadership
- Certifications: CISSP, CISM, SABSA
- Career Progression: Senior Security Architect → Security Director → CISO
-
Penetration Tester
- Responsibilities: Test systems for vulnerabilities through simulated attacks, document findings, recommend remediation
- Skills Required: Ethical hacking, exploitation, scripting, report writing
- Certifications: OSCP, CEH, PenTest+
- Career Progression: Senior Penetration Tester → Red Team Lead → Security Consultant
-
Red Team Operator
- Responsibilities: Simulate advanced adversaries to test defenses, develop custom tools, conduct long-term engagements
- Skills Required: Advanced exploitation, social engineering, evasion techniques, custom tool development
- Certifications: OSCP, OSCE, GXPN
- Career Progression: Senior Red Team Operator → Red Team Lead → Director of Offensive Security
-
Vulnerability Researcher
- Responsibilities: Discover and analyze new vulnerabilities, develop proof-of-concept exploits, research security weaknesses
- Skills Required: Reverse engineering, exploit development, programming, vulnerability analysis
- Certifications: OSCE, GXPN, OSEE
- Career Progression: Senior Vulnerability Researcher → Security Research Lead → Security Director
-
Exploit Developer
- Responsibilities: Develop exploits for vulnerabilities, create custom attack tools, research exploitation techniques
- Skills Required: Advanced programming, reverse engineering, exploit development, assembly language
- Certifications: OSCE, OSEE, GXPN
- Career Progression: Senior Exploit Developer → Research Lead → Security Director
-
Chief Information Security Officer (CISO)
- Responsibilities: Executive responsible for an organization's security strategy, policies, and programs
- Skills Required: Leadership, risk management, security governance, business acumen, communication
- Certifications: CISSP, CISM, CGEIT
- Career Progression: Terminal position, may move to larger organizations or consulting
-
Security Manager
- Responsibilities: Manage security teams and operations, implement security policies, oversee security projects
- Skills Required: Team management, security operations, project management, risk assessment
- Certifications: CISSP, CISM, PMP
- Career Progression: Security Director → CISO
-
Security Consultant
- Responsibilities: Advise organizations on security matters, conduct assessments, develop security strategies
- Skills Required: Security assessment, consulting, communication, technical expertise
- Certifications: CISSP, CISA, CISM
- Career Progression: Senior Consultant → Principal Consultant → Practice Lead
-
GRC (Governance, Risk, Compliance) Specialist
- Responsibilities: Ensure compliance with regulations and standards, conduct risk assessments, develop security policies
- Skills Required: Compliance frameworks, risk assessment, policy development, auditing
- Certifications: CISA, CRISC, CISM
- Career Progression: GRC Manager → Director of Compliance → CISO
-
Digital Forensic Analyst
- Responsibilities: Investigate digital evidence, recover and analyze data, document findings for legal proceedings
- Skills Required: Digital forensics tools, evidence handling, chain of custody, legal knowledge
- Certifications: GCFA, EnCE, CCFE
- Career Progression: Senior Forensic Analyst → Forensic Manager → Director of Forensics
-
Malware Analyst
- Responsibilities: Analyze malicious software, reverse engineer malware, develop detection methods
- Skills Required: Reverse engineering, programming, malware analysis tools, sandboxing
- Certifications: GREM, GXPN, GCIH
- Career Progression: Senior Malware Analyst → Threat Research Lead → Security Director
-
Cloud Security Specialist
- Responsibilities: Secure cloud environments, implement cloud security controls, assess cloud security
- Skills Required: Cloud platforms (AWS, Azure, GCP), cloud security tools, DevSecOps
- Certifications: CCSP, AWS Certified Security, Azure Security Engineer
- Career Progression: Senior Cloud Security Specialist → Cloud Security Architect → CISO
-
Application Security Engineer
- Responsibilities: Secure software applications, conduct code reviews, implement secure coding practices
- Skills Required: Secure coding, application security testing, programming, SDLC
- Certifications: CSSLP, GWAPT, OSWE
- Career Progression: Senior AppSec Engineer → AppSec Architect → Director of Application Security
- Reddit r/cybersecurity - General cybersecurity discussions
- Reddit r/netsec - Network security news and discussions
- Reddit r/AskNetsec - Questions about network security
- Stack Exchange Information Security - Q&A for information security professionals
- OWASP Community - Web application security community
- Hack The Box Forum - Penetration testing and CTF discussions
- TryHackMe Discord - Community for TryHackMe platform users
- NetSec Focus - Information security community
- Bleeping Computer Forums - Computer security forums
- ISACA - Information Systems Audit and Control Association
- (ISC)² - International Information System Security Certification Consortium
- ISSA - Information Systems Security Association
- SANS - SysAdmin, Audit, Network, and Security Institute
- EC-Council - International Council of E-Commerce Consultants
- CompTIA - Computing Technology Industry Association
- CSA - Cloud Security Alliance
- FIRST - Forum of Incident Response and Security Teams
- Women in Cybersecurity (WiCyS) - Organization for women in cybersecurity
- DEF CON - One of the world's largest hacker conventions
- Black Hat - Information security conference
- RSA Conference - Cybersecurity conference
