How to Learn Cybersecurity
A structured path through Cybersecurity — from first principles to confident mastery. Check off each milestone as you go.
Cybersecurity Learning Roadmap
Click on a step to track your progress. Progress saved locally on this device.
Foundations of IT and Networking
4-6 weeksBuild a solid understanding of computer hardware, operating systems (Windows, Linux), networking fundamentals (TCP/IP, DNS, HTTP), and the OSI model. Earn CompTIA A+ or Network+ to validate your knowledge.
Explore your way
Choose a different way to engage with this topic — no grading, just richer thinking.
Explore your way — choose one:
Core Security Concepts
4-6 weeksLearn the CIA triad, access control models, authentication methods, basic cryptography, and security policies. Study for CompTIA Security+ as a structured learning path covering foundational security principles.
Operating System and Endpoint Security
3-4 weeksDevelop hands-on skills in hardening Windows and Linux systems, configuring host-based firewalls, managing user permissions, understanding malware types, and using antivirus and endpoint detection and response (EDR) tools.
Network Security and Defense
4-6 weeksMaster firewall configuration, intrusion detection and prevention systems (IDS/IPS), VPNs, network segmentation, packet analysis with Wireshark, and wireless security protocols. Learn to design secure network architectures.
Threat Analysis and Vulnerability Management
3-5 weeksStudy common attack vectors, the MITRE ATT&CK framework, vulnerability scanning with tools like Nessus and OpenVAS, and threat intelligence sources. Learn to assess risk and prioritize remediation efforts.
Ethical Hacking and Penetration Testing
6-8 weeksDevelop offensive security skills including reconnaissance, exploitation, privilege escalation, and post-exploitation using tools like Metasploit, Burp Suite, and Nmap. Practice on platforms like Hack The Box and TryHackMe.
Incident Response and Digital Forensics
4-6 weeksLearn the incident response lifecycle, log analysis, SIEM tools (Splunk, ELK Stack), memory and disk forensics, chain of custody procedures, and how to write incident reports. Develop playbooks for common scenarios.
Advanced Specialization and Certification
8-12 weeksChoose a specialization such as cloud security, application security, red teaming, or security architecture. Pursue advanced certifications like OSCP, CISSP, or AWS Security Specialty. Contribute to open-source security projects and participate in CTF competitions.
Explore your way
Choose a different way to engage with this topic — no grading, just richer thinking.
Explore your way — choose one: