🛡️ Complete Guide 2025

Cybersecurity Roadmap

A comprehensive, structured path from beginner to expert — covering skills, tools, certifications, and real-world techniques used by security professionals.

6
Phases
80+
Skills
60+
Tools
20+
Certifications
2–5 yrs
Full Journey
📍 Your Learning Path
1

Phase 1 — Foundations (3–6 months)

Linux, OS basics, programming fundamentals, networking concepts. Build the ground floor every security expert stands on.

Linux Python CLI CompTIA ITF+
2

Phase 2 — Networking & Protocols (2–4 months)

TCP/IP, OSI model, DNS, HTTP, firewalls, VPNs. You can't secure what you don't understand.

TCP/IP Wireshark Nmap CompTIA Network+
3

Phase 3 — Security Core (3–5 months)

CIA triad, cryptography, authentication, risk management, OWASP Top 10, incident basics.

CompTIA Security+ OWASP Cryptography
4

Phase 4 — Offensive Security / Red Team (4–8 months)

Ethical hacking, penetration testing, exploitation, web app attacks, post-exploitation.

Metasploit Burp Suite CEH / OSCP
5

Phase 5 — Defensive Security / Blue Team (3–6 months)

SIEM, SOC operations, threat hunting, IDS/IPS, forensics, malware analysis.

Splunk Elastic SIEM Blue Team+
6

Phase 6 — Specialization & Advanced (Ongoing)

Cloud security, malware reverse engineering, exploit dev, threat intel, GRC, AI/ML security.

CISSP AWS Security CISM
💼 Career Paths
Offensive
🗡️ Penetration Tester
Find vulnerabilities before attackers do. Test systems, apps, and networks with permission.
Kali LinuxMetasploitBurp SuiteOSCP
Defensive
🛡️ SOC Analyst
Monitor, detect, and respond to threats in real time. The front-line defender of organizations.
SplunkSIEMThreat HuntingCompTIA CySA+
Forensics
🔬 Digital Forensics
Investigate security incidents, recover evidence, and analyze malware after an attack.
AutopsyVolatilityFTKGCFE
Cloud
☁️ Cloud Security Engineer
Secure AWS, Azure, GCP environments. Manage IAM, cloud-native threats, and misconfigurations.
AWSTerraformCSPMCCSP
Management
📋 GRC / Security Manager
Governance, Risk & Compliance. Lead audits, policy, and strategic security decisions.
ISO 27001NISTGDPRCISSP
Research
🔍 Threat Intelligence Analyst
Track threat actors, analyze malware campaigns, and produce intel reports for defenders.
MITRE ATT&CKOSINTSTIX/TAXII
🏗️

Phase 1: IT Foundations

Master the fundamentals that underpin all cybersecurity knowledge. No shortcuts here — these skills are used every single day.

3–6 months Beginner
Foundation progressStart here
🐧
Linux & CLI
Essential for every security role
  • File system navigation (ls, cd, mkdir, rm, chmod)
  • Process management (ps, kill, top, htop)
  • User & permission management
  • Shell scripting (bash basics)
  • Package management (apt, yum, pacman)
  • SSH, SCP, rsync remote access
  • Log reading (/var/log/, journalctl)
  • Cron jobs and automation
💻
Operating Systems
Windows, Linux, macOS internals
  • Windows Registry, Event Viewer, Task Manager
  • Active Directory basics
  • Windows Defender, Group Policy
  • macOS security features & SIP
  • Virtualization (VirtualBox, VMware)
  • Containerization basics (Docker)
  • Boot process & kernel concepts
🐍
Programming Basics
Python, Bash, PowerShell
  • Python: variables, loops, functions, files
  • Python: requests, socket, subprocess libraries
  • Bash scripting for automation
  • PowerShell for Windows administration
  • Regular expressions (regex)
  • Basic HTML/CSS/JavaScript (for web security)
  • Reading/writing JSON, XML, CSV
  • Git version control basics
🗄️
Database Fundamentals
SQL & NoSQL basics
  • SQL queries: SELECT, INSERT, UPDATE, DELETE
  • Database schemas and relationships
  • SQL injection concepts (attacker perspective)
  • MySQL, PostgreSQL, SQLite basics
  • NoSQL: MongoDB basics
  • Database authentication & access control
🎯 Phase 1 Certifications
Entry Level
CompTIA ITF+
CompTIA
IT Fundamentals certification. Perfect first cert for non-IT backgrounds entering cybersecurity.
No prerequisites~$130
Entry Level
Google IT Support
Google / Coursera
Comprehensive IT foundation including networking, operating systems, and troubleshooting.
No prerequisites~$300/yr
🌐

Phase 2: Networking & Protocols

Deep dive into how networks work — from physical cables to application-layer protocols. Security runs on networks.

