How to Learn Cybercrime
A structured path through Cybercrime — from first principles to confident mastery. Check off each milestone as you go.
Cybercrime Learning Roadmap
Click on a step to track your progress. Progress saved locally on this device.
Foundations of Computer Networks and Security
2-3 weeksLearn networking fundamentals including TCP/IP, DNS, HTTP/HTTPS, ports, and protocols. Understand the OSI model, how data flows across networks, and basic security principles like the CIA triad (confidentiality, integrity, availability).
Explore your way
Choose a different way to engage with this topic — no grading, just richer thinking.
Explore your way — choose one:
Understanding Threat Actors and Attack Types
2-3 weeksStudy the landscape of cyber threats: threat actor categories (script kiddies, hacktivists, organized crime, nation-states), common attack vectors (phishing, malware, DDoS, SQL injection, MitM), and the cyber kill chain framework.
Malware Analysis and Social Engineering
2-3 weeksExplore malware types (viruses, worms, trojans, ransomware, rootkits, spyware) and their behavior. Study social engineering tactics including phishing, pretexting, baiting, and tailgating, and learn how to recognize and counter them.
Cybercrime Law and Legal Frameworks
2-3 weeksStudy key legislation including the CFAA, Computer Misuse Act, GDPR, and the Budapest Convention. Understand jurisdictional challenges, digital evidence admissibility, and the legal process for prosecuting cybercriminals across borders.
Digital Forensics and Evidence Handling
3-4 weeksLearn forensic methodologies: evidence acquisition, disk imaging, file system analysis, log analysis, memory forensics, and network forensics. Practice maintaining chain of custody and producing forensic reports.
Defensive Security and Incident Response
2-3 weeksStudy defensive tools and practices: firewalls, IDS/IPS, SIEM, endpoint protection, and vulnerability management. Master the incident response lifecycle: preparation, identification, containment, eradication, recovery, and lessons learned.
Ethical Hacking and Penetration Testing
3-4 weeksLearn offensive security techniques used ethically to test defenses: reconnaissance, scanning, exploitation, and reporting. Gain hands-on experience with tools like Nmap, Wireshark, Metasploit, and Burp Suite in controlled lab environments.
Emerging Threats and Advanced Topics
2-4 weeksExplore cutting-edge topics: AI-powered attacks and defenses, IoT security, cloud security, supply chain attacks, quantum computing implications for cryptography, and the evolving landscape of state-sponsored cyber warfare.
Explore your way
Choose a different way to engage with this topic — no grading, just richer thinking.
Explore your way — choose one: