100-Day Cybersecurity Learning Plan
Phase 1: Foundations (Days 1-20)
Computer Networks Basics
Days 1-5: Network fundamentals, OSI model, TCP/IP
Book: "Computer Networking: A Top-Down Approach" by Kurose and Ross
Website: Networking Academy
Practice: Packet Tracer exercises
Operating System Fundamentals
Days 6-10: Linux basics, Windows security features
Book: "How Linux Works" by Brian Ward
Online Course: Linux Journey
Practice: OverTheWire: Bandit - Command line practice
Security Fundamentals
Days 11-15: CIA triad, security models, basic cryptography
Book: "Security Engineering" by Ross Anderson
YouTube: Professor Messer's Security+ videos
Practice: CryptoHack - Cryptography challenges
Basic Programming
Days 16-20: Python basics for security
Book: "Black Hat Python" by Justin Seitz
YouTube: Corey Schafer's Python tutorials
Practice: HackerRank Python challenges
Phase 2: Security Tools & Techniques (Days 21-45)
Network Security
Days 21-25: Scanning, enumeration, firewall concepts
Book: "Practical Packet Analysis" by Chris Sanders
Website: TryHackMe - Network Security modules
Practice: Wireshark exercises with sample PCAP files
Web Application Security
Days 26-32: Web vulnerabilities, OWASP Top 10
Book: "The Web Application Hacker's Handbook"
YouTube: LiveOverflow Web Security
Practice: OWASP Juice Shop
System Security
Days 33-38: Privilege escalation, system hardening
Book: "Attacking Network Protocols" by James Forshaw
Website: HackTheBox Academy - Privilege Escalation
Practice: TryHackMe - Complete Beginner Path
Digital Forensics Basics
Days 39-45: Disk analysis, memory forensics, log analysis
Book: "Practical Forensic Imaging" by Bruce Nikkel
YouTube: 13Cubed Forensics
Practice: Digital Forensics Challenges
Phase 3: Intermediate Topics (Days 46-70)
Threat Intelligence
Days 46-50: Threat modeling, intelligence frameworks
Book: "Intelligence-Driven Incident Response" by Scott Roberts
Website: MITRE ATT&CK Framework
Practice: MITRE ATT&CK CTF
Malware Analysis
Days 51-57: Static analysis, dynamic analysis
Book: "Practical Malware Analysis" by Michael Sikorski
YouTube: OALabs Malware Analysis
Practice: Malware Traffic Analysis
Cloud Security
Days 58-63: AWS/Azure/GCP security concepts
Book: "AWS Security" by Dylan Shields
Website: CloudSecurity.WTF
Practice: flAWS Challenge
Mobile Security
Days 64-70: Android & iOS security models
Book: "Android Security Internals" by Nikolay Elenkov
YouTube: MOBISEC
Practice: OWASP MSTG
Phase 4: Advanced Topics & Specialization (Days 71-90)
Advanced Penetration Testing
Days 71-76: Red team operations, exploit development
Book: "The Hacker Playbook 3" by Peter Kim
Website: HackTheBox
Practice: VulnHub
Security Operations
Days 77-82: SIEM, threat hunting, incident response
Book: "Blue Team Handbook" by Don Murdoch
YouTube: BlackHills Information Security
Practice: LetsDefend
Reverse Engineering
Days 83-90: Disassembly, debugging techniques
Book: "Practical Reverse Engineering" by Bruce Dang
YouTube: LiveOverflow
Practice: Reverse Engineering challenges on CrackMe
Phase 5: Projects & Portfolio (Days 91-100)
Building Your Security Portfolio
Days 91-95: Create a personal cybersecurity blog/portfolio
Document your journey, write about what you've learned
Publish walkthroughs of CTF challenges
Build your GitHub profile with security tools/scripts
Capture The Flag Competitions
Days 96-100: Participate in CTFs to apply your skills
Website: CTFtime - Find upcoming CTF competitions
Practice: PicoCTF - Year-round CTF platform
Community: Join Discord servers like NetSecFocus, Hack The Box
Daily Habits Throughout the 100 Days
1. Follow cybersecurity news via The Hacker News or Krebs on Security
2. Join Reddit r/netsec and other security communities
3. Listen to podcasts like "Darknet Diaries" or "Security Now"
4. Build a home lab for practice (VirtualBox/VMware with Kali Linux, vulnerable VMs)
5. Dedicate 15-30 minutes daily to hands-on practice
Additional Resources
YouTube Channels
John Hammond
IppSec
The Cyber Mentor
David Bombal
NetworkChuck
Interactive Learning Platforms
TryHackMe
HackTheBox
PortSwigger Web Security Academy
INE eLearnSecurity
Cybrary
Certifications to Consider
CompTIA Security+
CompTIA PenTest+
EC-Council CEH (Certified Ethical Hacker)
OSCP (Offensive Security Certified Professional)
SANS GIAC certifications
Remember to adjust this schedule based on your prior knowledge and learning pace. The key to success
is consistency and hands-on practice!