2–4 months Beginner–Intermediate
📡
OSI & TCP/IP Model
The backbone of all networking
  • 7 OSI layers & what happens at each
  • TCP/IP 4-layer model (Internet model)
  • Encapsulation & decapsulation
  • IP addressing: IPv4 / IPv6 subnetting
  • MAC addresses & ARP
  • CIDR notation & subnet masks
  • VLSM (Variable Length Subnet Masking)
🔌
Key Protocols
HTTP, DNS, DHCP, FTP, SMTP & more
  • HTTP/HTTPS — how web traffic works
  • DNS — name resolution, zone records
  • DHCP — IP address assignment
  • FTP / SFTP / FTPS differences
  • SMTP, POP3, IMAP — email protocols
  • SSH vs Telnet security comparison
  • SNMP, NTP, ICMP
  • TLS/SSL handshake process
🔥
Firewalls & Network Security
Perimeter & deep packet inspection
  • Stateful vs stateless firewalls
  • Next-Generation Firewalls (NGFW)
  • VPN types: IPSec, SSL/TLS, WireGuard
  • Network Address Translation (NAT)
  • Port forwarding & DMZ configuration
  • Network segmentation & VLANs
  • Proxy servers (forward & reverse)
  • Load balancers & WAF basics
🔬
Packet Analysis
Capture, decode, and analyze traffic
  • Wireshark: capture filters & display filters
  • Reading TCP handshakes & teardowns
  • Identifying malicious traffic patterns
  • tcpdump command-line packet capture
  • TLS decryption with pre-master keys
  • Traffic baselining & anomaly detection
  • Zeek (formerly Bro) network analysis
🎯 Phase 2 Certifications
Intermediate
CompTIA Network+
CompTIA
Industry-standard networking certification. Covers OSI, protocols, troubleshooting, and security basics.
Recommended~$350
Vendor
Cisco CCNA
Cisco
Associate-level Cisco certification. Deep networking skills highly valued in enterprise environments.
High value~$330
🔐

Phase 3: Security Fundamentals

CIA triad, cryptography, access control, risk management, and the security frameworks that govern the industry.

3–5 months Intermediate
🔑
Cryptography
The math behind security
  • Symmetric encryption: AES, DES, 3DES
  • Asymmetric encryption: RSA, ECC, Diffie-Hellman
  • Hashing: MD5, SHA-1, SHA-256, bcrypt
  • Digital signatures & certificates
  • PKI (Public Key Infrastructure)
  • Certificate Authorities (CA)
  • TLS/SSL certificate chain of trust
  • Steganography basics
🌐
OWASP Top 10
Most critical web vulnerabilities
  • A01: Broken Access Control
  • A02: Cryptographic Failures
  • A03: Injection (SQLi, XSS, etc.)
  • A04: Insecure Design
  • A05: Security Misconfiguration
  • A06: Vulnerable Components
  • A07: Auth & Session Failures
  • A08–A10: SSRF, Logging failures
⚖️
Risk Management & GRC
Governance, Risk, Compliance
  • CIA Triad: Confidentiality, Integrity, Availability
  • Risk assessment methodologies
  • NIST Cybersecurity Framework
  • ISO 27001/27002 overview
  • GDPR, HIPAA, PCI-DSS basics
  • Security policies & procedures
  • Business continuity & disaster recovery
  • Security awareness training
🚨
Incident Response Basics
NIST IR lifecycle
  • IR phases: Prepare → Identify → Contain → Eradicate → Recover → Lessons
  • Creating incident response plans
  • Evidence collection & chain of custody
  • Triage and severity classification
  • Communication during incidents
  • Tabletop exercises
🎯 Phase 3 Certifications
Most Recognized
CompTIA Security+
CompTIA
The gold standard entry security cert. Required by many government & enterprise roles. Covers all security fundamentals.
DoD Approved~$400SY0-701
Intermediate
eJPT (eLearnSecurity)
INE Security
Hands-on practical entry-level penetration testing cert. Great bridge into offensive security.
Practical exam~$200
⚔️

Phase 4: Offensive Security / Red Team

Think like an attacker to defend better. Ethical hacking, penetration testing, exploitation techniques, and post-exploitation.

