0% found this document useful (0 votes)
1K views5 pages

100-Day Cybersecurity Learning Plan

The 100-Day Cybersecurity Learning Plan is structured into five phases, covering foundational topics, security tools and techniques, intermediate topics, advanced topics, and project development. Each phase includes specific days dedicated to various subjects, recommended books, online resources, and practical exercises to enhance learning. Daily habits and additional resources are also suggested to support continuous improvement and engagement in the cybersecurity field.

Uploaded by

JoEl Cueto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views5 pages

100-Day Cybersecurity Learning Plan

The 100-Day Cybersecurity Learning Plan is structured into five phases, covering foundational topics, security tools and techniques, intermediate topics, advanced topics, and project development. Each phase includes specific days dedicated to various subjects, recommended books, online resources, and practical exercises to enhance learning. Daily habits and additional resources are also suggested to support continuous improvement and engagement in the cybersecurity field.

Uploaded by

JoEl Cueto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

100-Day Cybersecurity Learning Plan

Phase 1: Foundations (Days 1-20)

Computer Networks Basics


Days 1-5: Network fundamentals, OSI model, TCP/IP
Book: "Computer Networking: A Top-Down Approach" by Kurose and Ross

Website: Networking Academy


Practice: Packet Tracer exercises

Operating System Fundamentals


Days 6-10: Linux basics, Windows security features
Book: "How Linux Works" by Brian Ward
Online Course: Linux Journey

Practice: OverTheWire: Bandit - Command line practice

Security Fundamentals
Days 11-15: CIA triad, security models, basic cryptography
Book: "Security Engineering" by Ross Anderson
YouTube: Professor Messer's Security+ videos
Practice: CryptoHack - Cryptography challenges

Basic Programming
Days 16-20: Python basics for security
Book: "Black Hat Python" by Justin Seitz

YouTube: Corey Schafer's Python tutorials


Practice: HackerRank Python challenges

Phase 2: Security Tools & Techniques (Days 21-45)

Network Security
Days 21-25: Scanning, enumeration, firewall concepts
Book: "Practical Packet Analysis" by Chris Sanders
Website: TryHackMe - Network Security modules
Practice: Wireshark exercises with sample PCAP files

Web Application Security


Days 26-32: Web vulnerabilities, OWASP Top 10
Book: "The Web Application Hacker's Handbook"
YouTube: LiveOverflow Web Security

Practice: OWASP Juice Shop

System Security
Days 33-38: Privilege escalation, system hardening
Book: "Attacking Network Protocols" by James Forshaw

Website: HackTheBox Academy - Privilege Escalation


Practice: TryHackMe - Complete Beginner Path

Digital Forensics Basics


Days 39-45: Disk analysis, memory forensics, log analysis
Book: "Practical Forensic Imaging" by Bruce Nikkel
YouTube: 13Cubed Forensics

Practice: Digital Forensics Challenges

Phase 3: Intermediate Topics (Days 46-70)

Threat Intelligence
Days 46-50: Threat modeling, intelligence frameworks
Book: "Intelligence-Driven Incident Response" by Scott Roberts
Website: MITRE ATT&CK Framework

Practice: MITRE ATT&CK CTF

Malware Analysis
Days 51-57: Static analysis, dynamic analysis
Book: "Practical Malware Analysis" by Michael Sikorski

YouTube: OALabs Malware Analysis


Practice: Malware Traffic Analysis

Cloud Security
Days 58-63: AWS/Azure/GCP security concepts
Book: "AWS Security" by Dylan Shields
Website: CloudSecurity.WTF

Practice: flAWS Challenge

Mobile Security
Days 64-70: Android & iOS security models
Book: "Android Security Internals" by Nikolay Elenkov
YouTube: MOBISEC
Practice: OWASP MSTG

Phase 4: Advanced Topics & Specialization (Days 71-90)

Advanced Penetration Testing


Days 71-76: Red team operations, exploit development
Book: "The Hacker Playbook 3" by Peter Kim

Website: HackTheBox
Practice: VulnHub

Security Operations
Days 77-82: SIEM, threat hunting, incident response
Book: "Blue Team Handbook" by Don Murdoch
YouTube: BlackHills Information Security

Practice: LetsDefend

Reverse Engineering
Days 83-90: Disassembly, debugging techniques
Book: "Practical Reverse Engineering" by Bruce Dang

YouTube: LiveOverflow
Practice: Reverse Engineering challenges on CrackMe

Phase 5: Projects & Portfolio (Days 91-100)

Building Your Security Portfolio


Days 91-95: Create a personal cybersecurity blog/portfolio
Document your journey, write about what you've learned
Publish walkthroughs of CTF challenges

Build your GitHub profile with security tools/scripts

Capture The Flag Competitions


Days 96-100: Participate in CTFs to apply your skills
Website: CTFtime - Find upcoming CTF competitions
Practice: PicoCTF - Year-round CTF platform
Community: Join Discord servers like NetSecFocus, Hack The Box

Daily Habits Throughout the 100 Days


1. Follow cybersecurity news via The Hacker News or Krebs on Security
2. Join Reddit r/netsec and other security communities

3. Listen to podcasts like "Darknet Diaries" or "Security Now"


4. Build a home lab for practice (VirtualBox/VMware with Kali Linux, vulnerable VMs)
5. Dedicate 15-30 minutes daily to hands-on practice

Additional Resources

YouTube Channels
John Hammond
IppSec

The Cyber Mentor


David Bombal

NetworkChuck

Interactive Learning Platforms


TryHackMe
HackTheBox

PortSwigger Web Security Academy


INE eLearnSecurity

Cybrary

Certifications to Consider
CompTIA Security+
CompTIA PenTest+

EC-Council CEH (Certified Ethical Hacker)


OSCP (Offensive Security Certified Professional)

SANS GIAC certifications

Remember to adjust this schedule based on your prior knowledge and learning pace. The key to success
is consistency and hands-on practice!

You might also like