logo

Your Step-by-Step Cyber Security Journey

A comprehensive guide to help you become a successful Cyber Security professional from scratch.

Start the Journey

Introduction to Cyber Security

What is Cyber Security?

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.

Who is this for?

This roadmap is for anyone interested in protecting computer systems and networks from cyber attacks.

Step-by-Step Roadmap

This section outlines the key steps and skills you need to acquire in a logical order, from foundational knowledge to advanced topics.

Phase 1: IT Fundamentals

Step 1: Networking

Understand how data moves across networks.

TCP/IP DNS HTTP/S IP Addressing
Step 2: Operating Systems

Gain proficiency in the most common operating systems.

Linux Linux Windows Command Line
Step 3: Hardware and Virtualization

Understand physical components and how virtualization works.

VirtualBox VMware

Phase 2: Core Cybersecurity Concepts

Step 4: The CIA Triad

Learn the foundational model of information security.

Confidentiality Integrity Availability
Step 5: Common Threats & Vulnerabilities

Learn to identify different types of cyberattacks.

Malware Phishing Ransomware

Phase 3: Practical Skills & Tools

Step 6: Programming & Scripting

Automation is a key skill for a cybersecurity professional.

Python Python Bash Bash
Step 7: Security Tools

Get familiar with the tools of the trade.

Wireshark Nessus Metasploit
Step 8: Ethical Hacking

Learn to identify and exploit vulnerabilities to improve security.

Penetration Testing Web Application Security
Step 9: Security Operations (SOC)

Learn how to monitor, detect, and respond to security incidents.

SIEM Incident Response

Phase 4: Specialization & Career Paths

Step 10: Choose a Specialization

Cybersecurity offers a wide range of career paths.

SOC Analyst Penetration Tester Security Engineer

Phase 5: Continuous Learning

Step 11: Get Certified

Certifications can validate your skills and improve your job prospects.

Security+ CEH CISSP
Step 12: Stay Informed

Follow cybersecurity news and blogs to stay up-to-date.

News & Blogs CTF Competitions

Project Ideas

Beginner

  • Set up a home network and secure it with a firewall.
  • Learn to use basic security tools like Nmap and Wireshark.

Intermediate

  • Perform a penetration test on a test environment like Metasploitable.
  • Analyze malware samples in a safe environment.

Advanced

  • Participate in bug bounty programs.
  • Develop your own security tools.

Famous Courses

Here you can find a curated list of well-regarded courses to accelerate your learning.

Google Cybersecurity Professional Certificate

Coursera

TryHackMe

An online platform for learning cyber security, through gamified labs.

Hack The Box

A platform to test and advance your skills in penetration testing and cybersecurity.

Cybrary

Cybersecurity Training that Tangibly Reduces Business Risk

Documentation Links

Essential documentation and official guides for key tools and technologies.

Hacking in Myanmar , Magic or Not

Explaining Public Exploit,Default or Weak Credentials and Programmer Error

NIST Cybersecurity Framework

A set of standards, guidelines, and best practices to manage cybersecurity-related risk.

MITRE ATT&CK Framework

A globally-accessible knowledge base of adversary tactics and techniques.

A Guide to Cybersecurity

A guide on how organizations can create their own cybersecurity policies, standards, and procedures.

YouTube Channels

Popular YouTube channels that provide tutorials and insights into the world of Cyber Security.

Ebooks

Recommended e-books and reading materials for a deeper understanding.

Cyber security for beginners Ebook.

heimdalsecurity

PracticaL Malware Analysis:The Hands-On Guide to Dissecting Malicious Software

Michael Sikorski Andrew Honig

The Hacker's underground handbook Myanmar Translation

Introduction to hacking, programming and linux

CYBER SECURITY ESSENTIALS

James Graham