4–8 months Intermediate–Advanced
🕵️
Reconnaissance
Information gathering (OSINT)
  • Passive recon: WHOIS, Shodan, Censys
  • Google dorks & advanced search operators
  • LinkedIn OSINT, social engineering recon
  • theHarvester: email & subdomain gathering
  • Maltego: graphical link analysis
  • Recon-ng automated framework
  • Subdomain enumeration (subfinder, amass)
  • DNS enumeration (dnsx, dnsenum)
🔍
Scanning & Enumeration
Map the attack surface
  • Nmap: port scanning, service detection, OS fingerprinting
  • Nmap scripting engine (NSE scripts)
  • Masscan for fast large-scale scanning
  • Nikto: web server vulnerability scanner
  • Gobuster / ffuf directory brute forcing
  • SMB enumeration (enum4linux, smbclient)
  • SNMP enumeration
  • Banner grabbing & service fingerprinting
💣
Exploitation
Turn vulnerabilities into access
  • Metasploit Framework: modules, payloads, sessions
  • Manual exploit adaptation from PoCs
  • SQLmap automated SQL injection
  • Buffer overflow exploitation (x86/x64)
  • Password attacks: Hydra, Medusa, John, Hashcat
  • Exploit-DB / SearchSploit usage
  • CVE understanding & CVSS scoring
  • Zero-day research introduction
🕸️
Web Application Pentesting
OWASP in practice
  • Burp Suite: intercept, repeater, intruder, scanner
  • SQL Injection: manual & blind techniques
  • XSS: reflected, stored, DOM-based
  • CSRF, SSRF, XXE attacks
  • Authentication bypass techniques
  • IDOR & access control testing
  • File upload vulnerabilities
  • JWT manipulation & attacks
🏃
Post-Exploitation
After you get in
  • Privilege escalation: Linux & Windows
  • Credential dumping (Mimikatz)
  • Lateral movement techniques
  • Persistence mechanisms
  • Data exfiltration methods
  • Covering tracks & log manipulation
  • Active Directory attacks (Kerberoasting, Pass-the-Hash)
  • BloodHound AD attack path analysis
📝
Pentest Reporting
Communicating findings
  • Executive summary writing
  • Technical report structure
  • Risk rating (CVSS, DREAD)
  • Proof-of-concept screenshots & evidence
  • Remediation recommendations
  • Scope & rules of engagement
  • PTES (Pen Test Execution Standard)
🎯 Phase 4 Certifications
Gold Standard
OSCP
Offensive Security
Most respected hands-on hacking cert. 24-hour practical exam — you must compromise real machines. Proves real skill.
Highly valued~$1499Lab required
Intermediate
CEH (EC-Council)
EC-Council
Certified Ethical Hacker. Theory-heavy but widely recognized by HR teams and government agencies.
HR recognized~$1000
Beginner Offensive
CompTIA PenTest+
CompTIA
Entry-level pentest cert covering methodology, tools, and reporting. Good stepping stone to OSCP.
Security+ recommended~$400
🛡️

Phase 5: Defensive Security / Blue Team

Monitor threats, hunt attackers, analyze malware, and respond to incidents. The guardians of the enterprise.

