Cybersecurity Roadmap - Map of Content (MOC)

Created: 2025-11-25 Tags: moc cybersecurity index roadmap

Overview

This knowledge base represents a comprehensive Zettelkasten structure for cybersecurity learning based on the roadmap.sh cybersecurity path. It follows atomic note principles with bidirectional linking and proper knowledge organization.

1. Fundamentals

2. Operating Systems

3. Networking

4. Security Concepts

5. Authentication & Access Control

6. Security Tools

7. Incident Response & Forensics

8. Governance, Risk & Compliance

9. Practice Platforms

10. Professional Certifications

Entry Level

Advanced Level

Learning Paths

Beginner Path

Phase 1: Fundamentals

  1. Computer Hardware Components
  2. Connection Types and Functions
  3. OS-Independent Troubleshooting
  4. Popular Software Suites
  5. Wireless Technologies
  6. Cloud Services Overview

Phase 2: Operating Systems

  1. Choose and master one OS (recommend Linux Operating System)
  2. OS Installation and Configuration
  3. Command Line Interface
  4. Graphical User Interface
  5. File CRUD Operations
  6. Permission Structures

Phase 3: Networking Basics

  1. OSI Model - Foundation of networking
  2. TCP-IP Protocol Suite - Core protocols
  3. Subnetting and CIDR Notation
  4. Public vs Private IP Addresses
  5. Default Gateway
  6. Router and Switch
  7. DNS and DHCP
  8. NAT and ARP

Phase 4: Basic Security Tools

  1. ping - Basic connectivity testing
  2. traceroute - Path analysis
  3. netstat - Network connections
  4. nslookup and dig - DNS queries
  5. tcpdump - Packet capture basics
  6. Wireshark and Packet Sniffers - Packet analysis
  7. nmap - Network scanning
  8. iptables - Basic firewall rules

Phase 5: Security Concepts

  1. Defense in Depth
  2. Perimeter Security
  3. Cyber Kill Chain
  4. Vulnerability Management

Phase 6: Practice & Certification

Intermediate Path

Advanced Networking

  1. Network Segmentation
  2. VLAN implementation
  3. DMZ configuration
  4. VPN technologies
  5. SSH and RDP security
  6. FTP and SFTP
  7. HTTP and HTTPS
  8. SSL-TLS certificates

Authentication & Access Control

  1. Multi-Factor Authentication
  2. Two-Factor Authentication
  3. Kerberos
  4. LDAP
  5. Single Sign-On
  6. RADIUS
  7. Certificate-Based Authentication
  8. Local Authentication

Advanced Tools & Techniques

  1. Virtualization Technologies (VMware, VirtualBox)
  2. Advanced nmap scanning
  3. Wireshark and Packet Sniffers deep analysis
  4. Vulnerability Management

Security Architecture

  1. Zero Trust Architecture
  2. Security Runbooks
  3. Common Hacking Tools awareness
  4. Exploit Frameworks understanding

Practice & Certification

Advanced Path

Offensive Security

  1. Penetration Testing
  2. Reverse Engineering
  3. Common Hacking Tools mastery
  4. Exploit Frameworks expertise

Threat Detection & Hunting

  1. Threat Hunting methodologies
  2. Cyber Kill Chain analysis
  3. Advanced log analysis
  4. Behavioral threat detection

Incident Response & Forensics

  1. Incident Response Process
  2. Digital Forensics Basics
  3. Evidence Preservation
  4. Investigation Techniques

Governance, Risk & Compliance

  1. Risk Assessment
  2. Compliance and Auditing
  3. Security Frameworks (NIST, ISO 27001, CIS)
  4. Backup and Resiliency
  5. Business Continuity Planning

Practice & Certification

Key Concepts by Category

Network Security: OSI Model, Network Segmentation, DMZ, VPN, VLAN

Access Control: Multi-Factor Authentication, Zero Trust Architecture, Kerberos, LDAP

Offensive Security: Penetration Testing, Common Hacking Tools, Exploit Frameworks

Defensive Security: Defense in Depth, Threat Hunting, Incident Response Process

Foundations: Computer Hardware Components, Command Line Interface, OSI Model, TCP-IP Protocol Suite


This MOC serves as the central navigation hub for the entire cybersecurity knowledge base. Use the links above to explore specific topics in depth.