🔐 c (Beginner to Advanced)
🔰 Module 1: Introduction to Cyber Security
What is Cyber Security?
-
Protection of systems, networks, and data from cyber attacks
Why Cyber Security is Important
-
Data protection
-
Privacy
-
National security
-
Business security
Career Roles
-
Cyber Security Analyst
-
SOC Analyst
-
Ethical Hacker
-
Penetration Tester
-
Security Engineer
🧠 Module 2: Computer & Networking Basics (Must Learn)
-
How computers work
-
Operating systems basics (Windows, Linux)
-
What is a network?
-
IP address, MAC address
-
TCP/IP model
-
Ports and protocols (HTTP, HTTPS, FTP, SSH)
🐧 Module 3: Operating Systems
Windows Security
-
User accounts
-
Permissions
-
Firewalls
-
Event logs
Linux (Very Important)
-
Linux commands
-
File permissions
-
Users and groups
-
Bash scripting basics
👉 Recommended OS: Kali Linux, Ubuntu
🌐 Module 4: Networking & Internet Security
-
Firewalls
-
VPNs
-
Proxies
-
DNS security
-
HTTPS & SSL/TLS
-
Wi-Fi security
🧨 Module 5: Cyber Threats & Attacks
-
Malware (Virus, Worm, Trojan, Ransomware)
-
Phishing & Social Engineering
-
Man-in-the-Middle attacks
-
DoS & DDoS attacks
-
Password attacks
-
Zero-day attacks
🧑💻 Module 6: Ethical Hacking Basics
What is Ethical Hacking?
-
Legal hacking to find vulnerabilities
Phases of Ethical Hacking
-
Reconnaissance
-
Scanning
-
Gaining access
-
Maintaining access
-
Covering tracks
Tools
-
Nmap
-
Metasploit
-
Burp Suite
-
Wireshark
🛡 Module 7: Web Application Security
-
How websites work
-
OWASP Top 10
-
SQL Injection
-
XSS (Cross-Site Scripting)
-
CSRF
-
Authentication vulnerabilities
🔑 Module 8: Cryptography & Security Concepts
-
Encryption vs Decryption
-
Symmetric & Asymmetric encryption
-
Hashing
-
Digital signatures
-
SSL certificates
☁️ Module 9: Cloud & Modern Security
-
Cloud security basics (AWS, Azure, GCP)
-
Identity & Access Management (IAM)
-
Container security
-
Zero Trust model
📊 Module 10: Security Operations (SOC)
-
SIEM tools (Splunk, ELK)
-
Log analysis
-
Incident response
-
Threat intelligence
-
Risk management
⚖️ Module 11: Cyber Laws & Ethics
-
Cyber crime laws
-
Data protection (GDPR basics)
-
Ethical responsibilities
-
Legal compliance
🎓 Module 12: Certifications & Career Path
Beginner Certifications
-
CompTIA Security+
-
Google Cybersecurity Certificate
Advanced Certifications
-
CEH (Certified Ethical Hacker)
-
CISSP
-
OSCP
⏱ Learning Timeline
-
Basics: 1–2 months
-
Intermediate: 3–4 months
-
Advanced / Job-ready: 6–12 months
0 Comments