Learn-Cybersecurity-From-Scratch-A-9-Month-Roadmap
Learn-Cybersecurity-From-Scratch-A-9-Month-Roadmap
Scratch: A 9-Month
Roadmap
This roadmap guides you through a structured -month journey to learn
cybersecurity from scratch. It combines interactive learning with real-
world projects, ensuring you build hands-on skills applicable to modern
cybersecurity challenges.
by KOLADE OLUWAFEMI
Month 1-2: Cybersecurity Fundamentals &
Networking Basics
Objective Week 1-2: Introduction to Week 3-4: Networking
Cybersecurity Basics
Build a strong foundation in
cybersecurity concepts and Explore cybersecurity domains, the Dive into networking fundamentals,
networking. Understand key security threat landscape, and fundamental including the OSI and TCP/IP models,
principles and how networks function. security concepts like confidentiality, IP addressing, subnetting, ports,
integrity, and availability (CIA Triad). protocols, and firewalls.
Learn about common cyberattacks and
their impact.
Project: Analyze real-world cyberattacks and their impact (case study) and set up a home lab using VirtualBox/VMware with
different network topologies.
Month 3: Linux & Command Line Mastery
Objective Week 5-6: Linux Basics Week 7-8: Bash Scripting &
Automation
Gain proficiency in Linux, a core skill Learn about the Linux file system, user
for cybersecurity. Master the command management, permissions, and shell Master Bash scripting to automate
line and essential Linux tools. scripting. Understand how to navigate tasks, manage processes, and
and manage a Linux system. streamline your work. Create custom
scripts for repetitive operations.
Project: Set up a Linux server and harden it against basic attacks and create a script to automate user account creation and
permission settings.
Month 4: Security
Essentials & Cryptography
1 Cryptography Basics
Understand symmetric and asymmetric encryption, hashing, and
digital signatures. Learn how these techniques protect data
confidentiality and integrity.
Project: Conduct reconnaissance on a test network using Nmap & OSINT tools and use Metasploit to exploit a vulnerable system
in a lab environment.
Month 6: Web Application
Security
OWASP Top 10 Attacks
Learn about the OWASP Top vulnerabilities, including injection
attacks, broken authentication, and sensitive data exposure.
Understand how to identify and mitigate these common threats.
Project: Set up a SIEM tool and analyze logs for suspicious activities and
investigate a simulated security breach using forensic tools.
Month 8: Cloud Security &
Compliance
Capstone Project
Choose a real-world security problem and build a
2 comprehensive security solution. This could include
vulnerability assessment of a website, setting up a secure
network, or developing a security awareness program.