🚀 Your ultimate guide to becoming a cybersecurity expert — from zero to hero. Packed with curated resources, hands-on tools, labs, CTFs, certifications, and career tips. Designed for absolute beginners, students, and aspiring professionals!
- 🔥 Introduction
- 🧭 How to Use This Roadmap
- 🗺️ Roadmap Overview
- ⚙️ Foundation Phase
- 💻 Technical Skills Phase
- 🛠️ Specialization Phase
- 🎯 Advanced Phase
- 💼 Professional Development
- 📘 Learning Resources
- 🧰 Cybersecurity Tools
- 🎓 Certifications Guide
- 🛣️ Career Paths
- 👨👩👧👦 Cybersecurity Communities
- 🏁 Capture The Flag (CTF) Competitions
- 🧪 Cybersecurity Labs and Practice Environments
- 🔍 Security Research Resources
- 🤝 Contributing
Welcome to the N3tHawk Cybersecurity Perfect Roadmap — a powerful, organized, and evolving roadmap tailored for anyone looking to break into the exciting field of cybersecurity. Whether you're a total newbie or looking to sharpen your skills, this roadmap is your ultimate guide! 🧑💻💥
- 🔎 Explore each phase in order, based on your current knowledge level.
- 🎯 Set realistic goals with timeframes.
- 🧠 Use the curated resources, tools, and labs provided.
- 📈 Track your progress and grow from beginner → intermediate → expert!
We break cybersecurity into 4 major phases, each containing multiple skills and resource links:
- 🏗️ Foundation Phase – Networking, Linux, Computer Basics, etc.
- 🔧 Technical Skills Phase – Ethical Hacking, Web, OSINT, etc.
- 🎓 Specialization Phase – Red Team, Blue Team, Threat Intel, etc.
- 🚀 Advanced Phase – Malware Analysis, Reverse Engineering, Exploit Dev.
-
Operating Systems
-
Books:
- "Modern Operating Systems" by Andrew S. Tanenbaum
- "Computer Systems: A Programmer's Perspective" by Randal E. Bryant
- "Operating System Concepts" – Abraham Silberschatz, et al.
-
Practical Exercises:
- Install and explore Windows, Ubuntu, Arch, macOS
- Learn memory management, scheduling, file systems
- Play OverTheWire: Bandit
- Use QEMU or VirtualBox
-
Networking Basics
-
Books:
- "TCP/IP Illustrated, Volume 1" by W. Richard Stevens
- "Network Warrior" by Gary A. Donahue
- Computer Networking: Principles, Protocols and Practice – Olivier Bonaventure
-
Tools:
- Wireshark - Network protocol analyzer
- tcpdump - Command-line packet analyzer
- Cisco Packet Tracer - Network simulation tool
- GNS3
-
Practical Exercises:
- Simulate networks with GNS3 or Packet Tracer
- Analyze packets with Wireshark
- Practice subnetting, DNS, firewall rules
-
Programming Fundamentals
- Python for Everybody
- Automate the Boring Stuff with Python
- Codecademy Python Course
- freeCodeCamp JavaScript Algorithms and Data Structures
- Harvard CS50's Web Programming with Python and JavaScript
- Books:
- "Python Crash Course" by Eric Matthes
- "Eloquent JavaScript" by Marijn Haverbeke
- "Head First Python" by Paul Barry
- Tools:
- Visual Studio Code - Code editor
- PyCharm - Python IDE
- Jupyter Notebooks - Interactive computing
- Replit
- Practical Exercises:
- Build simple security tools (port scanner, password generator)
- Automate repetitive security tasks
- Solve coding challenges on HackerRank or LeetCode
-
Linux Fundamentals
- Linux Journey
- Linux Command Line Basics
- OverTheWire: Bandit
- Linux Survival
- Linux From Scratch
- Books:
- "The Linux Command Line" by William Shotts
- "How Linux Works" by Brian Ward
- "Linux Bible" by Christopher Negus
- Tools:
- VirtualBox - Virtualization software
- Vagrant - Development environment management
- Kali Linux - Security-focused Linux distribution
- Practical Exercises:
- Install and configure a Linux distribution
- Master bash scripting for automation
- Set up a LAMP/LEMP stack
- Configure user permissions and security settings
-
CIA Triad & Security Fundamentals
- Cybrary Introduction to IT & Cybersecurity
- NIST Cybersecurity Framework
- edX Introduction to Cybersecurity
- Coursera Information Security
- Books:
- "Computer Security: Principles and Practice" by William Stallings
- "Security Engineering" by Ross Anderson
- "The Art of Deception" by Kevin Mitnick
- Practical Exercises:
- Analyze case studies of security breaches
- Create a security policy for a fictional organization
- Conduct a basic risk assessment
-
Cryptography Basics
- Cryptography I by Stanford University
- Practical Cryptography for Developers
- Khan Academy Cryptography
- Crypto101
- Books:
- "Serious Cryptography" by Jean-Philippe Aumasson
- "Applied Cryptography" by Bruce Schneier
- "Cryptography Engineering" by Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno
- Tools:
- Practical Exercises:
- Implement basic encryption/decryption algorithms
- Analyze cryptographic protocols
- Solve cryptography challenges on Cryptopals
-
Security Policies & Compliance
- SANS Security Policy Templates
- ISO 27001 Overview
- NIST Special Publications
- GDPR Compliance
- Books:
- "Information Security Policies, Procedures, and Standards" by Thomas R. Peltier
- "The Compliance Guide to the NIST Cybersecurity Framework" by Lars Benson
- "CISSP Study Guide" by Eric Conrad
- Practical Exercises:
- Create a security policy for a fictional organization
- Conduct a gap analysis against a security framework
- Develop an incident response plan
-
Security Tool Fundamentals
- SANS SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
- Black Hills Information Security Webcast
- Cybrary Open Source Intelligence
- Books:
- "Hacking: The Art of Exploitation" by Jon Erickson
- "The Hacker Playbook 3" by Peter Kim
- Tools:
- Kali Linux - Security-focused Linux distribution
- Metasploit - Penetration testing framework
- Nmap - Network discovery and security auditing
- Practical Exercises:
- Set up a security lab environment
- Perform basic reconnaissance on a target (with permission)
- Use OSINT tools to gather information
-
Vulnerability Scanning
- OpenVAS Tutorial
- Nessus Essentials Tutorial
- OWASP ZAP Getting Started
- Books:
- "Mastering Kali Linux for Advanced Penetration Testing" by Vijay Kumar Velu
- "The Basics of Hacking and Penetration Testing" by Patrick Engebretson
- Tools:
- Practical Exercises:
- Set up a vulnerable machine (e.g., Metasploitable)
- Perform vulnerability scans and analyze results
- Create vulnerability reports
-
Network Protocols & Security
- Professor Messer Network+ Course
- SANS SEC560: Network Penetration Testing and Ethical Hacking
- Cybrary Network Security
- Books:
- "Network Security Essentials" by William Stallings
- "Practical Packet Analysis" by Chris Sanders
- "Black Hat Python" by Justin Seitz
- Tools:
- Practical Exercises:
- Perform network reconnaissance with Nmap
- Analyze network traffic for security issues
- Detect and prevent ARP spoofing attacks
- Configure network security monitoring
-
Firewalls & IDS/IPS
- pfSense Fundamentals
- Snort IDS Fundamentals
- Suricata IDS/IPS
- Cisco Firewall Configuration
- Books:
- "Practical Intrusion Analysis" by Ryan Trost
- "The Practice of Network Security Monitoring" by Richard Bejtlich
- "Firewalls and Internet Security" by William R. Cheswick
- Tools:
- pfSense - Open-source firewall
- Snort - Network intrusion detection system
- Suricata - Network IDS/IPS
- Security Onion - Security monitoring platform
- Practical Exercises:
- Set up a firewall with pfSense
- Configure and tune IDS/IPS rules
- Analyze and respond to security alerts
- Create custom detection rules
-
VPN & Secure Communications
- OpenVPN Setup Guide
- WireGuard VPN Tutorial
- IPsec VPN Configuration
- SSL/TLS Deep Dive
- Books:
- "VPNs Illustrated: Tunnels, VPNs, and IPsec" by Jon C. Snader
- "Implementing SSL/TLS Using Cryptography and PKI" by Joshua Davies
- Tools:
- OpenVPN - Open-source VPN solution
- WireGuard - Modern VPN protocol
- Strongswan - IPsec implementation
- OpenSSL - SSL/TLS toolkit
- Practical Exercises:
- Set up a site-to-site VPN
- Configure a remote access VPN
- Implement certificate-based authentication
- Analyze VPN traffic for security issues
-
Operating System Security
- Windows Security Fundamentals
- Linux Security Fundamentals
- macOS Security and Privacy Guide
- SANS SEC505: Securing Windows
- Books:
- "Windows Internals" by Mark Russinovich
- "Linux Security Cookbook" by Daniel J. Barrett
- "macOS and iOS Internals" by Jonathan Levin
- Tools:
- Microsoft Baseline Security Analyzer
- Lynis - Security auditing tool for Linux
- OpenSCAP - Security compliance solution
- Sysinternals Suite
- Practical Exercises:
- Harden a Windows/Linux server
- Implement security baselines
- Perform security audits
- Configure secure authentication mechanisms
-
Endpoint Protection
- SANS SEC505: Securing Windows
- CIS Benchmarks
- Microsoft Defender for Endpoint
- Endpoint Detection and Response (EDR)
- Books:
- "Endpoint Security and Compliance Management" by Daniel Blander
- "Malware Analyst's Cookbook" by Michael Hale Ligh
- Tools:
- Windows Defender
- ClamAV - Open-source antivirus
- OSSEC - Host-based intrusion detection
- Wazuh - Security monitoring solution
- Practical Exercises:
- Configure endpoint protection solutions
- Implement application whitelisting
- Detect and respond to malware infections
- Create security policies for endpoints
-
Vulnerability Management
- Nessus Essentials Tutorial
- OpenVAS Tutorial
- Qualys Vulnerability Management
- NIST Vulnerability Management
- Books:
- "The Vulnerability Management Lifecycle" by Sagar Rahalkar
- "Vulnerability Management" by Park Foreman
- Tools:
- Practical Exercises:
- Perform vulnerability assessments
- Prioritize vulnerabilities based on risk
- Develop remediation plans
- Implement vulnerability management processes
-
OWASP Top 10
- OWASP Top Ten
- Web Security Academy
- SANS SEC542: Web App Penetration Testing and Ethical Hacking
- Kontra OWASP Top 10
- Books:
- "The Web Application Hacker's Handbook" by Dafydd Stuttard and Marcus Pinto
- "Web Security for Developers" by Malcolm McDonald
- "Real-World Bug Hunting" by Peter Yaworski
- Tools:
- OWASP ZAP - Web application security scanner
- Burp Suite - Web vulnerability scanner
- Nikto - Web server scanner
- SQLmap - SQL injection tool
- Practical Exercises:
- Set up a vulnerable web application (e.g., DVWA)
- Identify and exploit common web vulnerabilities
- Implement security controls to prevent attacks
- Perform a web application security assessment
-
Web Application Penetration Testing
- Burp Suite Academy
- OWASP Juice Shop
- HackTheBox Web Challenges
- PentesterLab
- Books:
- "Mastering Modern Web Penetration Testing" by Prakhar Prasad
- "Bug Bounty Hunting Essentials" by Shahmeer Amir
- "Web Hacking 101" by Peter Yaworski
- Tools:
- Burp Suite - Web vulnerability scanner
- OWASP ZAP - Web application security scanner
- Dirsearch - Web path scanner
- Wfuzz - Web application fuzzer
- Practical Exercises:
- Perform a full web application penetration test
- Write a detailed security report
- Exploit and chain multiple vulnerabilities
- Participate in bug bounty programs
-
Secure Coding Practices
-
Books:
- "Secure Coding in C and C++" by Robert C. Seacord
- "Iron-Clad Java: Building Secure Web Applications" by Jim Manico
- "Secure Programming Cookbook for C and C++" by John Viega
-
Tools:
- SonarQube - Code quality and security
- OWASP Dependency-Check - Software composition analysis
- Snyk - Open source security platform
- Checkmarx - Static application security testing
- Vulert- Vulert secures software by detecting vulnerabilities in open-source dependencies—without accessing your code. It supports Js, PHP, Java, Python, and more.
-
Practical Exercises:
- Review code for security vulnerabilities
- Implement secure authentication and authorization
- Secure data storage and transmission
- Integrate security into the development lifecycle
-
Penetration Testing Methodology
- TryHackMe: Complete Beginner Path
- HackTheBox Academy
- SANS Penetration Testing Roadmap
- Offensive Security Certified Professional (OSCP)
- Penetration Testing Execution Standard (PTES)
- Books:
- "The Hacker Playbook 3" by Peter Kim
- "Advanced Penetration Testing" by Wil Allsopp
- "Penetration Testing: A Hands-On Introduction to Hacking" by Georgia Weidman
- Tools:
- Metasploit Framework - Penetration testing framework
- Cobalt Strike - Adversary simulation software
- Empire - Post-exploitation framework
- Covenant - .NET command and control framework
- Practical Exercises:
- Complete CTF challenges on platforms like HackTheBox and TryHackMe
- Perform a full penetration test in a lab environment
- Document findings in a professional penetration testing report
- Practice OSCP-like challenges
-
Exploitation Techniques
- Metasploit Unleashed
- OSCP Preparation Guide
- Exploit Development
- Buffer Overflow Tutorial
- Books:
- "The Shellcoder's Handbook" by Chris Anley
- "A Guide to Kernel Exploitation" by Enrico Perla
- "Gray Hat Python" by Justin Seitz
- Tools:
- Metasploit Framework - Penetration testing framework
- GDB - GNU debugger
- IDA Pro - Disassembler and debugger
- Ghidra - Software reverse engineering framework
- Practical Exercises:
- Develop custom exploits for known vulnerabilities
- Analyze and modify public exploits
- Practice buffer overflow exploitation
- Perform post-exploitation activities
-
Social Engineering
- Social Engineering: The Science of Human Hacking
- The Social-Engineer Toolkit (SET)
- SANS SEC567: Social Engineering for Penetration Testers
- Books:
- "Social Engineering: The Art of Human Hacking" by Christopher Hadnagy
- "Phishing Dark Waters" by Christopher Hadnagy and Michele Fincher
- "The Art of Deception" by Kevin Mitnick
- Tools:
- Social-Engineer Toolkit (SET)
- Gophish - Open-source phishing framework
- King Phisher - Phishing campaign toolkit
- SpiderFoot - OSINT automation tool
- Practical Exercises:
- Create and execute a phishing campaign (in a controlled environment)
- Develop social engineering scenarios
- Practice pretexting and impersonation techniques
- Analyze successful social engineering attacks
-
Security Operations Center (SOC)
- SOC Analyst Learning Path
- Blue Team Labs Online
- SANS SEC450: Blue Team Fundamentals
- Cybrary SOC Analyst
- Books:
- "Blue Team Handbook: SOC, SIEM, and Threat Hunting" by Don Murdoch
- "Security Operations Center: Building, Operating, and Maintaining your SOC" by Joseph Muniz
- "The Practice of Network Security Monitoring" by Richard Bejtlich
- Tools:
- Practical Exercises:
- Set up a SIEM solution
- Create detection rules for common attacks
- Perform log analysis and correlation
- Develop incident response playbooks
-
Incident Response
- SANS Incident Handler's Handbook
- NIST Incident Response Framework
- SANS FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting
- Incident Response Consortium
- Books:
- "Incident Response & Computer Forensics" by Jason T. Luttgens
- "The Art of Memory Forensics" by Michael Hale Ligh
- "Digital Forensics and Incident Response" by Gerard Johansen
- Tools:
- TheHive - Security incident response platform
- Velociraptor - Digital forensics and incident response
- MISP - Threat intelligence platform
- GRR Rapid Response - Remote live forensics
- Practical Exercises:
- Develop an incident response plan
- Simulate and respond to security incidents
- Perform forensic analysis of compromised systems
- Create incident response reports
-
Digital Forensics
- SANS FOR500: Windows Forensic Analysis
- Digital Forensics Framework
- Computer Forensics Tutorial
- NIST Computer Forensics Tools and Techniques Catalog
- Books:
- "File System Forensic Analysis" by Brian Carrier
- "Digital Forensics with Open Source Tools" by Cory Altheide and Harlan Carvey
- "Windows Forensic Analysis Toolkit" by Harlan Carvey
- Tools:
- Autopsy - Digital forensics platform
- FTK Imager - Forensic imaging tool
- Volatility - Memory forensics framework
- Sleuth Kit - Disk analysis tools
- Practical Exercises:
- Perform disk forensics on compromised systems
- Analyze memory dumps for evidence
- Recover deleted files and data
- Create forensic investigation reports
-
Cloud Security Fundamentals
- AWS Security Fundamentals
- Azure Security Technologies
- Google Cloud Security
- Cloud Security Alliance Courses
- IBM Cloud Security
- Books:
- "Cloud Security: A Comprehensive Guide" by Chris Dotson
- "Practical Cloud Security" by Chris Dotson
- "AWS Security" by Dylan Shields
- Tools:
- AWS Security Hub
- Azure Security Center
- Google Cloud Security Command Center
- CloudSploit - Cloud security scanner
- Practical Exercises:
- Set up secure cloud infrastructure
- Implement identity and access management
- Configure cloud security monitoring
- Perform cloud security assessments
-
Cloud Security Architecture
- Cloud Security Alliance Guidance
- Well-Architected Framework (AWS)
- Azure Well-Architected Framework
- Google Cloud Architecture Framework
- Books:
- "Cloud Security Architecture" by Lee Newcombe
- "Architecting for Security in the Cloud" by David Linthicum
- Tools:
- Terraform - Infrastructure as code
- CloudFormation - AWS infrastructure as code
- Azure Resource Manager - Azure infrastructure as code
- Practical Exercises:
- Design a secure cloud architecture
- Implement defense in depth in cloud environments
- Create infrastructure as code templates with security controls
- Perform threat modeling for cloud architectures
-
Container Security
- Docker Security
- Kubernetes Security
- OWASP Docker Security
- Kubernetes Security Best Practices
- Books:
- "Container Security" by Liz Rice
- "Kubernetes Security" by Liz Rice and Michael Hausenblas
- Tools:
- Clair - Container vulnerability scanner
- Trivy - Container vulnerability scanner
- Falco - Container runtime security
- Aqua Security - Container security platform
- Practical Exercises:
- Secure Docker containers and images
- Implement Kubernetes security controls
- Set up container vulnerability scanning
- Monitor container runtime security
-
Malware Analysis
- Practical Malware Analysis
- SANS FOR610: Reverse-Engineering Malware
- Malware Analysis Tutorials
- OALabs YouTube Channel
- Books:
- "Practical Malware Analysis" by Michael Sikorski and Andrew Honig
- "Malware Analyst's Cookbook" by Michael Ligh et al.
- "Learning Malware Analysis" by Monnappa K A
- Tools:
- Ghidra - Software reverse engineering framework
- IDA Pro - Disassembler and debugger
- Cuckoo Sandbox - Malware analysis sandbox
- REMnux - Linux toolkit for malware analysis
- Practical Exercises:
- Analyze malware samples in a safe environment
- Reverse engineer malicious code
- Create malware analysis reports
- Build automated malware analysis pipelines
-
Threat Intelligence
- MITRE ATT&CK Framework
- SANS FOR578: Cyber Threat Intelligence
- Open Source Intelligence Techniques
- Threat Intelligence Platforms
- Books:
- "Intelligence-Driven Incident Response" by Scott J. Roberts and Rebekah Brown
- "The Threat Intelligence Handbook" by Recorded Future
- "Applied Intelligence" by Kris Lovejoy
- Tools:
- MISP - Threat intelligence platform
- OpenCTI - Open cyber threat intelligence platform
- ThreatConnect - Threat intelligence platform
- Recorded Future - Threat intelligence
- Practical Exercises:
- Collect and analyze threat intelligence
- Map threats to the MITRE ATT&CK framework
- Create threat intelligence reports
- Integrate threat intelligence into security operations
-
Advanced Persistent Threats
- APT Groups and Operations
- Mandiant APT Reports
- MITRE ATT&CK Groups
- ThaiCERT APT Encyclopedia
- Books:
- "Advanced Persistent Threat Hacking" by Tyler Wrightson
- "APT41: A Dual Espionage and Cyber Crime Operation" by FireEye
- Tools:
- Practical Exercises:
- Analyze APT campaigns and techniques
- Create detection rules for APT tactics
- Simulate APT attacks in a controlled environment
- Develop APT hunting strategies
-
IoT Security
- OWASP IoT Security
- IoT Security Foundation
- NIST IoT Security
- IoT Security Guidelines
- Books:
- "Practical IoT Hacking" by Fotios Chantzis et al.
- "IoT Penetration Testing Cookbook" by Aaron Guzman and Aditya Gupta
- "Abusing the Internet of Things" by Nitesh Dhanjani
- Tools:
- Shodan - IoT search engine
- Firmware Analysis Toolkit - Firmware security analysis
- IoTSeeker - IoT device scanner
- Practical Exercises:
- Analyze IoT device security
- Perform firmware analysis
- Test IoT communication protocols
- Implement IoT security controls
-
Mobile Security
- OWASP Mobile Security Testing Guide
- Mobile Application Security Verification Standard
- Android Security
- iOS Security
- Books:
- "Android Security Internals" by Nikolay Elenkov
- "iOS Application Security" by David Thiel
- "Mobile Application Penetration Testing" by Vijay Kumar Velu
- Tools:
- Practical Exercises:
- Perform mobile app penetration testing
- Analyze mobile app permissions and security
- Test mobile authentication mechanisms
- Implement secure mobile development practices
-
Industrial Control Systems Security
- ICS-CERT Training
- SANS ICS410: ICS/SCADA Security Essentials
- NIST SP 800-82: Guide to ICS Security
- ISA/IEC 62443 Standards
- Books:
- "Industrial Network Security" by Eric D. Knapp and Joel Thomas Langill
- "Hacking Exposed Industrial Control Systems" by Clint Bodungen et al.
- "Cybersecurity for SCADA Systems" by William Shaw
- Tools:
- Practical Exercises:
- Set up an ICS lab environment
- Analyze ICS protocols and vulnerabilities
- Implement ICS security controls
- Perform ICS security assessments
-
Certifications Planning
- CompTIA Certification Roadmap
- SANS Certification Roadmap
- ISC2 Certifications
- ISACA Certifications
- EC-Council Certifications
- Books:
- "CISSP All-in-One Exam Guide" by Shon Harris and Fernando Maymi
- "CompTIA Security+ Get Certified Get Ahead" by Darril Gibson
- "OSCP Preparation Guide" by TJ_Null
- Resources:
- Practical Exercises:
- Create a personalized certification roadmap
- Build a study plan for your target certification
- Join study groups and practice exams
- Create practical labs to reinforce certification material
-
Building a Professional Network
- Cybersecurity Communities
- Security Conferences
- OWASP Chapters
- Cybersecurity Meetups
- Women in Cybersecurity (WiCyS)
- Resources:
- Practical Exercises:
- Join cybersecurity communities and forums
- Attend local meetups and conferences
- Contribute to open-source security projects
- Participate in online discussions and forums
- Create and share cybersecurity content
-
Continuous Learning
- Cybersecurity Podcasts
- Security Research Blogs
- Academic Journals
- Security Newsletters
- GitHub Security Repositories
- Resources:
- Practical Exercises:
- Subscribe to security newsletters and podcasts
- Follow security researchers on social media
- Set up a personal blog to document your learning
- Participate in bug bounty programs
- Contribute to security tools and research
-
Beginner
- "Cybersecurity for Beginners" by Raef Meeuwisse
- "The Art of Invisibility" by Kevin Mitnick
- "Social Engineering: The Science of Human Hacking" by Christopher Hadnagy
- "Practical Malware Analysis" by Michael Sikorski and Andrew Honig
- "Cryptography for Dummies" by Chey Cobb
- "Computer Security: Principles and Practice" by William Stallings and Lawrie Brown
- "Network Security Essentials" by William Stallings
-
Intermediate
- "The Web Application Hacker's Handbook" by Dafydd Stuttard and Marcus Pinto
- "Blue Team Handbook" by Don Murdoch
- "Penetration Testing: A Hands-On Introduction to Hacking" by Georgia Weidman
- "The Tangled Web: A Guide to Securing Modern Web Applications" by Michal Zalewski
- "Threat Modeling: Designing for Security" by Adam Shostack
- "Reversing: Secrets of Reverse Engineering" by Eldad Eilam
- "The Hacker Playbook 3" by Peter Kim
-
Advanced
- "The Art of Memory Forensics" by Michael Hale Ligh et al.
- "Gray Hat Hacking: The Ethical Hacker's Handbook" by Allen Harper et al.
- "The Shellcoder's Handbook" by Chris Anley et al.
- "Practical Reverse Engineering" by Bruce Dang et al.
- "Advanced Penetration Testing" by Wil Allsopp
- "Black Hat Python" by Justin Seitz
- "Windows Internals" by Mark Russinovich et al.
-
Specialized
- "Cloud Security: A Comprehensive Guide" by Chris Dotson
- "Industrial Network Security" by Eric D. Knapp and Joel Thomas Langill
- "iOS Application Security" by David Thiel
- "Android Security Internals" by Nikolay Elenkov
- "Container Security" by Liz Rice
- "Applied Cryptography" by Bruce Schneier
- "Intelligence-Driven Incident Response" by Scott J. Roberts and Rebekah Brown
-
Learning Platforms
- TryHackMe - Interactive cybersecurity training
- HackTheBox - Penetration testing labs
- VulnHub - Vulnerable virtual machines
- PortSwigger Web Security Academy - Web security training
- Cybrary - Free cybersecurity courses
- edX Cybersecurity Courses - University-level courses
- Coursera Cybersecurity Specializations - University-level courses
- SANS Cyber Aces - Free online courses
- Offensive Security - Professional penetration testing training
- INE Security - Cybersecurity training
- PentesterLab - Web penetration testing exercises
- RangeForce - Hands-on cybersecurity training
- Pluralsight - IT and security courses
- Udemy - Various security courses
-
Practice Environments
- Damn Vulnerable Web Application (DVWA) - Vulnerable web application
- OWASP Juice Shop - Vulnerable web application
- WebGoat - Deliberately insecure web application
- Metasploitable - Vulnerable Linux virtual machine
- Vulnhub - Vulnerable virtual machines
- Hack The Box - Online penetration testing platform
- PentesterLab - Web penetration testing exercises
- Root Me - Hacking challenges
- Hacker101 CTF - CTF challenges by HackerOne
- CryptoHack - Cryptography challenges
- OverTheWire - Security wargames
- John Hammond - CTF walkthroughs and security tutorials
- IppSec - HackTheBox walkthroughs
- The Cyber Mentor - Penetration testing tutorials
- David Bombal - Networking and security tutorials
- NetworkChuck - Networking and security tutorials
- Nahamsec - Bug bounty and web security
- LiveOverflow - Exploit development and CTF
- STÖK - Bug bounty hunting
- HackerSploit - Penetration testing tutorials
- PwnFunction - Web security animations
- InsiderPhD - Bug bounty and web security
- Security Weekly - Security news and interviews
- Black Hat - Conference presentations
- DEFCONConference - Conference presentations
- SANS Offensive Operations - Offensive security techniques
- Nmap - Network discovery and security auditing
- Shodan - Search engine for Internet-connected devices
- Recon-ng - Web reconnaissance framework
- theHarvester - Email, subdomain and name harvester
- Maltego - Open source intelligence and forensics
- SpiderFoot - OSINT automation tool
- Amass - In-depth attack surface mapping and asset discovery
- Sublist3r - Subdomain enumeration tool
- OWASP Maryam - Open-source intelligence framework
- OpenVAS - Open-source vulnerability scanner
- Nessus - Vulnerability scanner
- Nikto - Web server scanner
- Qualys - Cloud-based security and compliance
- Nexpose - Vulnerability management
- Acunetix - Web vulnerability scanner
- Netsparker - Web application security scanner
- Nuclei - Vulnerability scanner based on templates
- Vulners Scanner - NSE script using Vulners.com API
- Burp Suite - Web vulnerability scanner and proxy
- OWASP ZAP - Web application security scanner
- Sqlmap - Automatic SQL injection tool
- Wfuzz - Web application fuzzer
- Dirsearch - Web path scanner
- Nikto - Web server scanner
- Skipfish - Active web application security reconnaissance tool
- w3af - Web Application Attack and Audit Framework
- Arachni - Web application security scanner framework
- Metasploit - Penetration testing framework
- BeEF - Browser Exploitation Framework
- Empire - Post-exploitation framework
- Cobalt Strike - Adversary simulation software
- PowerSploit - PowerShell post-exploitation framework
- Pupy - Cross-platform remote administration and post-exploitation tool
- Covenant - .NET command and control framework
- Sliver - Cross-platform adversary emulation framework
- Hashcat - Advanced password recovery
- John the Ripper - Password cracking tool
- Hydra - Login cracker
- Aircrack-ng - WiFi security auditing tools suite
- Medusa - Parallel network login auditor
- CrackMapExec - Post-exploitation tool
- mimikatz - Windows credential dumping
- RainbowCrack - Rainbow table implementation
- Autopsy - Digital forensics platform
- Volatility - Memory forensics framework
- FTK Imager - Forensic imaging tool
- The Sleuth Kit - Disk analysis tools
- SANS SIFT - Forensic toolkit
- Rekall - Memory analysis framework
- CAINE - Computer Aided INvestigative Environment
- GRR Rapid Response - Remote live forensics
- TheHive - Security incident response platform
- Wireshark - Network protocol analyzer
- Snort - Intrusion detection system
- OSSEC - Host-based intrusion detection
- Wazuh - Security monitoring solution
- Security Onion - Security monitoring platform
- Suricata - Network IDS/IPS
- Zeek - Network security monitor
- Sysmon - Windows system monitoring
- YARA - Pattern matching for malware detection
- ScoutSuite - Multi-cloud security auditing tool
- Prowler - AWS security best practices assessment
- CloudSploit - Cloud security scanner
- Pacu - AWS exploitation framework
- CloudGoat - Vulnerable AWS environment
- AzureHound - Azure security assessment
- GCP Audit - GCP security scanner
- Falco - Container runtime security
- Kube-bench - Kubernetes security benchmarking
- MobSF - Mobile security testing framework
- Frida - Dynamic instrumentation toolkit
- Objection - Mobile runtime exploration
- Drozer - Android security assessment
- QARK - Android app vulnerability scanner
- idb - iOS app security assessment tool
- Needle - iOS security testing framework
- Apktool - Android APK reverse engineering
- Jadx - Dex to Java decompiler
- Maltego - Open source intelligence and forensics
- Shodan - Search engine for Internet-connected devices
- theHarvester - Email, subdomain and name harvester
- Metagoofil - Metadata extraction tool
- Recon-ng - Web reconnaissance framework
- SpiderFoot - OSINT automation tool
- OSINT Framework - Collection of OSINT tools
- Sherlock - Hunt down social media accounts by username
- IntelTechniques - OSINT tools collection
-
CompTIA Security+ - Foundational cybersecurity certification
- Focus Areas: Network security, threats and vulnerabilities, identity management, cryptography
- Prerequisites: None, but Network+ and 2 years of experience recommended
- Exam Format: 90 questions, 90 minutes, performance-based and multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Security specialist, security administrator, security consultant
-
CompTIA Network+ - Networking fundamentals
- Focus Areas: Network concepts, infrastructure, operations, security, troubleshooting
- Prerequisites: None, but A+ and 9-12 months of experience recommended
- Exam Format: 90 questions, 90 minutes, performance-based and multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Network administrator, network technician, help desk technician
-
CompTIA A+ - IT fundamentals
- Focus Areas: Hardware, operating systems, software troubleshooting, networking, security
- Prerequisites: None, but 9-12 months of experience recommended
- Exam Format: Two exams: Core 1 and Core 2, 90 minutes each
- Validity: 3 years, renewable with continuing education
- Career Paths: Help desk technician, desktop support analyst, field service technician
-
Certified Information Systems Security Professional (CISSP) Associate - Entry-level version of CISSP
- Focus Areas: Same as CISSP but for those without the required experience
- Prerequisites: Pass the CISSP exam but have less than 5 years of experience
- Exam Format: Same as CISSP
- Validity: Indefinite until requirements for full CISSP are met
- Career Paths: Stepping stone to security analyst, security consultant roles
-
CompTIA CySA+ - Cybersecurity analyst
- Focus Areas: Threat detection, security monitoring, incident response, vulnerability management
- Prerequisites: Network+ and Security+ recommended, 4+ years of experience
- Exam Format: 85 questions, 165 minutes, performance-based and multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Security analyst, threat intelligence analyst, security operations center (SOC) analyst
-
CompTIA PenTest+ - Penetration testing
- Focus Areas: Planning and scoping, information gathering, vulnerability identification, attacks and exploits, reporting
- Prerequisites: Network+ and Security+ recommended, 3+ years of experience
- Exam Format: 85 questions, 165 minutes, performance-based and multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Penetration tester, vulnerability assessment analyst, security consultant
-
Certified Ethical Hacker (CEH) - Ethical hacking and countermeasures
- Focus Areas: Ethical hacking methodology, tools, techniques, countermeasures
- Prerequisites: 2 years of experience or official training
- Exam Format: 125 questions, 4 hours, multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Ethical hacker, security analyst, penetration tester
-
GIAC Security Essentials (GSEC) - Security essentials
- Focus Areas: Security administration, risk management, cryptography, access controls
- Prerequisites: None
- Exam Format: 180 questions, 5 hours, multiple choice and performance-based
- Validity: 4 years, renewable with continuing education
- Career Paths: Security administrator, security analyst, security engineer
-
Offensive Security Certified Professional (OSCP) - Penetration testing with Kali Linux
- Focus Areas: Hands-on penetration testing, exploitation, privilege escalation
- Prerequisites: Strong understanding of networking, Linux, and scripting
- Exam Format: 24-hour practical exam with report submission
- Validity: Lifetime
- Career Paths: Penetration tester, red team operator, security consultant
-
Certified Information Systems Security Professional (CISSP) - Security management
- Focus Areas: Security and risk management, asset security, security architecture, network security, identity management, security assessment, security operations, software development security
- Prerequisites: 5 years of experience in at least 2 domains
- Exam Format: 100-150 questions, 3 hours, adaptive testing
- Validity: 3 years, renewable with continuing education
- Career Paths: Security manager, security architect, CISO, security consultant
-
Certified Information Security Manager (CISM) - Information security management
- Focus Areas: Information security governance, risk management, program development, incident management
- Prerequisites: 5 years of experience in information security management
- Exam Format: 150 questions, 4 hours, multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Security manager, security director, CISO
-
GIAC Certified Incident Handler (GCIH) - Incident handling
- Focus Areas: Incident handling process, computer crime investigation, hacker techniques
- Prerequisites: None
- Exam Format: 115 questions, 3 hours, multiple choice
- Validity: 4 years, renewable with continuing education
- Career Paths: Incident responder, SOC analyst, security analyst
-
Certified Cloud Security Professional (CCSP) - Cloud security
- Focus Areas: Cloud concepts, architecture, design, security, operations, legal compliance
- Prerequisites: 5 years of IT experience, 3 years in security, 1 year in cloud security
- Exam Format: 125 questions, 3 hours, multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: Cloud security architect, cloud security engineer, cloud security manager
-
GIAC Certified Forensic Analyst (GCFA) - Digital forensics
- Focus Areas: Digital forensics techniques, incident response, malware analysis
- Prerequisites: None
- Exam Format: 115 questions, 3 hours, multiple choice
- Validity: 4 years, renewable with continuing education
- Career Paths: Digital forensic analyst, incident responder, malware analyst
-
Offensive Security Certified Expert (OSCE) - Advanced penetration testing
- Focus Areas: Advanced exploitation techniques, custom exploit development
- Prerequisites: OSCP recommended
- Exam Format: 48-hour practical exam with report submission
- Validity: Lifetime
- Career Paths: Advanced penetration tester, exploit developer, security researcher
-
Certified Information Systems Auditor (CISA) - Information systems auditing
