Cybersecurity Roadmap (Offensive + Defensive)
Cybersecurity Roadmap (Offensive + Defensive)
Offensive
Penetration tester (You will find vulnerabilities and exploit them. Penetration testing is in specific field
e.g web, android, network etc).
Ethical Hacker (You will find vulnerabilities and exploit them. A Ethical hacker is specialized in all
modules. Ethical Hackers can test everything not a specific module.)
Offensive Roadmap:
Module 1
NETWORKING CONCEPTS
Types of Networks
What is IP Address?
IPv4 vs IPv6
Types of IP Address
Types of Protocols
How does TCP Work?
TCP vs UDP
What is DNS?
Module 2
Types of Hackers
Cybersecurity Laws
What is Linux?
Linux Commands (ls, cd, pwd, cp, mv, rm, chmod, chown, cat, grep, find, ps, top, netstat, ssh,
ifconfig, iptables)
Module 3
Configuring Proxy
Configuring VPN
Module 4
Website Footprinting
Email Footprinting
DNS Footprinting
WHOIS Footprinting
NS Lookup
Module 5
SCANNING NETWORKS
What is Network Scanning?
Module 6
ENUMERATION
What is Enumeration?
Types of Enumeration
Default Ports
Module 7
VULNERABILITY ASSESSMENT
Classification of Vulnerability
Vulnerability Assessment Lifecycle
result?
Module 8
SYSTEM HACKING
What is Steganography?
Types of Steganography
Steganography Practical
Module 9
MALWARE THREATS
What is Malware?
Example of Malware
What is Trojan?
Creating Payloads
Module 10
SNIFFING
What is Sniffing?
Types of Sniffing
MAC Spoofing
MAC Flooding
DHCP Flooding
MITM Attack
Sniffing with Wireshark
Module 11
SOCIAL ENGINEERING
Module 12
SMURF Attack
Module 13
SESSION HIJACKING
Module 14
Module 16
Generating Payloads
Module 17
CRYPTOGRAPHY
What is Cryptography?
Difference Between Encoding, Hashing & Cryptography
Types of Cryptography
How it works?
Cryptography tools
Hashing Tools
Encoding Tools
Defensive
(Note: If you want to learn Cybersecurity only and not go for Offensive
site then first learn CCNA and then learn Linux. I added Linux roadmap
and lap setup in Offensive roadmap on Module 2. Check Module 2 of
Offensive roadmap. )
Security Analyst
Security Engineer
Security Architect
Incident Responder
Defensive Roadmap:
Module 1
Introduction to Cybersecurity
Module 2
Introduction to Ethical Hacking (If you already learned Offensive then skip this and if you not learned
offensive then this is important.)
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
SQL Injection
Cryptography
Module 3
PENETRATION TEST (If you already learned Offensive then skip this and if you not learned offensive then
this is important.)
Personal Skills
Virtual Images
Types of Laws
Confidentiality Agreement
Company Obligations
Contractor Obligations
Learn Python
Module 4
Network Security
Note: In-depth Study of TCP/IP and Networking Protocols are required for network security.
Module 5
System Security
Module 6
Application Security
Module 7
Cryptography
Module 8
Module 9
Advanced Cryptography
Cryptanalysis Techniques
Module 10
Cloud Security
Module 11