Cybersecurity Roadmap
Security fundamentals, threat analysis & protection
Foundations
It is the practice of protecting systems, networks, and programs from digital attacks. The core goal is the CIA Triad: Confidentiality (only authorized access), Integrity (data is not tampered with), and Availability (systems are up and running).
White Hat: Ethical hackers hired to find vulnerabilities and fix them.
Black Hat: Malicious hackers who exploit flaws for personal gain or damage.
Grey Hat: Operated without permission but often without malicious intent, though still illegal.
Attack Surface: The sum of all points where an unauthorized user can try to enter data or extract data (e.g., open ports, input fields).
Threat Modeling: A structured approach to identifying potential threats to a system and prioritizing mitigations.
You cannot secure what you don't understand.
- IP: The address of a computer.
- DNS: The phonebook translating domains (google.com) to IPs.
- HTTP: The protocol for web communication. Secure it with
HTTPS/TLS.
Operating Systems & Linux
Linux is the OS of the internet.
Filesystem: Starts at root /. Key folders:
/etc (config), /var (logs), /home (users).
Permissions: Read (r), Write (w), Execute (x) for Owner, Group,
Others. Crucial for limiting access.
Processes: Running programs. Use `ps` or `top` to view them.
Services (Daemons): Background processes (like a web server)
managed by `systemd` (e.g., `systemctl start nginx`).
Scripting allows you to automate tasks and attacks. A simple bash script can scan a network, parse logs, or automate backups. It's an essential skill for any security professional.
Networking for Security
TCP: Reliable, connection-oriented (3-way handshake). Emails, Web.
UDP: Fast, connectionless, no guarantee of delivery. Streaming,
DNS.
Attackers exploit these (e.g., SYN Flood attacks on TCP).
Firewall: A security device (software/hardware) that filters network
traffic based on rules.
NAT (Network Address Translation): Allows private IP addresses
to share a single public IP, adding a layer of obscuration.
Ports are virtual doors for services.
Common Ports: 80 (HTTP), 443 (HTTPS), 22 (SSH), 21 (FTP).
Scanning for open ports (using Nmap) is the first step in reconnaissance.
Web Security Basics
Understanding GET, POST, PUT, DELETE is vital. Vulnerabilities often arise when dangerous methods (like PUT/DELETE) are left enabled on public servers, or when sensitive data is passed via GET parameters (visible in history).
Used to maintain state.
Risk: Session Hijacking. If an attacker steals your session
cookie, they become you.
Protection: Use `HttpOnly` and `Secure` flags on cookies.
The standard awareness document for developers. Includes:
1. Injection (SQLi)
2. Broken Authentication
3. XSS (Cross-Site Scripting)
Learning to exploit these (legally) helps you prevent them.
Practice Platforms
Beginner-friendly, guided learning paths
Advanced labs for penetration testing
CTF-style challenges for beginners
Career Paths
Simulates cyberattacks on a company's system (with permission) to find weaknesses before criminals do. Often generates a report detailing vulnerabilities.
Monitors an organization's networks for security breaches. They install firewalls, encryption programs, and investigate violations.
The defensive side. SOC (Security Operations Center) analysts work 24/7 to detect, analyze, and respond to cybersecurity incidents in real-time.
Advanced offensive security. Unlike standard pentesting, Red Teams simulate full-scope, multi-layered attacks (social engineering, physical access, network breach) to test the organization's detection capabilities.