- Focus Areas: IS audit process, governance, systems acquisition, operations, protection of assets
- Prerequisites: 5 years of experience in IS audit, control, or security
- Exam Format: 150 questions, 4 hours, multiple choice
- Validity: 3 years, renewable with continuing education
- Career Paths: IS auditor, IT audit manager, compliance officer
-
Security Analyst
- Responsibilities: Monitor and analyze security alerts, implement security measures, conduct vulnerability assessments
- Skills Required: Network security, security tools, vulnerability assessment, incident response
- Certifications: CompTIA Security+, CySA+, GIAC GSEC
- Career Progression: Senior Security Analyst → Security Engineer → Security Architect
-
Security Engineer
- Responsibilities: Design and implement security solutions, manage security infrastructure, conduct security assessments
- Skills Required: Network security, security architecture, security tools, scripting
- Certifications: CISSP, GIAC GSEC, CEH
- Career Progression: Senior Security Engineer → Security Architect → CISO
-
SOC Analyst
- Responsibilities: Monitor security events, analyze alerts, respond to incidents, maintain security tools
- Skills Required: SIEM tools, incident response, network security, log analysis
- Certifications: CompTIA Security+, CySA+, GCIH
- Career Progression: SOC Analyst Level 2 → SOC Analyst Level 3 → SOC Manager
-
Incident Responder
- Responsibilities: Investigate and remediate security incidents, develop incident response plans, conduct forensic analysis
- Skills Required: Digital forensics, malware analysis, incident response, threat hunting
- Certifications: GCIH, GCFA, GREM
- Career Progression: Senior Incident Responder → Incident Response Manager → Security Director
-
Security Architect
- Responsibilities: Design secure systems and networks, develop security standards, evaluate security solutions
- Skills Required: Security architecture, risk assessment, compliance, technical leadership
- Certifications: CISSP, CISM, SABSA
- Career Progression: Senior Security Architect → Security Director → CISO
-
Penetration Tester
- Responsibilities: Test systems for vulnerabilities through simulated attacks, document findings, recommend remediation
- Skills Required: Ethical hacking, exploitation, scripting, report writing
- Certifications: OSCP, CEH, PenTest+
- Career Progression: Senior Penetration Tester → Red Team Lead → Security Consultant
-
Red Team Operator
- Responsibilities: Simulate advanced adversaries to test defenses, develop custom tools, conduct long-term engagements
- Skills Required: Advanced exploitation, social engineering, evasion techniques, custom tool development
- Certifications: OSCP, OSCE, GXPN
- Career Progression: Senior Red Team Operator → Red Team Lead → Director of Offensive Security
-
Vulnerability Researcher
- Responsibilities: Discover and analyze new vulnerabilities, develop proof-of-concept exploits, research security weaknesses
- Skills Required: Reverse engineering, exploit development, programming, vulnerability analysis
- Certifications: OSCE, GXPN, OSEE
- Career Progression: Senior Vulnerability Researcher → Security Research Lead → Security Director
-
Exploit Developer
- Responsibilities: Develop exploits for vulnerabilities, create custom attack tools, research exploitation techniques
- Skills Required: Advanced programming, reverse engineering, exploit development, assembly language
- Certifications: OSCE, OSEE, GXPN
- Career Progression: Senior Exploit Developer → Research Lead → Security Director
-
Chief Information Security Officer (CISO)
- Responsibilities: Executive responsible for an organization's security strategy, policies, and programs
- Skills Required: Leadership, risk management, security governance, business acumen, communication
- Certifications: CISSP, CISM, CGEIT
- Career Progression: Terminal position, may move to larger organizations or consulting
-
Security Manager
- Responsibilities: Manage security teams and operations, implement security policies, oversee security projects
- Skills Required: Team management, security operations, project management, risk assessment
- Certifications: CISSP, CISM, PMP
- Career Progression: Security Director → CISO
-
Security Consultant
- Responsibilities: Advise organizations on security matters, conduct assessments, develop security strategies
- Skills Required: Security assessment, consulting, communication, technical expertise
- Certifications: CISSP, CISA, CISM
- Career Progression: Senior Consultant → Principal Consultant → Practice Lead
-
GRC (Governance, Risk, Compliance) Specialist
- Responsibilities: Ensure compliance with regulations and standards, conduct risk assessments, develop security policies
- Skills Required: Compliance frameworks, risk assessment, policy development, auditing
- Certifications: CISA, CRISC, CISM
- Career Progression: GRC Manager → Director of Compliance → CISO
-
Digital Forensic Analyst
- Responsibilities: Investigate digital evidence, recover and analyze data, document findings for legal proceedings
- Skills Required: Digital forensics tools, evidence handling, chain of custody, legal knowledge
- Certifications: GCFA, EnCE, CCFE
- Career Progression: Senior Forensic Analyst → Forensic Manager → Director of Forensics
-
Malware Analyst
- Responsibilities: Analyze malicious software, reverse engineer malware, develop detection methods
- Skills Required: Reverse engineering, programming, malware analysis tools, sandboxing
- Certifications: GREM, GXPN, GCIH
- Career Progression: Senior Malware Analyst → Threat Research Lead → Security Director
-
Cloud Security Specialist
- Responsibilities: Secure cloud environments, implement cloud security controls, assess cloud security
- Skills Required: Cloud platforms (AWS, Azure, GCP), cloud security tools, DevSecOps
- Certifications: CCSP, AWS Certified Security, Azure Security Engineer
- Career Progression: Senior Cloud Security Specialist → Cloud Security Architect → CISO
-
Application Security Engineer
- Responsibilities: Secure software applications, conduct code reviews, implement secure coding practices
- Skills Required: Secure coding, application security testing, programming, SDLC
- Certifications: CSSLP, GWAPT, OSWE
- Career Progression: Senior AppSec Engineer → AppSec Architect → Director of Application Security
