Live Class
Internship
Coding
Admission
Others
Sign In
Cybersecurity Roadmap
Track your progress through the learning path
Fundamentals of Cybersecurity
1/10
Basics of Cybersecurity (CIA Triad - Confidentiality, Integrity, Availability)
Types of Cyber Threats (Malware, Phishing, Ransomware, DDoS)
Cybersecurity Laws & Compliance (GDPR, ISO 27001, HIPAA)
Networking & System Security
2/10
Networking Basics (TCP/IP, DNS, VPN, Firewalls)
OSI Model & Secure Network Architecture
System Security (Windows, Linux Hardening)
Cryptography & Encryption
3/10
Symmetric & Asymmetric Encryption (AES, RSA)
Hashing (SHA, MD5)
Digital Signatures & Certificates (SSL/TLS, PKI)
Ethical Hacking & Penetration Testing
4/10
Kali Linux & Ethical Hacking Tools (Nmap, Metasploit, Burp Suite)
Web Application Security (OWASP Top 10)
Wireless & Network Security Testing
Security Operations & Incident Response
5/10
Security Information & Event Management (SIEM)
Digital Forensics & Incident Handling
Threat Intelligence & Risk Assessment
Cloud & Application Security
6/10
Cloud Security Basics (AWS, Azure, GCP)
DevSecOps & Secure Coding Practices
API Security & Container Security (Docker, Kubernetes)
Identity & Access Management (IAM)
7/10
Authentication & Authorization (MFA, SSO)
Role-Based Access Control (RBAC)
Privileged Access Management (PAM)
Cybersecurity Tools & Technologies
8/10
IDS/IPS (Snort, Suricata)
Endpoint Security & Antivirus (EDR, XDR)
Security Automation & Threat Hunting
Projects & Hands-on Practice
9/10
Set Up a Firewall & Intrusion Detection System
Perform a Penetration Test on a Web Application
Develop a Security Incident Response Plan
Job Preparation
10/10
Cybersecurity Certifications (CEH, CISSP, Security+)
Resume & Portfolio (Bug Bounties, CTFs, GitHub Projects)
Interview Preparation (Security Concepts, Case Studies)
Networking & Job Applications
Back to all roadmaps