3–6 months Intermediate–Advanced
📊
SIEM & Log Analysis
Security event aggregation
  • Splunk: SPL queries, dashboards, alerts
  • Elastic Stack (ELK): Kibana, Logstash, Beats
  • Microsoft Sentinel (cloud SIEM)
  • Log types: Windows Event, Syslog, auth.log
  • Correlation rules & detection logic
  • Alert tuning & reducing false positives
  • SIEM architecture & data sources
🔎
Threat Hunting
Proactively find hidden threats
  • Hypothesis-driven hunting methodology
  • MITRE ATT&CK framework usage
  • Hunting for LOLBins (Living off the Land)
  • Detecting lateral movement in logs
  • Behavioral analytics & UEBA
  • Sigma rules for detection engineering
  • YARA rules for malware hunting
  • Threat intelligence integration
🦠
Malware Analysis
Static & dynamic analysis
  • Static analysis: strings, file headers, imports
  • Dynamic analysis: sandbox execution
  • ANY.RUN, Cuckoo Sandbox, VirusTotal
  • IDA Pro / Ghidra for reverse engineering
  • x64dbg / OllyDbg debugging
  • PE file format analysis
  • Obfuscation & packing detection
  • Malware family identification
🧪
Digital Forensics
Evidence collection & analysis
  • Disk imaging (dd, FTK Imager)
  • File system forensics (NTFS, ext4)
  • Memory forensics (Volatility)
  • Autopsy for case management
  • Registry analysis (RegRipper)
  • Browser & email artifact recovery
  • Deleted file recovery
  • Chain of custody documentation
🎯 Phase 5 Certifications
Blue Team
CompTIA CySA+
CompTIA
Cybersecurity Analyst certification. Focuses on threat detection, analysis, and response using SIEM and other tools.
Security+ recommended~$400
Blue Team Practical
BTL1 (Blue Team Labs)
Security Blue Team
Hands-on blue team cert covering phishing, SIEM, threat intel, DFIR. Practical 24-hour exam.
Practical exam~$500
Forensics
GCFE / GCFA
GIAC / SANS
GIAC Certified Forensic Examiner/Analyst. Highly respected in forensics and incident response roles.
Premium~$2000+
🚀

Phase 6: Specialization & Advanced

Choose your domain. Cloud security, exploit development, threat intelligence, AI security, or leadership. This is where careers diverge.

Ongoing Advanced
☁️
Cloud Security
AWS, Azure, GCP hardening
  • AWS IAM: roles, policies, least privilege
  • S3 bucket security & encryption
  • VPC, security groups, NACLs
  • CloudTrail, GuardDuty, Security Hub
  • Azure Active Directory & Conditional Access
  • Cloud misconfigurations (ScoutSuite, Prowler)
  • Container security (Kubernetes, Docker)
  • Serverless & microservices security
🧬
Exploit Development
Writing your own exploits
  • x86/x64 assembly language
  • Stack-based buffer overflows
  • Heap exploitation techniques
  • ROP chains (Return-Oriented Programming)
  • Format string vulnerabilities
  • Bypassing ASLR, DEP, stack canaries
  • Windows kernel exploitation
  • Fuzzing with AFL++, libFuzzer
🧠
Threat Intelligence
Know your adversary
  • Threat actor profiling & TTPs
  • MITRE ATT&CK for CTI
  • STIX/TAXII for sharing intel
  • OpenCTI, MISP platforms
  • Dark web monitoring
  • Diamond Model of Intrusion Analysis
  • Cyber Kill Chain methodology
  • Intelligence production & dissemination
🤖
AI / ML Security
Emerging threat landscape
  • Adversarial ML attacks
  • Model poisoning & data poisoning
  • Prompt injection in LLMs
  • AI-powered threat detection
  • Deepfake detection methods
  • Securing ML pipelines
  • AI governance & ethics in security
🎯 Phase 6 Certifications
Pinnacle
CISSP
ISC²
Chief Information Security Officer's cert. Covers 8 security domains. 5 years experience required. Opens C-suite doors.
5yr exp required~$749
Cloud
AWS Security Specialty
Amazon Web Services
Advanced AWS security cert. Covers IAM, encryption, monitoring, incident response in AWS environments.
AWS experience~$300
Elite Offensive
OSED / OSWE / OSEP
Offensive Security
Advanced Offensive Security certs. OSED = exploit dev, OSWE = web expert, OSEP = evasion techniques.
OSCP prerequisite~$1499 each
Management
CISM
ISACA
Certified Information Security Manager. For security leaders managing programs, risk, and governance.
5yr exp~$575
🔧

All Cybersecurity Tools

Every major tool used by security professionals — organized by category. Hover for more details.