- Reddit r/cybersecurity - General cybersecurity discussions
- Reddit r/netsec - Network security news and discussions
- Reddit r/AskNetsec - Questions about network security
- Stack Exchange Information Security - Q&A for information security professionals
- OWASP Community - Web application security community
- Hack The Box Forum - Penetration testing and CTF discussions
- TryHackMe Discord - Community for TryHackMe platform users
- NetSec Focus - Information security community
- Bleeping Computer Forums - Computer security forums
- ISACA - Information Systems Audit and Control Association
- (ISC)² - International Information System Security Certification Consortium
- ISSA - Information Systems Security Association
- SANS - SysAdmin, Audit, Network, and Security Institute
- EC-Council - International Council of E-Commerce Consultants
- CompTIA - Computing Technology Industry Association
- CSA - Cloud Security Alliance
- FIRST - Forum of Incident Response and Security Teams
- Women in Cybersecurity (WiCyS) - Organization for women in cybersecurity
- DEF CON - One of the world's largest hacker conventions
- Black Hat - Information security conference
- RSA Conference - Cybersecurity conference
- BSides - Community-driven framework for information security events
- SANS Summits - Cybersecurity summits
- Infosecurity Europe - Europe's information security event
- CyberSecurity Summit - Cybersecurity leadership summit
- Women in Cybersecurity Conference - Conference for women in cybersecurity
- CISO Forum - Chief Information Security Officer forum
- PicoCTF - Free, educational CTF for beginners
- CTFlearn - Online platform with various CTF challenges
- Hacker101 CTF - CTF by HackerOne for learning web security
- CyberDefenders - Blue team CTF challenges
- SANS Holiday Hack Challenge - Annual holiday-themed CTF
- Google CTF Beginners Quest - Beginner-friendly CTF by Google
- TryHackMe - Learn cybersecurity through CTF-like challenges
- OverTheWire - Wargames for learning security concepts
- DEF CON CTF - One of the oldest and most prestigious CTFs
- CSAW CTF - CTF competition by NYU Tandon School of Engineering
- PlaidCTF - Annual CTF by Plaid Parliament of Pwning
- HITCON CTF - Hacks In Taiwan Conference CTF
- Dragon CTF - CTF by Dragon Sector team
- RuCTF - Russian CTF
- 0CTF/TCTF - International CTF competition
- Hack.lu CTF - CTF during the Hack.lu conference
- CTFtime - CTF events calendar and team rankings
- CTF Field Guide - Guide to CTF competitions
- LiveOverflow YouTube Channel - CTF walkthroughs and explanations
- John Hammond YouTube Channel - CTF walkthroughs
- IppSec YouTube Channel - HackTheBox walkthroughs
- CTF Resources - Collection of CTF resources
- Awesome CTF - List of CTF frameworks, libraries, resources
- CTF Tools - Collection of tools for CTF competitions
- Hack The Box - Online platform for penetration testing practice
- TryHackMe - Learn cybersecurity through hands-on exercises
- VulnHub - Vulnerable virtual machines for practice
- PortSwigger Web Security Academy - Web security training
- PentesterLab - Web penetration testing exercises
- Root Me - Hacking challenges platform
- HackThis - Hacking challenges and tutorials
- Damn Vulnerable Web Application (DVWA) - Vulnerable web application
- OWASP Juice Shop - Vulnerable web application
-
Virtualization Platforms
- VirtualBox - Free virtualization software
- VMware Workstation/Player - Virtualization software
- Proxmox VE - Open-source virtualization platform
- Hyper-V - Windows virtualization
-
Vulnerable Systems
- Metasploitable - Vulnerable Linux virtual machine
- DVWA - Damn Vulnerable Web Application
- WebGoat - Deliberately insecure web application
- OWASP Juice Shop - Vulnerable web application
- Vulnhub Images - Collection of vulnerable virtual machines
-
Attack Platforms
- Kali Linux - Penetration testing distribution
- Parrot Security OS - Security-focused Linux distribution
- BlackArch Linux - Penetration testing distribution
- Commando VM - Windows-based penetration testing VM
-
Network Simulation
- GNS3 - Network simulation software
- Cisco Packet Tracer - Network simulation tool
- EVE-NG - Network emulation platform
- Netkit - Network emulation tool
- Building a Home Lab for Offensive Security
- Building a Cybersecurity Lab
- Home Lab Setup Guide
- Network Security Lab Setup
- Building an Active Directory Lab
- Cybersecurity Home Lab on a Budget
- National Vulnerability Database (NVD) - U.S. government repository of vulnerability data
- CVE Details - Security vulnerability database
- Exploit Database - Archive of exploits and vulnerable software
- Vulnerability Lab - Vulnerability research and security database
- Packet Storm - Information security services, news, files, and tools
- Vulners - Vulnerability database with API
- VulDB - Vulnerability database
- Rapid7 Vulnerability & Exploit Database - Vulnerability and exploit database
- Krebs on Security - Security news and investigation
- Schneier on Security - Security blog by Bruce Schneier
- The Hacker News - Cybersecurity news and analysis
- Threatpost - Information security news
- Dark Reading - Cybersecurity news and analysis
- Naked Security - Security news from Sophos
- BleepingComputer - Information security and technology news
- Security Affairs - Information security news
- Graham Cluley - Computer security news and opinions
- arXiv Cryptography and Security - Preprint research papers
- IEEE Security & Privacy - Security research journal
- USENIX Security Symposium - Security conference papers
- ACM CCS - Computer and Communications Security conference
- NDSS Symposium - Network and Distributed System Security Symposium
- Black Hat Briefings - Security conference presentations
- DEF CON Media - DEF CON conference presentations
- Virus Bulletin - Security research and analysis
- Shodan - Search engine for Internet-connected devices
- Censys - Search engine for Internet-connected devices
- VirusTotal - Analyze suspicious files and URLs
- Any.Run - Interactive malware analysis
- Hybrid Analysis - Free malware analysis service
- Cuckoo Sandbox - Automated malware analysis
- MITRE ATT&CK - Knowledge base of adversary tactics and techniques
- OWASP - Open Web Application Security Project resources