- BSides - Community-driven framework for information security events
- SANS Summits - Cybersecurity summits
- Infosecurity Europe - Europe's information security event
- CyberSecurity Summit - Cybersecurity leadership summit
- Women in Cybersecurity Conference - Conference for women in cybersecurity
- CISO Forum - Chief Information Security Officer forum
- PicoCTF - Free, educational CTF for beginners
- CTFlearn - Online platform with various CTF challenges
- Hacker101 CTF - CTF by HackerOne for learning web security
- CyberDefenders - Blue team CTF challenges
- SANS Holiday Hack Challenge - Annual holiday-themed CTF
- Google CTF Beginners Quest - Beginner-friendly CTF by Google
- TryHackMe - Learn cybersecurity through CTF-like challenges
- OverTheWire - Wargames for learning security concepts
- DEF CON CTF - One of the oldest and most prestigious CTFs
- CSAW CTF - CTF competition by NYU Tandon School of Engineering
- PlaidCTF - Annual CTF by Plaid Parliament of Pwning
- HITCON CTF - Hacks In Taiwan Conference CTF
- Dragon CTF - CTF by Dragon Sector team
- RuCTF - Russian CTF
- 0CTF/TCTF - International CTF competition
- Hack.lu CTF - CTF during the Hack.lu conference
- CTFtime - CTF events calendar and team rankings
- CTF Field Guide - Guide to CTF competitions
- LiveOverflow YouTube Channel - CTF walkthroughs and explanations
- John Hammond YouTube Channel - CTF walkthroughs
- IppSec YouTube Channel - HackTheBox walkthroughs
- CTF Resources - Collection of CTF resources
- Awesome CTF - List of CTF frameworks, libraries, resources
- CTF Tools - Collection of tools for CTF competitions
- Hack The Box - Online platform for penetration testing practice
- TryHackMe - Learn cybersecurity through hands-on exercises
- VulnHub - Vulnerable virtual machines for practice
- PortSwigger Web Security Academy - Web security training
- PentesterLab - Web penetration testing exercises
- Root Me - Hacking challenges platform
- HackThis - Hacking challenges and tutorials
- Damn Vulnerable Web Application (DVWA) - Vulnerable web application
- OWASP Juice Shop - Vulnerable web application
-
Virtualization Platforms
- VirtualBox - Free virtualization software
- VMware Workstation/Player - Virtualization software
- Proxmox VE - Open-source virtualization platform
- Hyper-V - Windows virtualization
-
Vulnerable Systems
- Metasploitable - Vulnerable Linux virtual machine
- DVWA - Damn Vulnerable Web Application
- WebGoat - Deliberately insecure web application
- OWASP Juice Shop - Vulnerable web application
- Vulnhub Images - Collection of vulnerable virtual machines
-
Attack Platforms
- Kali Linux - Penetration testing distribution
- Parrot Security OS - Security-focused Linux distribution
- BlackArch Linux - Penetration testing distribution
- Commando VM - Windows-based penetration testing VM
-
Network Simulation
- GNS3 - Network simulation software
- Cisco Packet Tracer - Network simulation tool
- EVE-NG - Network emulation platform
- Netkit - Network emulation tool
- Building a Home Lab for Offensive Security
- Building a Cybersecurity Lab
- Home Lab Setup Guide
- Network Security Lab Setup
- Building an Active Directory Lab
- Cybersecurity Home Lab on a Budget
- National Vulnerability Database (NVD) - U.S. government repository of vulnerability data
- CVE Details - Security vulnerability database
- Exploit Database - Archive of exploits and vulnerable software
- Vulnerability Lab - Vulnerability research and security database
- Packet Storm - Information security services, news, files, and tools
- Vulners - Vulnerability database with API
- VulDB - Vulnerability database
- Rapid7 Vulnerability & Exploit Database - Vulnerability and exploit database
- Krebs on Security - Security news and investigation
- Schneier on Security - Security blog by Bruce Schneier
- The Hacker News - Cybersecurity news and analysis
- Threatpost - Information security news
- Dark Reading - Cybersecurity news and analysis
- Naked Security - Security news from Sophos
- BleepingComputer - Information security and technology news
- Security Affairs - Information security news
- Graham Cluley - Computer security news and opinions
- arXiv Cryptography and Security - Preprint research papers
- IEEE Security & Privacy - Security research journal
- USENIX Security Symposium - Security conference papers
- ACM CCS - Computer and Communications Security conference
- NDSS Symposium - Network and Distributed System Security Symposium
- Black Hat Briefings - Security conference presentations
- DEF CON Media - DEF CON conference presentations
- Virus Bulletin - Security research and analysis
- Shodan - Search engine for Internet-connected devices
- Censys - Search engine for Internet-connected devices
- VirusTotal - Analyze suspicious files and URLs
- Any.Run - Interactive malware analysis
- Hybrid Analysis - Free malware analysis service
- Cuckoo Sandbox - Automated malware analysis
- MITRE ATT&CK - Knowledge base of adversary tactics and techniques
- OWASP - Open Web Application Security Project resources
Contributions to this roadmap are welcome! Please feel free to submit a pull request or open an issue if you have suggestions for improvements or additions.
- Fork the repository
- Create your resource branch (
git checkout -b resource/new_tool
) - Commit your changes (
git commit -m 'Add some resources'
) - Push to the branch (
git push origin resource/new_tool
) - Open a Pull Request
"Security is a process, not a product." - Bruce Schneier
"The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards." - Gene Spafford
Made with ❤️ by Hamed Esam