60+ Tools
🔍 Reconnaissance & OSINT
Shodan
Search engine for internet-connected devices. Find exposed services, IoT, cameras.
OSINT
Maltego
Graphical link analysis for OSINT. Maps relationships between people, orgs, IPs.
OSINT
theHarvester
Gather emails, subdomains, IPs from public sources like Google, Shodan, LinkedIn.
Recon
Recon-ng
Web reconnaissance framework with modular structure similar to Metasploit.
Recon
Amass
In-depth attack surface mapping and asset discovery. Subdomain enumeration.
Recon
Censys
Search engine for certificates, IPs, protocols. Similar to Shodan with cert focus.
OSINT
📡 Scanning & Network Analysis
Nmap
The king of port scanners. Service detection, OS fingerprinting, NSE scripting.
Scanner
Wireshark
GUI packet analyzer. Capture and dissect network traffic in real time.
Network
Masscan
Fastest port scanner on Earth. Scans the entire internet in minutes.
Scanner
tcpdump
CLI packet capture tool. Essential for remote servers without GUI.
Network
Nikto
Web server scanner. Finds dangerous files, outdated software, server misconfigs.
Web
Netcat (nc)
Swiss army knife of networking. Port scanning, banners, reverse shells, file transfer.
Network
Zeek (Bro)
Network traffic analyzer for security monitoring. Generates rich connection logs.
Network
Gobuster
Directory and subdomain brute-forcer. Fast Go-based alternative to Dirb.
Web
💣 Exploitation & Offensive
Metasploit
Most popular exploitation framework. Thousands of modules, payloads, post-exploit.
Exploit
Burp Suite
Web application security testing platform. Intercept, scan, fuzz, exploit web apps.
Web
SQLmap
Automatic SQL injection and database takeover tool. Supports all major DBs.
Exploit
Hydra
Fast network login cracker. Brute forces SSH, FTP, HTTP, SMB, and 50+ protocols.
Password
Hashcat
World's fastest password cracker. GPU-accelerated, supports 300+ hash types.
Password
John the Ripper
Classic password cracker. Excellent for local hash cracking across many formats.
Password
Mimikatz
Extract plaintext passwords, hashes, Kerberos tickets from Windows memory.
Post-Exploit
BloodHound
Active Directory attack path visualization. Find the fastest route to Domain Admin.
AD
Responder
LLMNR/NBTNS poisoner. Capture NetNTLM hashes on local networks.
Network
CrackMapExec
Swiss army knife for pentesting networks and Active Directory environments.
AD
🛡️ Defensive & Blue Team
Splunk
Leading SIEM platform. Aggregates logs, detects threats, creates dashboards.
SIEM
Elastic SIEM
Open-source ELK stack with Security module. Powerful log analysis & detection.
SIEM
Suricata
High-performance IDS/IPS/NSM engine. Rules-based and ML threat detection.
IDS/IPS
Snort
Original open-source IDS. Real-time traffic analysis and packet logging.
IDS/IPS
OSSEC / Wazuh
Host-based IDS. File integrity monitoring, log analysis, rootkit detection.
HIDS
TheHive
Open-source incident response platform. Case management for SOC teams.
IR
Cortex
Artifact analysis engine linked to TheHive. Automate observable analysis.
IR
MISP
Malware Information Sharing Platform. Share and correlate threat intelligence.
Threat Intel
🔬 Forensics & Malware Analysis
Autopsy
Open-source digital forensics platform. Disk analysis, artifact recovery, timelines.
Forensics
Volatility
Memory forensics framework. Extract artifacts from RAM dumps across OS types.
Memory
Ghidra
NSA's free reverse engineering tool. Decompile & analyze malware and binaries.
Reverse Eng
IDA Pro
Industry-standard disassembler. Advanced malware analysis and exploit research.
Reverse Eng
x64dbg
Open-source Windows debugger for x64/x32. Dynamic malware analysis.
Debugger
Cuckoo Sandbox
Automated malware analysis sandbox. Detonate samples safely, get reports.
Sandbox
FTK Imager
Create forensic images of drives. Free tool from AccessData for evidence collection.
Forensics
Binwalk
Firmware analysis tool. Identify and extract embedded files in firmware images.
Firmware
☁️ Cloud & DevSecOps
ScoutSuite
Multi-cloud security auditing tool. Find misconfigurations in AWS, Azure, GCP.
Cloud
Prowler
AWS, Azure, GCP security tool based on CIS benchmarks and cloud best practices.
Cloud
Trivy
Vulnerability scanner for containers, IaC, filesystems. Great for CI/CD pipelines.
DevSecOps
Checkov
Static analysis for IaC (Terraform, CloudFormation). Catch misconfigs pre-deploy.
IaC
Falco
Cloud-native runtime security. Detects anomalous container/Kubernetes behavior.
Container
Semgrep
Static code analysis. Find security vulnerabilities in source code across languages.
SAST
🏆

All Certifications

From entry-level to elite — every major cybersecurity certification with details on cost, difficulty, and career impact.

20+ Certs
🟢 Entry Level
Entry
CompTIA ITF+
CompTIA
No experience required. IT fundamentals for career changers entering cybersecurity.
Beginner~$130
Entry
Google Cybersecurity
Google / Coursera
8-course series covering security fundamentals, Python, SIEM, and IDS basics.
Beginner~$300/yr
Entry
CC (ISC²)
ISC²
Certified in Cybersecurity. Free exam vouchers available. Good first official cert.
Free vouchersNo exp needed
Entry
CompTIA Network+
CompTIA
Solid networking foundation cert. Nearly mandatory before Security+.
Recommended~$350
🟡 Intermediate
Core Security
CompTIA Security+
CompTIA
The most widely recognized cybersecurity cert. DoD 8570 approved. Essential for most government and corporate roles.
DoD Approved~$400SY0-701
Blue Team
CompTIA CySA+
CompTIA
Cybersecurity analyst skills. Covers threat intelligence, SIEM, vulnerability management, and incident response.
Sec+ recommended~$400
Pentest
CompTIA PenTest+
CompTIA
Penetration testing methodology, tools, and reporting. Good bridge to OSCP.
Network+ recommended~$400
Ethical Hacking
CEH v13
EC-Council
Certified Ethical Hacker. 20 modules covering all phases of ethical hacking. HR-friendly certification.
Training required~$1000
Practical Pentest
eJPT
INE Security
Junior penetration tester. Practical 3-day exam on a live lab environment. Great first hands-on cert.
Practical~$200
Blue Team
BTL1
Security Blue Team
Blue Team Labs Level 1. Phishing, SIEM, threat intel, DFIR. 24-hour practical exam. Excellent value.
Practical~$500
🔴 Advanced & Elite
Elite Offensive
OSCP
Offensive Security
Most respected hands-on hacking certification. 24-hour practical exam. Must pwn real machines. The ultimate proof of skill.
Very Hard~$1499Labs included
Expert Offensive
OSEP / OSED / OSWE
Offensive Security
Advanced OSCP specializations. OSEP: evasion, OSED: exploit dev, OSWE: web expert. Each takes months.
Elite~$1499 each
Pinnacle
CISSP
ISC²
Chief of security certs. 8 domains, 5 years experience required. Opens CISO and senior leadership roles worldwide.
5yr required~$749
Management
CISM
ISACA
Certified Information Security Manager. Focused on security management, risk, governance. Leadership path cert.
5yr exp~$575
Forensics
GCFE / GCFA
GIAC / SANS
GIAC forensics certifications. Highly respected by law enforcement, government, and enterprise IR teams.
Premium~$2000+
Cloud
AWS Security Specialty
Amazon Web Services
Advanced AWS security specialization. Covers IAM, encryption, incident response, compliance in AWS.
AWS exp needed~$300
Cloud
CCSP
ISC²
Certified Cloud Security Professional. Vendor-neutral cloud security cert. Pairs well with CISSP.
Exp required~$599
Pentest Expert
GPEN / GWAPT
GIAC / SANS
GIAC Penetration Tester / Web App Pen Tester. Premium SANS-backed certifications with proctored exams.
Premium~$2000+